ID

VAR-202006-0241


CVE

CVE-2020-0543


TITLE

plural  Intel(R)  Information leakage vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2020-006964

DESCRIPTION

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. plural Intel(R) The product contains a vulnerability related to information leakage.Information may be obtained. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4699-1 security@debian.org https://www.debian.org/security/ Ben Hutchings June 09, 2020 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : linux CVE ID : CVE-2019-3016 CVE-2019-19462 CVE-2020-0543 CVE-2020-10711 CVE-2020-10732 CVE-2020-10751 CVE-2020-10757 CVE-2020-12114 CVE-2020-12464 CVE-2020-12768 CVE-2020-12770 CVE-2020-13143 Debian Bug : 960271 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. CVE-2019-3016 It was discovered that the KVM implementation for x86 did not always perform TLB flushes when needed, if the paravirtualised TLB flush feature was enabled. This could lead to disclosure of sensitive information within a guest VM. CVE-2019-19462 The syzkaller tool found a missing error check in the 'relay' library used to implement various files under debugfs. A local user permitted to access debugfs could use this to cause a denial of service (crash) or possibly for privilege escalation. CVE-2020-0543 Researchers at VU Amsterdam discovered that on some Intel CPUs supporting the RDRAND and RDSEED instructions, part of a random value generated by these instructions may be used in a later speculative execution on any core of the same physical CPU. Depending on how these instructions are used by applications, a local user or VM guest could use this to obtain sensitive information such as cryptographic keys from other users or VMs. This vulnerability can be mitigated by a microcode update, either as part of system firmware (BIOS) or through the intel-microcode package in Debian's non-free archive section. This kernel update only provides reporting of the vulnerability and the option to disable the mitigation if it is not needed. CVE-2020-10711 Matthew Sheets reported NULL pointer dereference issues in the SELinux subsystem while receiving CIPSO packet with null category. A remote attacker can take advantage of this flaw to cause a denial of service (crash). Note that this issue does not affect the binary packages distributed in Debian as CONFIG_NETLABEL is not enabled. CVE-2020-10732 An information leak of kernel private memory to userspace was found in the kernel's implementation of core dumping userspace processes. CVE-2020-10751 Dmitry Vyukov reported that the SELinux subsystem did not properly handle validating multiple messages, which could allow a privileged attacker to bypass SELinux netlink restrictions. CVE-2020-10757 Fan Yang reported a flaw in the way mremap handled DAX hugepages, allowing a local user to escalate their privileges. CVE-2020-12114 Piotr Krysiuk discovered a race condition between the umount and pivot_root operations in the filesystem core (vfs). A local user with the CAP_SYS_ADMIN capability in any user namespace could use this to cause a denial of service (crash). CVE-2020-12464 Kyungtae Kim reported a race condition in the USB core that can result in a use-after-free. It is not clear how this can be exploited, but it could result in a denial of service (crash or memory corruption) or privilege escalation. CVE-2020-12768 A bug was discovered in the KVM implementation for AMD processors, which could result in a memory leak. The security impact of this is unclear. CVE-2020-12770 It was discovered that the sg (SCSI generic) driver did not correctly release internal resources in a particular error case. A local user permitted to access an sg device could possibly use this to cause a denial of service (resource exhaustion). CVE-2020-13143 Kyungtae Kim reported a potential heap out-of-bounds write in the USB gadget subsystem. A local user permitted to write to the gadget configuration filesystem could use this to cause a denial of service (crash or memory corruption) or potentially for privilege escalation. For the stable distribution (buster), these problems have been fixed in version 4.19.118-2+deb10u1. This version also fixes some related bugs that do not have their own CVE IDs, and a regression in the <linux/swab.h> UAPI header introduced in the previous point release (bug #960271). We recommend that you upgrade your linux packages. For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7f5cVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Q2Gg//b/hL9fW9Js1PYDU/VtS6r5Cca5xsCYlbAheAlMPMtm/Vym4NJOuEvyuI DvPXbf0Bi7gjQ0gEgM/urJTzqjzIccwrUQe1aFHt0N9exC53z1xPWZDJepGkSQOB 2AB5YaFTxkuGur/HXbKomdMWvSVphpBM+id9v2V1iWY2iA6cI1sCjgziUKcDMECD T7tCe4Hrjf6BY/W4xBiT0BEQNOO2i/rn7p9pNk+wi85BbC7g5ubKWGn9sSDd8KtA u2z5tsicaM7kXaPsaW11fSPxu7YOz09qLgBQnY8B2gdMEAp3YjN9ibyHppjme3GK 02ZZUHQ+Y4MyQQgCzWxaqXCu6Aa+4B5i2nTY907BVBslrfulKRbr1qS3D2CJojT/ qYVub7C5RCW5VnbJZxCDLgSmGRbyPW2pVpnBTvID8czTUhd+M5e6fW932TzUW07w 18ueto1fRlcAauIO3SQV7Ai9froFGjH4L8XbUipiv0qwotSjcPb4HoZpp0xgNcRU xjZW0MMhK/lyfe8gDx8wjpihbQVKtTtIaWbeoZPoMENE92yW8+7DbXjfXAylX3px IdVaeo7iF3MOYuez4qEAsyPF4ver8Xl9HKS05J9NUYUeRf2BF3M6xFWjpTm5xjoH bdIGBJ322sNjTAzkneriX5iO3szBDINPHII2V/AaqafhYZYWtoM= =c00Y -----END PGP SIGNATURE----- . Summary: An update for microcode_ctl is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. Description: The microcode_ctl packages provide microcode updates for Intel. Security Fix(es): * hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: Vector Register Data Sampling (CVE-2020-0548) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: vt-d related privilege escalation (CVE-2020-24489) * hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) * hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) * hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) * hw: Vector Register Leakage-Active (CVE-2020-8696) * hw: Fast forward store predictor (CVE-2020-8698) 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor 1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors 6. Package List: Red Hat Enterprise Linux Client (v. 7): Source: microcode_ctl-2.1-73.11.el7_9.src.rpm x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm Red Hat Enterprise Linux ComputeNode (v. 7): Source: microcode_ctl-2.1-73.11.el7_9.src.rpm x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm Red Hat Enterprise Linux Server (v. 7): Source: microcode_ctl-2.1-73.11.el7_9.src.rpm x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 7): Source: microcode_ctl-2.1-73.11.el7_9.src.rpm x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYRD++tzjgjWX9erEAQhA1A//eeO88DFGpTcHgCHrsXimUtK3MZX0RppT 5UOWuXgmPJniMPDALpkfTNTnNGASjBB+WDclaW2d/sZf52PzYLao5wGVIYdUx3Nl l9IvbGNMm0F7eI7aHdT2QnUhQQl1IpJrbmkhvBM2w85EmOfqlq+CpXnJMRXzoRdv sFPrWAo1opDNnBV6iYAnyULHFuWwcvU28n3JU945W8p/PvqJgSze77i4dmpzYkBj ljzVrIUl2pizBmnQMj03JJ+YeB8+oKb0uD2RdqHoxkUSFGH9OW6s/qytHu/eR4uL Y7WmIfHUxGsVRcmIjo/VaAvvWs4A3hdOL3nGdRAMQOKp+VoDcX7VDNURoxK/bkcJ OepHSyfWPCVXvOmU5l2ov1uzVQ/F+ajeevMehuzwQlTAIur5qE2eQ2Mwitfh/7WZ W3x67peCz51zVPtb7rkQfpzQzZKkjSAAclOYMzltv2PA5vSXZy8+hEqWZwqtesQn ltz36bjQMvRRhr1yGDbaFI5dcTB8T/eIkzmD6wPfbd7r7SEuE0GUd8Yf69VghGL2 f+mvR8oWb2x3RHXbpFm4aIt5mJHqIgfXDAohz7lXgLyJwQefyeJ5w+W8nOe+ZSK/ yvfiVQZz9tvPq8yqC87YWTA7zcnhoSmPvXRicJakpfJL/oz043Tc17jqxIra36sA UjXnNBNse8A=LIYI -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================= Ubuntu Security Notice USN-4390-1 June 10, 2020 linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems - linux-gke-4.15: Linux kernel for Google Container Engine (GKE) systems - linux-kvm: Linux kernel for cloud environments - linux-oem: Linux kernel for OEM systems - linux-oracle: Linux kernel for Oracle Cloud systems - linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-hwe: Linux hardware enablement (HWE) kernel Details: It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2020-0067) It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. (CVE-2020-12114) It was discovered that the USB susbsystem's scatter-gather implementation in the Linux kernel did not properly take data references in some situations, leading to a use-after-free. (CVE-2020-12464) Xiumei Mu discovered that the IPSec implementation in the Linux kernel did not properly encrypt IPv6 traffic in some situations. An attacker could use this to expose sensitive information. (CVE-2020-1749) Dmitry Vyukov discovered that the SELinux netlink security hook in the Linux kernel did not validate messages in some situations. (CVE-2020-10751) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 18.04 LTS: linux-image-4.15.0-1045-oracle 4.15.0-1045.49 linux-image-4.15.0-106-generic 4.15.0-106.107 linux-image-4.15.0-106-generic-lpae 4.15.0-106.107 linux-image-4.15.0-106-lowlatency 4.15.0-106.107 linux-image-4.15.0-1063-gke 4.15.0-1063.66 linux-image-4.15.0-1067-kvm 4.15.0-1067.68 linux-image-4.15.0-1073-aws 4.15.0-1073.77 linux-image-4.15.0-1087-oem 4.15.0-1087.97 linux-image-4.15.0-1089-azure 4.15.0-1089.99 linux-image-aws-lts-18.04 4.15.0.1073.76 linux-image-azure-lts-18.04 4.15.0.1089.60 linux-image-generic 4.15.0.106.94 linux-image-generic-lpae 4.15.0.106.94 linux-image-gke 4.15.0.1063.65 linux-image-gke-4.15 4.15.0.1063.65 linux-image-kvm 4.15.0.1067.63 linux-image-lowlatency 4.15.0.106.94 linux-image-oem 4.15.0.1087.91 linux-image-oracle-lts-18.04 4.15.0.1045.54 linux-image-powerpc-e500mc 4.15.0.106.94 linux-image-powerpc-smp 4.15.0.106.94 linux-image-powerpc64-emb 4.15.0.106.94 linux-image-powerpc64-smp 4.15.0.106.94 linux-image-virtual 4.15.0.106.94 Ubuntu 16.04 LTS: linux-image-4.15.0-1045-oracle 4.15.0-1045.49~16.04.1 linux-image-4.15.0-106-generic 4.15.0-106.107~16.04.1 linux-image-4.15.0-106-generic-lpae 4.15.0-106.107~16.04.1 linux-image-4.15.0-106-lowlatency 4.15.0-106.107~16.04.1 linux-image-4.15.0-1073-aws 4.15.0-1073.77~16.04.1 linux-image-4.15.0-1077-gcp 4.15.0-1077.87~16.04.1 linux-image-4.15.0-1089-azure 4.15.0-1089.99~16.04.1 linux-image-aws-hwe 4.15.0.1073.73 linux-image-azure 4.15.0.1089.84 linux-image-azure-edge 4.15.0.1089.84 linux-image-gcp 4.15.0.1077.79 linux-image-generic-hwe-16.04 4.15.0.106.111 linux-image-generic-lpae-hwe-16.04 4.15.0.106.111 linux-image-gke 4.15.0.1077.79 linux-image-lowlatency-hwe-16.04 4.15.0.106.111 linux-image-oem 4.15.0.106.111 linux-image-oracle 4.15.0.1045.38 linux-image-virtual-hwe-16.04 4.15.0.106.111 Ubuntu 14.04 ESM: linux-image-4.15.0-1089-azure 4.15.0-1089.99~14.04.1 linux-image-azure 4.15.0.1089.66 Please note that the mitigation for CVE-2020-0543 requires a processor microcode update to be applied, either from your system manufacturer or via the intel-microcode package. After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. Unfortunately, that update prevented certain processors in the Intel Skylake family (06_4EH) from booting successfully. Additonally, on Ubuntu 20.04 LTS, late loading of microcode was enabled, which could lead to system instability. Please note that the 'dis_ucode_ldr' kernel command line option can be added in the boot menu to disable microcode loading for system recovery. We apologize for the inconvenience. (CVE-2020-0548) It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer

Trust: 2.43

sources: NVD: CVE-2020-0543 // JVNDB: JVNDB-2020-006964 // VULHUB: VHN-161977 // PACKETSTORM: 168852 // PACKETSTORM: 163956 // PACKETSTORM: 163757 // PACKETSTORM: 163758 // PACKETSTORM: 158009 // PACKETSTORM: 158014 // PACKETSTORM: 158011 // PACKETSTORM: 158039

AFFECTED PRODUCTS

vendor:intelmodel:core i3-3217uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.10

Trust: 1.0

vendor:intelmodel:core i7-8705gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium a1018 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6310uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1037uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i7-8569uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1000mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3229yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2146gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2184gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2286mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8709gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477e proscope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i7-7700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3840qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3865uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic itp1000scope:ltversion:23.01.08

Trust: 1.0

vendor:intelmodel:celeron 2957uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1020mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3689yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4402ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3520mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2174gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-7y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3439yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4258uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3555lescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1290 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1246 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8350kscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:lteversion:2.3.1

Trust: 1.0

vendor:intelmodel:pentium g5400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3360mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i7-3612qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m6scope:ltversion:26.01.07

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4288uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4810mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 927uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y70scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1545m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1258l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5015uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7102escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-8950hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2981uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4020yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3350pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5575rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3610mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2244gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1515m v5scope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:intelmodel:celeron 1020escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3635qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4785tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3317uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5600scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:intelmodel:core m7-6y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3217uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 725cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4012yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4860hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8259uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3320mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10ascope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1019yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3210mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 6405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1278l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3667uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3825uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2140 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6267uscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:gteversion:2.0.0

Trust: 1.0

vendor:intelmodel:celeron g1610scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4760hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-6y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1558l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3902escope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4278uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m5scope:ltversion:22.01.08

Trust: 1.0

vendor:intelmodel:core i5-4690sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8265uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1820tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3940xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 2980uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4158uscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:intelmodel:core i9-9900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2284gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3556uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3227uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1578l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3920xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4220yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4900mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9880hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8809gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y51scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6822eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2100t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2129y v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1260l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2030m v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc527gscope:ltversion:1.4.0

Trust: 1.0

vendor:intelmodel:core 9750hfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-8100yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4410yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 1405 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2126gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g5420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2010 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770tscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:intelmodel:pentium g2130 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3230mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1850scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1017uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i3-4110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4308uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1047uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5157uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7267uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3632qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4120uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4202yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2020m v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2288gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700hqscope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:intelmodel:celeron g3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3612qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2127u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3820qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3537uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4415yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3380mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1575m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5257uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2134scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6350hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4765tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3755uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-2115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4025uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176mscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547gscope:ltversion:r1.28.0

Trust: 1.0

vendor:intelmodel:celeron g1840scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8145uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4722hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7740xscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:intelmodel:core i5-10210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9980hkscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m4scope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron g1840tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1610tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4980hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gelscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core 8269uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3805uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:intelmodel:xeon e3-1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1630scope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:intelmodel:core i5-3475sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 9300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8565uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b925cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2236scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b915cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4578uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2144gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2136scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3540mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core m-5y3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2970mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8706gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8559uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2274gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3258scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400fscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:eqversion:3.0.0

Trust: 1.0

vendor:intelmodel:core i5-3437uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc827dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-6167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5287uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:celeron g1820scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8305gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2246gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc3000 smartscope:ltversion:1.b

Trust: 1.0

vendor:intelmodel:core i5-6442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4800mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7640xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v5scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:intelmodel:core i3-3130mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8750hscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc347escope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i5-10310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3720qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3687uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4escope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3561yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4910mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3630qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3427uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1565l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6970hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8365uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4960hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1830scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y71scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4720hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1005mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3337uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8109uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10110yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4415uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2117u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4610yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5006uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4sscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core 5405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3339yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mlscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i5-4302yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3740qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8350uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-8000tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3215uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547escope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 3855uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1221 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8500yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4771scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6102escope:eqversion: -

Trust: 1.0

vendor:インテルmodel:celeron 1005mscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1020mscope: - version: -

Trust: 0.8

vendor:canonicalmodel:ubuntuscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1000mscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1017uscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1047uescope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 2955uscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1037uscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1020escope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1019yscope: - version: -

Trust: 0.8

vendor:opensusemodel:leapscope: - version: -

Trust: 0.8

vendor:日立model:日立アドバンストサーバscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1007uscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0543
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-0543
value: MEDIUM

Trust: 0.8

VULHUB: VHN-161977
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-161977
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-0543
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-161977 // JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

PROBLEMTYPE DATA

problemtype:CWE-459

Trust: 1.1

problemtype:information leak (CWE-200) [NVD Evaluation ]

Trust: 0.8

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-161977 // JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

THREAT TYPE

local

Trust: 0.3

sources: PACKETSTORM: 158009 // PACKETSTORM: 158014 // PACKETSTORM: 158011

PATCH

title:hitachi-sec-2021-208url:https://ubuntu.com/security/notices/USN-4385-1

Trust: 0.8

sources: JVNDB: JVNDB-2020-006964

EXTERNAL IDS

db:NVDid:CVE-2020-0543

Trust: 3.5

db:MCAFEEid:SB10318

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2020/07/14/5

Trust: 1.1

db:SIEMENSid:SSA-534763

Trust: 1.1

db:ICS CERTid:ICSA-20-252-07

Trust: 0.8

db:JVNid:JVNVU98979613

Trust: 0.8

db:JVNid:JVNVU94568336

Trust: 0.8

db:JVNDBid:JVNDB-2020-006964

Trust: 0.8

db:PACKETSTORMid:158039

Trust: 0.2

db:PACKETSTORMid:157993

Trust: 0.1

db:PACKETSTORMid:158183

Trust: 0.1

db:PACKETSTORMid:158015

Trust: 0.1

db:PACKETSTORMid:168421

Trust: 0.1

db:PACKETSTORMid:158010

Trust: 0.1

db:PACKETSTORMid:158198

Trust: 0.1

db:PACKETSTORMid:158189

Trust: 0.1

db:PACKETSTORMid:157997

Trust: 0.1

db:PACKETSTORMid:158008

Trust: 0.1

db:PACKETSTORMid:158005

Trust: 0.1

db:PACKETSTORMid:158250

Trust: 0.1

db:PACKETSTORMid:158237

Trust: 0.1

db:PACKETSTORMid:158355

Trust: 0.1

db:PACKETSTORMid:158238

Trust: 0.1

db:PACKETSTORMid:158197

Trust: 0.1

db:PACKETSTORMid:158190

Trust: 0.1

db:CNNVDid:CNNVD-202006-630

Trust: 0.1

db:VULHUBid:VHN-161977

Trust: 0.1

db:PACKETSTORMid:168852

Trust: 0.1

db:PACKETSTORMid:163956

Trust: 0.1

db:PACKETSTORMid:163757

Trust: 0.1

db:PACKETSTORMid:163758

Trust: 0.1

db:PACKETSTORMid:158009

Trust: 0.1

db:PACKETSTORMid:158014

Trust: 0.1

db:PACKETSTORMid:158011

Trust: 0.1

sources: VULHUB: VHN-161977 // PACKETSTORM: 168852 // PACKETSTORM: 163956 // PACKETSTORM: 163757 // PACKETSTORM: 163758 // PACKETSTORM: 158009 // PACKETSTORM: 158014 // PACKETSTORM: 158011 // PACKETSTORM: 158039 // JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-0543

Trust: 1.6

url:https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf

Trust: 1.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2020/07/14/5

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html

Trust: 1.1

url:https://usn.ubuntu.com/4385-1/

Trust: 1.1

url:https://usn.ubuntu.com/4387-1/

Trust: 1.1

url:https://usn.ubuntu.com/4388-1/

Trust: 1.1

url:https://usn.ubuntu.com/4389-1/

Trust: 1.1

url:https://usn.ubuntu.com/4390-1/

Trust: 1.1

url:https://usn.ubuntu.com/4391-1/

Trust: 1.1

url:https://usn.ubuntu.com/4392-1/

Trust: 1.1

url:https://usn.ubuntu.com/4393-1/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10318

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 1.0

url:https://jvn.jp/vu/jvnvu98979613/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu94568336/

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-252-07

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-12464

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-12114

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-0549

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-0548

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-8696

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24511

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8698

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24512

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24512

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24489

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-24489

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-8698

Trust: 0.3

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-0543

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8695

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-8695

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-0549

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-8696

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-24511

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-0548

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-0067

Trust: 0.3

url:https://wiki.ubuntu.com/securityteam/knowledgebase/srbds

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-10751

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12659

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-1749

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10318

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 0.1

url:https://security-tracker.debian.org/tracker/linux

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10732

Trust: 0.1

url:https://www.debian.org/security/faq

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10757

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-3016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12768

Trust: 0.1

url:https://www.debian.org/security/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12770

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10711

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19462

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13143

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3322

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3027

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:3028

Trust: 0.1

url:https://usn.ubuntu.com/4387-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.3/5.3.0-1026.28~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1024.26

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1023.25

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1023.25

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1026.28~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.3/5.3.0-1024.26~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.3/5.3.0-1023.25~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.3.0-59.53

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1028.29~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1028.29

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-59.53~18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1026.28

Trust: 0.1

url:https://usn.ubuntu.com/4388-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1059.64

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1042.43

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1067.68

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1089.99

Trust: 0.1

url:https://usn.ubuntu.com/4390-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-106.107

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1045.49~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1087.97

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1045.49

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1073.77

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-106.107~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1077.87~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1063.66

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1089.99~16.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1073.77~16.04.1

Trust: 0.1

url:https://launchpad.net/bugs/1883002

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.1

Trust: 0.1

url:https://usn.ubuntu.com/4385-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.2

Trust: 0.1

url:https://usn.ubuntu.com/4385-2

Trust: 0.1

url:https://launchpad.net/bugs/1882890,

Trust: 0.1

sources: VULHUB: VHN-161977 // PACKETSTORM: 168852 // PACKETSTORM: 163956 // PACKETSTORM: 163757 // PACKETSTORM: 163758 // PACKETSTORM: 158009 // PACKETSTORM: 158014 // PACKETSTORM: 158011 // PACKETSTORM: 158039 // JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

CREDITS

Ubuntu

Trust: 0.4

sources: PACKETSTORM: 158009 // PACKETSTORM: 158014 // PACKETSTORM: 158011 // PACKETSTORM: 158039

SOURCES

db:VULHUBid:VHN-161977
db:PACKETSTORMid:168852
db:PACKETSTORMid:163956
db:PACKETSTORMid:163757
db:PACKETSTORMid:163758
db:PACKETSTORMid:158009
db:PACKETSTORMid:158014
db:PACKETSTORMid:158011
db:PACKETSTORMid:158039
db:JVNDBid:JVNDB-2020-006964
db:NVDid:CVE-2020-0543

LAST UPDATE DATE

2026-03-25T22:28:19.349000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-161977date:2022-04-28T00:00:00
db:JVNDBid:JVNDB-2020-006964date:2022-03-11T06:10:00
db:NVDid:CVE-2020-0543date:2024-11-21T04:53:42.440

SOURCES RELEASE DATE

db:VULHUBid:VHN-161977date:2020-06-15T00:00:00
db:PACKETSTORMid:168852date:2020-06-28T19:12:00
db:PACKETSTORMid:163956date:2021-08-31T15:44:21
db:PACKETSTORMid:163757date:2021-08-09T14:15:37
db:PACKETSTORMid:163758date:2021-08-09T14:15:45
db:PACKETSTORMid:158009date:2020-06-10T15:08:02
db:PACKETSTORMid:158014date:2020-06-10T15:08:59
db:PACKETSTORMid:158011date:2020-06-10T15:08:22
db:PACKETSTORMid:158039date:2020-06-11T16:34:34
db:JVNDBid:JVNDB-2020-006964date:2020-07-27T00:00:00
db:NVDid:CVE-2020-0543date:2020-06-15T14:15:11.207