ID

VAR-202006-0241


CVE

CVE-2020-0543


TITLE

Debian Security Advisory 4701-1

Trust: 0.1

sources: PACKETSTORM: 168851

DESCRIPTION

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654). The microcode update for HEDT and Xeon CPUs with signature 0x50654 which was reverted in DSA 4565-2 is now included again with a fixed release. The upstream update for Skylake-U/Y (signature 0x406e3) had to be excluded from this update due to reported hangs on boot. For the stable distribution (buster), these problems have been fixed in version 3.20200609.2~deb10u1. We recommend that you upgrade your intel-microcode packages. For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7iSvVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RH6g/9FYOaN5XyFFC8jVEmfdIl0pa8SqEH2+V1s27pAEOMhGAXuLrUms9wDq0J IoM54q/dz3rH3GiSi5nNqQDxLGx40DNSM5CCdCZIC22YvALS3aYsqpSSlDiyQZSb Im7isH8ntWIc3bedPWzfhui4VA19p8gnbFUetts3fp+uPeimd/QfPnJDN8wHUAL1 V2JzHMYD8v9axenbOxuWSArSnbubEtwpmHfhMzIMkE5150qhyofpzPBsKGoASa7q kPrwbUKBC11dGi+sV49rpXTf/ml7KDUDIrsA75sLC9WhckBcMdAkkVPLJyytAZ6A SqaOVJv+j0wVmhTtIqPxjvYCvX0y8i6NyQi+aliqzq7uEiQtaPQV8sWgDhyhTWga kxxiNuLfcuiEKkKToHdrkLLI1JiisqQTcwyRHg6k3X8+sNmKe6vFu3KzVbLo8+MH c3zEDQHP7XHm/euneb5ZFdg7+Rli03KWFm8/LNJQhrDcsFU/Si5268OwnzpGydwc eaIwuHtc8R64q+m5Aujo7X7kKk67zN7XhmX0nbr9Egni7dhG3iVrMtF27BTPMcML Gzz1pjktlYiySJYON64N/ooZchwAoAEhM9F1yPREXNf6PfRQG3lNjX3UeC4Ci0Ay /NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE= =cQzh -----END PGP SIGNATURE----- . * Update stale posttrans dependency, add triggers for proper handling of the debug kernel flavour along with kernel-rt. * Avoid temporary file creation, used for here-documents in check_caveats. Description: The microcode_ctl packages provide microcode updates for Intel. (CVE-2020-0548) It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer. ========================================================================= Ubuntu Security Notice USN-4391-1 June 10, 2020 linux, linux-aws, linux-kvm vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 LTS - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: It was discovered that the ext4 file system implementation in the Linux kernel did not properly handle setxattr operations in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19319) It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543) Piotr Krysiuk discovered that race conditions existed in the file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-12114) It was discovered that the USB susbsystem's scatter-gather implementation in the Linux kernel did not properly take data references in some situations, leading to a use-after-free. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-12464) It was discovered that the DesignWare SPI controller driver in the Linux kernel contained a race condition. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2020-12769) It was discovered that the exit signaling implementation in the Linux kernel contained an integer overflow. A local attacker could use this to cause a denial of service (arbitrary application crash). (CVE-2020-12826) Xiumei Mu discovered that the IPSec implementation in the Linux kernel did not properly encrypt IPv6 traffic in some situations. An attacker could use this to expose sensitive information. (CVE-2020-1749) Dmitry Vyukov discovered that the SELinux netlink security hook in the Linux kernel did not validate messages in some situations. A privileged attacker could use this to bypass SELinux netlink restrictions. (CVE-2020-10751) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS: linux-image-4.4.0-1075-kvm 4.4.0-1075.82 linux-image-4.4.0-1109-aws 4.4.0-1109.120 linux-image-4.4.0-184-generic 4.4.0-184.214 linux-image-4.4.0-184-generic-lpae 4.4.0-184.214 linux-image-4.4.0-184-lowlatency 4.4.0-184.214 linux-image-4.4.0-184-powerpc-e500mc 4.4.0-184.214 linux-image-4.4.0-184-powerpc-smp 4.4.0-184.214 linux-image-4.4.0-184-powerpc64-emb 4.4.0-184.214 linux-image-4.4.0-184-powerpc64-smp 4.4.0-184.214 linux-image-aws 4.4.0.1109.113 linux-image-generic 4.4.0.184.190 linux-image-generic-lpae 4.4.0.184.190 linux-image-kvm 4.4.0.1075.73 linux-image-lowlatency 4.4.0.184.190 linux-image-powerpc-e500mc 4.4.0.184.190 linux-image-powerpc-smp 4.4.0.184.190 linux-image-powerpc64-emb 4.4.0.184.190 linux-image-powerpc64-smp 4.4.0.184.190 linux-image-virtual 4.4.0.184.190 Ubuntu 14.04 ESM: linux-image-4.4.0-1073-aws 4.4.0-1073.77 linux-image-4.4.0-184-generic 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-generic-lpae 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-lowlatency 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-powerpc-e500mc 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-powerpc-smp 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-powerpc64-emb 4.4.0-184.214~14.04.1 linux-image-4.4.0-184-powerpc64-smp 4.4.0-184.214~14.04.1 linux-image-aws 4.4.0.1073.70 linux-image-generic-lpae-lts-xenial 4.4.0.184.161 linux-image-generic-lts-xenial 4.4.0.184.161 linux-image-lowlatency-lts-xenial 4.4.0.184.161 linux-image-powerpc-e500mc-lts-xenial 4.4.0.184.161 linux-image-powerpc-smp-lts-xenial 4.4.0.184.161 linux-image-powerpc64-emb-lts-xenial 4.4.0.184.161 linux-image-powerpc64-smp-lts-xenial 4.4.0.184.161 linux-image-virtual-lts-xenial 4.4.0.184.161 Please note that the mitigation for CVE-2020-0543 requires a processor microcode update to be applied, either from your system manufacturer or via the intel-microcode package. The kernel update for this issue provides the ability to disable the mitigation and to report vulnerability status. After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2020:2680-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:2680 Issue date: 2020-06-23 CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 ==================================================================== 1. Summary: Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.3) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.3) - x86_64 3. Description: Security Fix(es): * hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: Vector Register Data Sampling (CVE-2020-0548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Update Intel CPU microcode to microcode-20200609 release: - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f up to 0x621; - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718 up to 0x71a; - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28; - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e up to 0x2f; - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25 up to 0x26; - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c; - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21 up to 0x22; - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6 up to 0xdc; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151 up to 0x1000157; - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065 up to 0x2006906; - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c up to 0x4002f01; - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c up to 0x5002f01; - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6 up to 0xdc; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46 up to 0x78; - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6. * Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision 0xdc, use 0xd6 by default. * Enable 06-2d-07 (SNB-E/EN/EP) caveat by default. * Enable 06-55-04 (SKL-SP/X/W) caveat by default. * Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script. * Re-generate initramfs not only for the currently running kernel, but for several recently installed kernels as well. * Change the URL in the intel-microcode2ucode.8 to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1849060 - [rhel-7.3.z] Enable SNB-EP caveat by default 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.3): Source: microcode_ctl-2.1-16.33.el7_3.src.rpm x86_64: microcode_ctl-2.1-16.33.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.33.el7_3.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.3): Source: microcode_ctl-2.1-16.33.el7_3.src.rpm x86_64: microcode_ctl-2.1-16.33.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.33.el7_3.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.3): Source: microcode_ctl-2.1-16.33.el7_3.src.rpm x86_64: microcode_ctl-2.1-16.33.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.33.el7_3.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/solutions/5142691 https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXvIJitzjgjWX9erEAQjIOw//bX0YNiwWNZw4wcSHYxuS9V98LTZ90hgj y8/w5RFJ5ZKnHgGqVYBM2au63Jt8xzENjPHCDg6gAF6MfqzuNyXoKhih8LLvrD7h mOScdIbVwBruix3JcXitmd23BIFCZ0N7tL0gr8vGadIf9H8asRP1jgyuNj8JMo6v HAAjF+q1+JyH31x8efQvJmOnL4zThMkLyP78Z8qHE1VGGCveWrQrT+b1+GeOAeIk MEkrsZfMFB3T8hIjg61Gqnn42aPnDV8iX3kTL0hCZOmXAkivfDoN3PLmzRtKx6bZ veS/1DOes6hNQ80wuj71guEZuAGPPFpQbcD4049KfzMCzQTAQh18bkyqu29BX6bp OwOsNekbhiwM3HEz3t7EqXJUoEgXapG+Hdjx9DXCrxxr0T5gh9X7a6CAoNKvt/p+ okJtuhBzqFl162kYJMIsOYy2E1RwCSM/JD97FBbsWV5MrNBbNWA1+h75jeyssAFC C53/Cb9pJsgf+tkx1PvOtApxzl1IqS6rhGPfCnMSqq17e8eKFTlqgDveaPwHdcyW aK/uWBZN/d1x7Pay4tmgwK0Va5hMfZmEHNnosux0iNTxizleZfU8GIhfr61qBjYZ jFryuFwsQuUC7+BpU23WHKxtl1ZVHnSkq6RliPETVpI81KyV+p6kJDgUXZD5xrU1 uJGWMF17UCI=bOOd -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.07

sources: NVD: CVE-2020-0543 // VULHUB: VHN-161977 // VULMON: CVE-2020-0543 // PACKETSTORM: 168851 // PACKETSTORM: 158237 // PACKETSTORM: 163956 // PACKETSTORM: 163758 // PACKETSTORM: 163772 // PACKETSTORM: 158005 // PACKETSTORM: 158013 // PACKETSTORM: 158355 // PACKETSTORM: 158010 // PACKETSTORM: 158015 // PACKETSTORM: 158190

AFFECTED PRODUCTS

vendor:intelmodel:core i3-3217uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.10

Trust: 1.0

vendor:intelmodel:core i7-8705gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium a1018 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6310uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1037uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i7-8569uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1000mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3229yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2146gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2184gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2286mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8709gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477e proscope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i7-7700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3840qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3865uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic itp1000scope:ltversion:23.01.08

Trust: 1.0

vendor:intelmodel:celeron 2957uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1020mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3689yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4402ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3520mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2174gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-7y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3439yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4258uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3555lescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1290 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1246 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8350kscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:lteversion:2.3.1

Trust: 1.0

vendor:intelmodel:pentium g5400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3360mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i7-3612qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m6scope:ltversion:26.01.07

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4288uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4810mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 927uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y70scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1545m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1258l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5015uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7102escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-8950hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2981uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4020yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3350pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5575rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3610mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2244gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1515m v5scope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:intelmodel:celeron 1020escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3635qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4785tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3317uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5600scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:intelmodel:core m7-6y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3217uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 725cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4012yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4860hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8259uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3320mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10ascope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1019yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3210mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 6405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1278l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3667uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3825uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2140 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6267uscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:gteversion:2.0.0

Trust: 1.0

vendor:intelmodel:celeron g1610scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4760hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-6y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1558l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3902escope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4278uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m5scope:ltversion:22.01.08

Trust: 1.0

vendor:intelmodel:core i5-4690sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8265uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1820tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3940xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 2980uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4158uscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:intelmodel:core i9-9900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2284gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3556uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3227uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1578l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3920xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4220yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4900mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9880hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8809gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y51scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6822eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2100t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2129y v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1260l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2030m v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc527gscope:ltversion:1.4.0

Trust: 1.0

vendor:intelmodel:core 9750hfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-8100yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4410yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 1405 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2126gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g5420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2010 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770tscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:intelmodel:pentium g2130 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3230mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1850scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1017uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i3-4110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4308uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1047uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5157uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7267uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3632qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4120uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4202yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2020m v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2288gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700hqscope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:intelmodel:celeron g3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3612qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2127u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3820qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3537uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4415yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3380mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1575m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5257uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2134scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6350hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4765tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3755uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-2115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4025uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176mscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547gscope:ltversion:r1.28.0

Trust: 1.0

vendor:intelmodel:celeron g1840scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8145uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4722hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7740xscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:intelmodel:core i5-10210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9980hkscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m4scope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron g1840tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1610tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4980hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gelscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core 8269uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3805uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:intelmodel:xeon e3-1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1630scope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:intelmodel:core i5-3475sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 9300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8565uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b925cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2236scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b915cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4578uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2144gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2136scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3540mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core m-5y3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2970mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8706gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8559uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2274gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3258scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400fscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:eqversion:3.0.0

Trust: 1.0

vendor:intelmodel:core i5-3437uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc827dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-6167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5287uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:celeron g1820scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8305gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2246gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc3000 smartscope:ltversion:1.b

Trust: 1.0

vendor:intelmodel:core i5-6442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4800mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7640xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v5scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:intelmodel:core i3-3130mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8750hscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc347escope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i5-10310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3720qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3687uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4escope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3561yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4910mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3630qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3427uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1565l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6970hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8365uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4960hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1830scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y71scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4720hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1005mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3337uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8109uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10110yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4415uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2117u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4610yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5006uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4sscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core 5405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3339yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mlscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i5-4302yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3740qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8350uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-8000tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3215uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547escope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 3855uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1221 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8500yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4771scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6102escope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2020-0543

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0543
value: MEDIUM

Trust: 1.0

VULHUB: VHN-161977
value: LOW

Trust: 0.1

VULMON: CVE-2020-0543
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-161977
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-161977 // VULMON: CVE-2020-0543 // NVD: CVE-2020-0543

PROBLEMTYPE DATA

problemtype:CWE-459

Trust: 1.1

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-161977 // NVD: CVE-2020-0543

THREAT TYPE

local

Trust: 0.4

sources: PACKETSTORM: 158005 // PACKETSTORM: 158013 // PACKETSTORM: 158010 // PACKETSTORM: 158015

TYPE

overflow, arbitrary, code execution

Trust: 0.2

sources: PACKETSTORM: 158010 // PACKETSTORM: 158015

PATCH

title:The Registerurl:https://www.theregister.co.uk/2020/06/09/june_2020_patch_tuesday/

Trust: 0.2

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202707 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202680 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202706 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202677 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202432 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202771 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4393-1

Trust: 0.1

title:Ubuntu Security Notice: intel-microcode vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4385-1

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202433 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202758 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202431 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202842 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202757 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: microcode_ctl security, bug fix and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202679 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: intel-microcode regressionurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4385-2

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-lts-trusty vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4392-1

Trust: 0.1

title:Red Hat: Moderate: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202430 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202667 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202427 - Security Advisory

Trust: 0.1

title:Red Hat: Important: kernel-rt security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202428 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4390-1

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-aws-5.3, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4387-1

Trust: 0.1

title:Amazon Linux AMI: ALAS-2020-1396url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1396

Trust: 0.1

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-0543 log

Trust: 0.1

title:Debian Security Advisories: DSA-4701-1 intel-microcode -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=954d2c33c2a4127c33b5f47731100050

Trust: 0.1

title:Red Hat: Important: kernel security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203019 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: linux-gke-5.0, linux-oem-osp1 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4388-1

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4389-1

Trust: 0.1

title:Siemens Security Advisories: Siemens Security Advisoryurl:https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=90d5b24197f663c23e5af8c971118de6

Trust: 0.1

title:Arch Linux Advisories: [ASA-202006-11] intel-ucode: information disclosureurl:https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202006-11

Trust: 0.1

title:Ubuntu Security Notice: linux, linux-aws, linux-kvm vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4391-1

Trust: 0.1

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03668 rev. 4 - Intel® 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwardingurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=85333ba63923f2976a4b451bcd61fd00

Trust: 0.1

title:Red Hat: Important: kernel security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202429 - Security Advisory

Trust: 0.1

title:Citrix Security Bulletins: Citrix Hypervisor Security Updatesurl:https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=2b9d5984faab280f63afcb8a237cd1d2

Trust: 0.1

title:Amazon Linux 2: ALAS2-2020-1444url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1444

Trust: 0.1

title:HP: SUPPORT COMMUNICATION- SECURITY BULLETIN HPSBHF03668 rev. 4 - Intel® 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwardingurl:https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=2a42c56bb55866dbb1c5a179d43a79fa

Trust: 0.1

title:Debian Security Advisories: DSA-4699-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=24f2948c681d56f3f30c8ed6de9c4c9d

Trust: 0.1

title:Amazon Linux AMI: ALAS-2020-1401url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1401

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-012url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-012

Trust: 0.1

title:Debian Security Advisories: DSA-4698-1 linux -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=88a848047667226a68bbe6de9bb29095

Trust: 0.1

title:Speculative-execution-attacksurl:https://github.com/Stefan-Radu/Speculative-execution-attacks

Trust: 0.1

title:get-nist-detailsurl:https://github.com/dmarcuccio-solace/get-nist-details

Trust: 0.1

title:spectre-meltdownurl:https://github.com/edsonjt81/spectre-meltdown

Trust: 0.1

title:spectre-meltdown-checkerurl:https://github.com/speed47/spectre-meltdown-checker

Trust: 0.1

title: - url:https://github.com/merlinepedra25/spectre-meltdown-checker

Trust: 0.1

title: - url:https://github.com/merlinepedra/spectre-meltdown-checker

Trust: 0.1

title:hardware-attacks-state-of-the-arturl:https://github.com/codexlynx/hardware-attacks-state-of-the-art

Trust: 0.1

title:Threatposturl:https://threatpost.com/critical-intel-flaws-fixed-in-active-management-technology/156458/

Trust: 0.1

sources: VULMON: CVE-2020-0543

EXTERNAL IDS

db:NVDid:CVE-2020-0543

Trust: 2.3

db:MCAFEEid:SB10318

Trust: 1.2

db:OPENWALLid:OSS-SECURITY/2020/07/14/5

Trust: 1.2

db:SIEMENSid:SSA-534763

Trust: 1.2

db:PACKETSTORMid:158015

Trust: 0.2

db:PACKETSTORMid:158010

Trust: 0.2

db:PACKETSTORMid:158005

Trust: 0.2

db:PACKETSTORMid:158237

Trust: 0.2

db:PACKETSTORMid:158355

Trust: 0.2

db:PACKETSTORMid:158190

Trust: 0.2

db:PACKETSTORMid:157993

Trust: 0.1

db:PACKETSTORMid:158183

Trust: 0.1

db:PACKETSTORMid:168421

Trust: 0.1

db:PACKETSTORMid:158198

Trust: 0.1

db:PACKETSTORMid:158189

Trust: 0.1

db:PACKETSTORMid:157997

Trust: 0.1

db:PACKETSTORMid:158008

Trust: 0.1

db:PACKETSTORMid:158039

Trust: 0.1

db:PACKETSTORMid:158250

Trust: 0.1

db:PACKETSTORMid:158238

Trust: 0.1

db:PACKETSTORMid:158197

Trust: 0.1

db:CNNVDid:CNNVD-202006-630

Trust: 0.1

db:VULHUBid:VHN-161977

Trust: 0.1

db:ICS CERTid:ICSA-20-252-07

Trust: 0.1

db:VULMONid:CVE-2020-0543

Trust: 0.1

db:PACKETSTORMid:168851

Trust: 0.1

db:PACKETSTORMid:163956

Trust: 0.1

db:PACKETSTORMid:163758

Trust: 0.1

db:PACKETSTORMid:163772

Trust: 0.1

db:PACKETSTORMid:158013

Trust: 0.1

sources: VULHUB: VHN-161977 // VULMON: CVE-2020-0543 // PACKETSTORM: 168851 // PACKETSTORM: 158237 // PACKETSTORM: 163956 // PACKETSTORM: 163758 // PACKETSTORM: 163772 // PACKETSTORM: 158005 // PACKETSTORM: 158013 // PACKETSTORM: 158355 // PACKETSTORM: 158010 // PACKETSTORM: 158015 // PACKETSTORM: 158190 // NVD: CVE-2020-0543

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html

Trust: 1.3

url:https://usn.ubuntu.com/4393-1/

Trust: 1.3

url:https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf

Trust: 1.2

url:http://www.openwall.com/lists/oss-security/2020/07/14/5

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html

Trust: 1.2

url:https://usn.ubuntu.com/4385-1/

Trust: 1.2

url:https://usn.ubuntu.com/4387-1/

Trust: 1.2

url:https://usn.ubuntu.com/4388-1/

Trust: 1.2

url:https://usn.ubuntu.com/4389-1/

Trust: 1.2

url:https://usn.ubuntu.com/4390-1/

Trust: 1.2

url:https://usn.ubuntu.com/4391-1/

Trust: 1.2

url:https://usn.ubuntu.com/4392-1/

Trust: 1.2

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10318

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0543

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2020-0549

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-0548

Trust: 0.8

url:https://access.redhat.com/security/team/contact/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-0549

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-0543

Trust: 0.6

url:https://bugzilla.redhat.com/):

Trust: 0.6

url:https://access.redhat.com/security/team/key/

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2020-0548

Trust: 0.6

url:https://access.redhat.com/articles/11258

Trust: 0.6

url:https://wiki.ubuntu.com/securityteam/knowledgebase/srbds

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/solutions/5142691

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-8696

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24511

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8698

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24512

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24512

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24489

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24489

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-8698

Trust: 0.3

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8695

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-8695

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8696

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24511

Trust: 0.3

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 0.2

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12114

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12654

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10318

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/459.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2707

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-20-252-07

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html

Trust: 0.1

url:https://security-tracker.debian.org/tracker/intel-microcode

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2757

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3322

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3028

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3029

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.0

Trust: 0.1

url:https://usn.ubuntu.com/4385-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.0

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.0

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19319

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1075.82

Trust: 0.1

url:https://usn.ubuntu.com/4391-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12464

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12826

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.4.0-184.214

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12769

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-1749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10751

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1109.120

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2842

Trust: 0.1

url:https://usn.ubuntu.com/4393-1

Trust: 0.1

url:https://usn.ubuntu.com/4392-1

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2680

Trust: 0.1

sources: VULHUB: VHN-161977 // VULMON: CVE-2020-0543 // PACKETSTORM: 168851 // PACKETSTORM: 158237 // PACKETSTORM: 163956 // PACKETSTORM: 163758 // PACKETSTORM: 163772 // PACKETSTORM: 158005 // PACKETSTORM: 158013 // PACKETSTORM: 158355 // PACKETSTORM: 158010 // PACKETSTORM: 158015 // PACKETSTORM: 158190 // NVD: CVE-2020-0543

CREDITS

Red Hat

Trust: 0.6

sources: PACKETSTORM: 158237 // PACKETSTORM: 163956 // PACKETSTORM: 163758 // PACKETSTORM: 163772 // PACKETSTORM: 158355 // PACKETSTORM: 158190

SOURCES

db:VULHUBid:VHN-161977
db:VULMONid:CVE-2020-0543
db:PACKETSTORMid:168851
db:PACKETSTORMid:158237
db:PACKETSTORMid:163956
db:PACKETSTORMid:163758
db:PACKETSTORMid:163772
db:PACKETSTORMid:158005
db:PACKETSTORMid:158013
db:PACKETSTORMid:158355
db:PACKETSTORMid:158010
db:PACKETSTORMid:158015
db:PACKETSTORMid:158190
db:NVDid:CVE-2020-0543

LAST UPDATE DATE

2025-02-22T21:34:07.067000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-161977date:2022-04-28T00:00:00
db:VULMONid:CVE-2020-0543date:2022-04-28T00:00:00
db:NVDid:CVE-2020-0543date:2024-11-21T04:53:42.440

SOURCES RELEASE DATE

db:VULHUBid:VHN-161977date:2020-06-15T00:00:00
db:VULMONid:CVE-2020-0543date:2020-06-15T00:00:00
db:PACKETSTORMid:168851date:2020-06-28T19:12:00
db:PACKETSTORMid:158237date:2020-06-29T15:29:15
db:PACKETSTORMid:163956date:2021-08-31T15:44:21
db:PACKETSTORMid:163758date:2021-08-09T14:15:45
db:PACKETSTORMid:163772date:2021-08-10T14:49:53
db:PACKETSTORMid:158005date:2020-06-10T15:06:11
db:PACKETSTORMid:158013date:2020-06-10T15:08:51
db:PACKETSTORMid:158355date:2020-07-07T16:19:47
db:PACKETSTORMid:158010date:2020-06-10T15:08:12
db:PACKETSTORMid:158015date:2020-06-10T15:09:07
db:PACKETSTORMid:158190date:2020-06-23T15:03:31
db:NVDid:CVE-2020-0543date:2020-06-15T14:15:11.207