ID

VAR-202006-0241


CVE

CVE-2020-0543


TITLE

plural  Intel(R)  Information leakage vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2020-006964

DESCRIPTION

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. plural Intel(R) The product contains a vulnerability related to information leakage.Information may be obtained. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. ========================================================================== Ubuntu Security Notice USN-5617-1 September 19, 2022 xen vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in Xen. Software Description: - xen: Public headers and libs for Xen Details: It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543) Julien Grall discovered that Xen incorrectly handled memory barriers on ARM-based systems. An attacker could possibly use this issue to cause a denial of service, obtain sensitive information or escalate privileges. (CVE-2020-11739) Ilja Van Sprundel discovered that Xen incorrectly handled profiling of guests. An unprivileged attacker could use this issue to obtain sensitive information from other guests, cause a denial of service or possibly gain privileges. (CVE-2020-11740, CVE-2020-11741) It was discovered that Xen incorrectly handled grant tables. A malicious guest could possibly use this issue to cause a denial of service. (CVE-2020-11742, CVE-2020-11743) Jan Beulich discovered that Xen incorrectly handled certain code paths. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-15563) Julien Grall discovered that Xen incorrectly verified memory addresses provided by the guest on ARM-based systems. A malicious guest administrator could possibly use this issue to cause a denial of service. (CVE-2020-15564) Roger Pau Monn\xe9 discovered that Xen incorrectly handled caching on x86 Intel systems. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-15565) It was discovered that Xen incorrectly handled error in event-channel port allocation. A malicious guest could possibly use this issue to cause a denial of service. (CVE-2020-15566) Jan Beulich discovered that Xen incorrectly handled certain EPT (Extended Page Tables). An attacker could possibly use this issue to cause a denial of service, data corruption or privilege escalation. (CVE-2020-15567) Andrew Cooper discovered that Xen incorrectly handled PCI passthrough. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-25595) Andrew Cooper discovered that Xen incorrectly sanitized path injections. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-25596) Jan Beulich discovered that Xen incorrectly handled validation of event channels. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-25597) Julien Grall and Jan Beulich discovered that Xen incorrectly handled resetting event channels. An attacker could possibly use this issue to cause a denial of service or obtain sensitive information. (CVE-2020-25599) Julien Grall discovered that Xen incorrectly handled event channels memory allocation on 32-bits domains. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-25600) Jan Beulich discovered that Xen incorrectly handled resetting or cleaning up event channels. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-25601) Andrew Cooper discovered that Xen incorrectly handled certain Intel specific MSR (Model Specific Registers). An attacker could possibly use this issue to cause a denial of service. (CVE-2020-25602) Julien Grall discovered that Xen incorrectly handled accessing/allocating event channels. An attacker could possibly use this issue to cause a denial of service, obtain sensitive information of privilege escalation. (CVE-2020-25603) Igor Druzhinin discovered that Xen incorrectly handled locks. An attacker could possibly use this issue to cause a denial of service. (CVE-2020-25604) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: libxendevicemodel1 4.11.3+24-g14b62ab3e5-1ubuntu2.3 libxenevtchn1 4.11.3+24-g14b62ab3e5-1ubuntu2.3 libxengnttab1 4.11.3+24-g14b62ab3e5-1ubuntu2.3 libxenmisc4.11 4.11.3+24-g14b62ab3e5-1ubuntu2.3 xen-hypervisor-4.11-amd64 4.11.3+24-g14b62ab3e5-1ubuntu2.3 xen-hypervisor-4.11-arm64 4.11.3+24-g14b62ab3e5-1ubuntu2.3 xen-hypervisor-4.11-armhf 4.11.3+24-g14b62ab3e5-1ubuntu2.3 xen-utils-4.11 4.11.3+24-g14b62ab3e5-1ubuntu2.3 xen-utils-common 4.11.3+24-g14b62ab3e5-1ubuntu2.3 xenstore-utils 4.11.3+24-g14b62ab3e5-1ubuntu2.3 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5617-1 CVE-2020-0543, CVE-2020-11739, CVE-2020-11740, CVE-2020-11741, CVE-2020-11742, CVE-2020-11743, CVE-2020-15563, CVE-2020-15564, CVE-2020-15565, CVE-2020-15566, CVE-2020-15567, CVE-2020-25595, CVE-2020-25596, CVE-2020-25597, CVE-2020-25599, CVE-2020-25600, CVE-2020-25601, CVE-2020-25602, CVE-2020-25603, CVE-2020-25604 Package Information: https://launchpad.net/ubuntu/+source/xen/4.11.3+24-g14b62ab3e5-1ubuntu2.3 . * Avoid temporary file creation, used for here-documents in check_caveats. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: USN-4385-1 provided updated Intel Processor Microcode. Unfortunately, that update prevented certain processors in the Intel Skylake family (06_4EH) from booting successfully. Additonally, on Ubuntu 20.04 LTS, late loading of microcode was enabled, which could lead to system instability. Please note that the 'dis_ucode_ldr' kernel command line option can be added in the boot menu to disable microcode loading for system recovery. We apologize for the inconvenience. (CVE-2020-0548) It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2020:2771-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:2771 Issue date: 2020-06-30 CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 ==================================================================== 1. Summary: An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.4 Advances Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Server AUS (v. 7.4) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.4) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.4) - x86_64 3. Description: Security Fix(es): * hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) * hw: L1D Cache Eviction Sampling (CVE-2020-0549) * hw: Vector Register Data Sampling (CVE-2020-0548) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Update Intel CPU microcode to microcode-20200609 release: - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f up to 0x621; - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718 up to 0x71a; - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28; - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e up to 0x2f; - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25 up to 0x26; - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c; - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21 up to 0x22; - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6 up to 0xdc; - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151 up to 0x1000157; - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065 up to 0x2006906; - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c up to 0x4002f01; - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c up to 0x5002f01; - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6 up to 0xdc; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46 up to 0x78; - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode from revision 0xca up to 0xd6; - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca up to 0xd6; - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6. * Do not update 06-4e-03 (SKL-U/Y) and 06-5e-03 (SKL-H/S/Xeon E3 v5) to revision 0xdc, use 0xd6 by default. * Enable 06-2d-07 (SNB-E/EN/EP) caveat by default. * Enable 06-55-04 (SKL-SP/X/W) caveat by default. * Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script. * Re-generate initramfs not only for the currently running kernel, but for several recently installed kernels as well. * Change the URL in the intel-microcode2ucode.8 to point to the GitHub repository since the microcode download section at Intel Download Center does not exist anymore. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1849061 - [rhel-7.4.z] Enable SNB-EP caveat by default 6. Package List: Red Hat Enterprise Linux Server AUS (v. 7.4): Source: microcode_ctl-2.1-22.32.el7_4.src.rpm x86_64: microcode_ctl-2.1-22.32.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.32.el7_4.x86_64.rpm Red Hat Enterprise Linux Server E4S (v. 7.4): Source: microcode_ctl-2.1-22.32.el7_4.src.rpm x86_64: microcode_ctl-2.1-22.32.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.32.el7_4.x86_64.rpm Red Hat Enterprise Linux Server TUS (v. 7.4): Source: microcode_ctl-2.1-22.32.el7_4.src.rpm x86_64: microcode_ctl-2.1-22.32.el7_4.x86_64.rpm microcode_ctl-debuginfo-2.1-22.32.el7_4.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXvsshdzjgjWX9erEAQgX/A/+JMPvZ7Yd2pxBU4uxBjmUx6B2pNMLLn0V HJnb8yuhEjZI5dcG1Dt3Uo/rNXV7iNFX2SQxjUV7MSL0JNJp6PfuJB2tyN4X80cZ 399yb47HJdLcnX2B0fB11FxNF4+cgf4qsGKx+5RX80CDFkwAsjVe5CvoLV9Mi77B fWNlbeccJCEEN9P+v9fpozf13eD8mucqCoWZIRhFRJJgohO2Q+szz9oZRGMXHI2O hI3IbWXj26jovWgvj0Kscy17YyqccMDgOlOXhTR4KtP3vw5F5ebVrsBOh1P36K4l rUeux8tAWhJnSlt9IX+Fw8YFA/aiVZWEhyxsOGCBDYA4YwhHpBoZG4jwEEnpG8qI YKcYm/Q1mq4cZs0nlyuFEebqaItO+x06T//hWvdaYgUXnORDADxurSs+UJoykbkW DxAIqA2oldF/QJp/1vMTwPqJSLxt+0BOXtSBKaFw9YXRql8dxLkY0ItD+UUAzs8R nV8YK8t+owpGShIsk13BmMYi7FEcqUK8U/KSYpW96Qw4GP+RM2lddewEI9mpZnqg kVjS0xZ2fKIkbVNHnMlGx3PhVcJznhpj1UEbz3fwNgambSMofBPfbEBBtQxv8sDG Z0bl4NjqZVQxSyHLEEx1sAiXpJZXRTuxL/uRpZLFVxFvkglIC4ZLT6DHl2pJKQqx WnZ1F8Y/iFA=CtiE -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Summary: Updated microcode_ctl packages that fix several security bugs and add various enhancements are now available. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-azure: Linux kernel for Microsoft Azure Cloud systems - linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems - linux-kvm: Linux kernel for cloud environments - linux-oracle: Linux kernel for Oracle Cloud systems Details: It was discovered that the F2FS file system implementation in the Linux kernel did not properly perform bounds checking on xattrs in some situations. (CVE-2020-0543) Piotr Krysiuk discovered that race conditions existed in the file system implementation in the Linux kernel. (CVE-2020-12114) It was discovered that the USB susbsystem's scatter-gather implementation in the Linux kernel did not properly take data references in some situations, leading to a use-after-free. (CVE-2020-12464) Bui Quang Minh discovered that the XDP socket implementation in the Linux kernel did not properly validate meta-data passed from user space, leading to an out-of-bounds write vulnerability. (CVE-2020-12659) Dmitry Vyukov discovered that the SELinux netlink security hook in the Linux kernel did not validate messages in some situations. The kernel update for this issue provides the ability to disable the mitigation and to report vulnerability status. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well

Trust: 2.34

sources: NVD: CVE-2020-0543 // JVNDB: JVNDB-2020-006964 // VULHUB: VHN-161977 // PACKETSTORM: 168421 // PACKETSTORM: 158183 // PACKETSTORM: 158010 // PACKETSTORM: 158039 // PACKETSTORM: 158250 // PACKETSTORM: 158197 // PACKETSTORM: 158012

AFFECTED PRODUCTS

vendor:intelmodel:core i3-3217uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:19.10

Trust: 1.0

vendor:intelmodel:core i7-8705gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium a1018 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6310uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1037uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i7-8569uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1000mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3229yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2146gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2184gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2286mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8709gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477e proscope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i7-7700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3840qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3865uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic itp1000scope:ltversion:23.01.08

Trust: 1.0

vendor:intelmodel:celeron 2957uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1020mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3689yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4402ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3520mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2174gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-7y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6567uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3439yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4030yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4258uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3555lescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1290 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1246 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8350kscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:lteversion:2.3.1

Trust: 1.0

vendor:intelmodel:pentium g5400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1271 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3360mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc627dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i7-3612qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m6scope:ltversion:26.01.07

Trust: 1.0

vendor:intelmodel:xeon e3-1505l v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4288uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4810mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 927uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y70scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1545m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4350uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1258l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5015uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7102escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-8950hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2981uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4020yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3350pscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5575rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 5305uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3610mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105c v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2244gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5010uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1105cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1281 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1515m v5scope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.1

Trust: 1.0

vendor:intelmodel:celeron 1020escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2124gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5005uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3635qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5750hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4785tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2234scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3317uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5600scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:18.04

Trust: 1.0

vendor:intelmodel:core m7-6y75scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4360tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3217uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 725cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4012yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4860hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8259uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc427escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:xeon e3-1505m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6360uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3320mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y10ascope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1019yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3765uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3225scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3210mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium gold 6405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1278l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3667uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3825uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2140 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6267uscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:gteversion:2.0.0

Trust: 1.0

vendor:intelmodel:celeron g1610scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9600kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4760hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-6y30scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1558l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3902escope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4278uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7110uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m5scope:ltversion:22.01.08

Trust: 1.0

vendor:intelmodel:core i5-4690sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8400tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3205uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8265uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1820tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3940xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 2980uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3920tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4158uscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:20.04

Trust: 1.0

vendor:intelmodel:core i9-9900kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1501m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2284gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3556uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3227uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1578l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3920xmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4220yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4300yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4900mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4370tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9880hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1245 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m5-6y57scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8809gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y51scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6822eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2100t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4100uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1286l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9900kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2129y v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1225 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1260l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2030m v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc527gscope:ltversion:1.4.0

Trust: 1.0

vendor:intelmodel:core 9750hfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3450sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m3-8100yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4410yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 1405 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3560mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2126gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g5420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2010 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770tscope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:12.04

Trust: 1.0

vendor:intelmodel:pentium g2130 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3230mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1241 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1850scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10210yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1017uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3220scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477escope:ltversion:21.01.14

Trust: 1.0

vendor:intelmodel:core i3-4110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8850hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4308uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4130tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1047uescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5157uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7267uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3632qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4120uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4202yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2020m v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3260tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2288gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-i3-8100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700hqscope:eqversion: -

Trust: 1.0

vendor:opensusemodel:leapscope:eqversion:15.2

Trust: 1.0

vendor:intelmodel:celeron g3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3612qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2127u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3820qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3537uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1125cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 4415yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6300tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3380mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1575m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5257uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2134scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4590sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6770hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6350hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1235l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4440scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5557uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500bscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4765tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mlscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3755uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6400scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4710mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-2115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4025uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100escope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176mscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547gscope:ltversion:r1.28.0

Trust: 1.0

vendor:intelmodel:celeron g1840scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4150scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8145uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6260uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4722hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7740xscope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:31

Trust: 1.0

vendor:intelmodel:core i5-10210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i9-9980hkscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic field pg m4scope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron g1840tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1610tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6600uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3610qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3615qescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4900tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4980hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3955uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4558uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gelscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224gscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core 8269uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3805uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820hkscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mescope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:14.04

Trust: 1.0

vendor:intelmodel:xeon e3-1270scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3115cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3240scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4670tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7660uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1630scope:eqversion: -

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:32

Trust: 1.0

vendor:intelmodel:core i5-3475sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6200uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1226 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1280 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3330sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core 9300hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8565uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b925cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2236scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7120tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265lscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3470tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4170tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702ecscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium b915cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6920hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8670scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4578uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-9700kfscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3460tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g5420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2144gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2136scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7101escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4870hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3240tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2224scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3120mescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-7820eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3540mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-10510yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4330scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4520tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc647dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core m-5y3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 2970mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8706gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1007uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4790scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8559uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4700mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4690scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2274gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3550scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3258scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-9400fscope:eqversion: -

Trust: 1.0

vendor:mcafeemodel:threat intelligence exchange serverscope:eqversion:3.0.0

Trust: 1.0

vendor:intelmodel:core i5-3437uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4702hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3517uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2276mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3770sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6210uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4712hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6100tescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6320scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460tscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc827dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-6167uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5287uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc847escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:celeron g1820scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1585 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3570sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8305gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2120 v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2246gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1270 v2scope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc3000 smartscope:ltversion:1.b

Trust: 1.0

vendor:intelmodel:core i5-6442eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4800mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5250uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7640xscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2278gescope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6440hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6300hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3440tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1268l v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8650scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1276 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1240 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v5scope:eqversion: -

Trust: 1.0

vendor:canonicalmodel:ubuntu linuxscope:eqversion:16.04

Trust: 1.0

vendor:intelmodel:core i3-3130mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1220l v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g4930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3110mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8750hscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc347escope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i5-10310yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4570tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2020t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1231 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3720qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3687uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4escope:eqversion:*

Trust: 1.0

vendor:intelmodel:pentium g3470scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3561yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-6600kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1230 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5850eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4910mqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3630qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3427uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1565l v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6700kscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-6970hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8200yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8365uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4430scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4960hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7130uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1830scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4350tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8560uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g1620scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2176gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 3965uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8550uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core m-5y71scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8600tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4720hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron 1005mscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3337uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1275 v5scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8109uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-10110yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-7100hscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 4415uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1265l v4scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 2117u v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7y54scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4610yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5006uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simotion p320-4sscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core 5405uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-8300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1285 v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4510uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-3339yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5700eqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2186gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4770scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8665uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2254mlscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc677escope:ltversion:25.02.06

Trust: 1.0

vendor:intelmodel:core i5-4302yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3245scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-3740qmscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-4460sscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-3250tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4160scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e-2226gscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-8350uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc477dscope:eqversion:*

Trust: 1.0

vendor:intelmodel:core i3-8000tscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5775rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4650uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron g3930escope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4950hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g4420scope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1535m v6scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-7287uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium 3215uscope:eqversion: -

Trust: 1.0

vendor:siemensmodel:simatic ipc547escope:eqversion:*

Trust: 1.0

vendor:intelmodel:celeron 3855uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4850hqscope:eqversion: -

Trust: 1.0

vendor:intelmodel:xeon e3-1221 v3scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-8500yscope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g2030t v2scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-4340scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-5500uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i5-5675rscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i7-4771scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium g3220scope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-5020uscope:eqversion: -

Trust: 1.0

vendor:intelmodel:core i3-6102escope:eqversion: -

Trust: 1.0

vendor:インテルmodel:celeron 1005mscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1020mscope: - version: -

Trust: 0.8

vendor:canonicalmodel:ubuntuscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1000mscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1017uscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1047uescope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 2955uscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1037uscope: - version: -

Trust: 0.8

vendor:fedoramodel:fedorascope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1020escope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1019yscope: - version: -

Trust: 0.8

vendor:opensusemodel:leapscope: - version: -

Trust: 0.8

vendor:日立model:日立アドバンストサーバscope: - version: -

Trust: 0.8

vendor:インテルmodel:celeron 1007uscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0543
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-0543
value: MEDIUM

Trust: 0.8

VULHUB: VHN-161977
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-161977
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-0543
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-0543
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-161977 // JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

PROBLEMTYPE DATA

problemtype:CWE-459

Trust: 1.1

problemtype:information leak (CWE-200) [NVD Evaluation ]

Trust: 0.8

problemtype:CWE-200

Trust: 0.1

sources: VULHUB: VHN-161977 // JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

THREAT TYPE

local

Trust: 0.3

sources: PACKETSTORM: 168421 // PACKETSTORM: 158010 // PACKETSTORM: 158012

TYPE

overflow, arbitrary, code execution

Trust: 0.1

sources: PACKETSTORM: 158010

PATCH

title:hitachi-sec-2021-208url:https://ubuntu.com/security/notices/USN-4385-1

Trust: 0.8

sources: JVNDB: JVNDB-2020-006964

EXTERNAL IDS

db:NVDid:CVE-2020-0543

Trust: 3.4

db:MCAFEEid:SB10318

Trust: 1.1

db:OPENWALLid:OSS-SECURITY/2020/07/14/5

Trust: 1.1

db:SIEMENSid:SSA-534763

Trust: 1.1

db:ICS CERTid:ICSA-20-252-07

Trust: 0.8

db:JVNid:JVNVU98979613

Trust: 0.8

db:JVNid:JVNVU94568336

Trust: 0.8

db:JVNDBid:JVNDB-2020-006964

Trust: 0.8

db:PACKETSTORMid:158183

Trust: 0.2

db:PACKETSTORMid:168421

Trust: 0.2

db:PACKETSTORMid:158010

Trust: 0.2

db:PACKETSTORMid:158039

Trust: 0.2

db:PACKETSTORMid:158250

Trust: 0.2

db:PACKETSTORMid:158197

Trust: 0.2

db:PACKETSTORMid:157993

Trust: 0.1

db:PACKETSTORMid:158015

Trust: 0.1

db:PACKETSTORMid:158198

Trust: 0.1

db:PACKETSTORMid:158189

Trust: 0.1

db:PACKETSTORMid:157997

Trust: 0.1

db:PACKETSTORMid:158008

Trust: 0.1

db:PACKETSTORMid:158005

Trust: 0.1

db:PACKETSTORMid:158237

Trust: 0.1

db:PACKETSTORMid:158355

Trust: 0.1

db:PACKETSTORMid:158238

Trust: 0.1

db:PACKETSTORMid:158190

Trust: 0.1

db:CNNVDid:CNNVD-202006-630

Trust: 0.1

db:VULHUBid:VHN-161977

Trust: 0.1

db:PACKETSTORMid:158012

Trust: 0.1

sources: VULHUB: VHN-161977 // PACKETSTORM: 168421 // PACKETSTORM: 158183 // PACKETSTORM: 158010 // PACKETSTORM: 158039 // PACKETSTORM: 158250 // PACKETSTORM: 158197 // PACKETSTORM: 158012 // JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-0543

Trust: 1.5

url:https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf

Trust: 1.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html

Trust: 1.1

url:http://www.openwall.com/lists/oss-security/2020/07/14/5

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html

Trust: 1.1

url:http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html

Trust: 1.1

url:https://usn.ubuntu.com/4385-1/

Trust: 1.1

url:https://usn.ubuntu.com/4387-1/

Trust: 1.1

url:https://usn.ubuntu.com/4388-1/

Trust: 1.1

url:https://usn.ubuntu.com/4389-1/

Trust: 1.1

url:https://usn.ubuntu.com/4390-1/

Trust: 1.1

url:https://usn.ubuntu.com/4391-1/

Trust: 1.1

url:https://usn.ubuntu.com/4392-1/

Trust: 1.1

url:https://usn.ubuntu.com/4393-1/

Trust: 1.1

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 1.0

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10318

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 1.0

url:https://jvn.jp/vu/jvnvu98979613/

Trust: 0.8

url:https://jvn.jp/vu/jvnvu94568336/

Trust: 0.8

url:https://us-cert.cisa.gov/ics/advisories/icsa-20-252-07

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-0548

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2020-0549

Trust: 0.4

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.3

url:https://access.redhat.com/security/team/contact/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-0549

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-0543

Trust: 0.3

url:https://bugzilla.redhat.com/):

Trust: 0.3

url:https://access.redhat.com/security/team/key/

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2020-0548

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.3

url:https://access.redhat.com/solutions/l1d-cache-eviction-and-vector-register-sampling

Trust: 0.3

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.3

url:https://access.redhat.com/solutions/5142691

Trust: 0.3

url:https://wiki.ubuntu.com/securityteam/knowledgebase/srbds

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10318

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/

Trust: 0.1

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-11742

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15567

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25596

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25601

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15566

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25597

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/xen/4.11.3+24-g14b62ab3e5-1ubuntu2.3

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15563

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15564

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15565

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25599

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5617-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25600

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-11739

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2677

Trust: 0.1

url:https://usn.ubuntu.com/4393-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12654

Trust: 0.1

url:https://launchpad.net/bugs/1883002

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.1

Trust: 0.1

url:https://usn.ubuntu.com/4385-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.2

Trust: 0.1

url:https://usn.ubuntu.com/4385-2

Trust: 0.1

url:https://launchpad.net/bugs/1882890,

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2771

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2020:2707

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.4.0-37.41

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1015.15

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12114

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0067

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1015.15

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12464

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12659

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1015.15

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1016.16

Trust: 0.1

url:https://usn.ubuntu.com/4389-1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10751

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1015.15

Trust: 0.1

sources: VULHUB: VHN-161977 // PACKETSTORM: 168421 // PACKETSTORM: 158183 // PACKETSTORM: 158010 // PACKETSTORM: 158039 // PACKETSTORM: 158250 // PACKETSTORM: 158197 // PACKETSTORM: 158012 // JVNDB: JVNDB-2020-006964 // NVD: CVE-2020-0543

CREDITS

Ubuntu

Trust: 0.4

sources: PACKETSTORM: 168421 // PACKETSTORM: 158010 // PACKETSTORM: 158039 // PACKETSTORM: 158012

SOURCES

db:VULHUBid:VHN-161977
db:PACKETSTORMid:168421
db:PACKETSTORMid:158183
db:PACKETSTORMid:158010
db:PACKETSTORMid:158039
db:PACKETSTORMid:158250
db:PACKETSTORMid:158197
db:PACKETSTORMid:158012
db:JVNDBid:JVNDB-2020-006964
db:NVDid:CVE-2020-0543

LAST UPDATE DATE

2026-04-18T21:49:14.743000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-161977date:2022-04-28T00:00:00
db:JVNDBid:JVNDB-2020-006964date:2022-03-11T06:10:00
db:NVDid:CVE-2020-0543date:2024-11-21T04:53:42.440

SOURCES RELEASE DATE

db:VULHUBid:VHN-161977date:2020-06-15T00:00:00
db:PACKETSTORMid:168421date:2022-09-19T18:26:25
db:PACKETSTORMid:158183date:2020-06-23T14:59:57
db:PACKETSTORMid:158010date:2020-06-10T15:08:12
db:PACKETSTORMid:158039date:2020-06-11T16:34:34
db:PACKETSTORMid:158250date:2020-06-30T18:04:33
db:PACKETSTORMid:158197date:2020-06-23T21:18:24
db:PACKETSTORMid:158012date:2020-06-10T15:08:41
db:JVNDBid:JVNDB-2020-006964date:2020-07-27T00:00:00
db:NVDid:CVE-2020-0543date:2020-06-15T14:15:11.207