Vulnerability Name:
CVE-2020-24489 (CCN-203350)
Assigned:
2020-08-19
Published:
2021-06-08
Updated:
2022-04-06
Summary:
Incomplete cleanup in some Intel(R) VT-d products may allow an authenticated user to potentially enable escalation of privilege via local access.
CVSS v3 Severity:
8.8 High
(CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
)
7.7 High
(Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
8.8 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
)
7.7 High
(CCN Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
8.8 High
(REDHAT CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
)
7.7 High
(REDHAT Temporal CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
4.6 Medium
(CVSS v2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
6.8 Medium
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:S/C:C/I:C/A:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-459
Vulnerability Consequences:
Gain Privileges
References:
Source: MITRE
Type: CNA
CVE-2020-24489
Source: XF
Type: UNKNOWN
intel-cve202024489-priv-esc(203350)
Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update
Source: CCN
Type: Lenovo Security Advisory: LEN-62742
Multi-vendor BIOS Security Vulnerabilities (June 2021)
Source: DEBIAN
Type: Third Party Advisory
DSA-4934
Source: CCN
Type: IBM Security Bulletin 6501139 (QRadar Network Packet Capture Software)
Kernel as used by IBM QRadar Network Packet Capture contains multiple vulnerabilities
Source: CCN
Type: IBM Security Bulletin 6520482 (QRadar SIEM)
Linux Kernel as used by IBM QRadar SIEM contains multiple vulnerabilities
Source: CCN
Type: INTEL-SA-00442
2021.1 IPU - Intel VT-d Advisory
Source: MISC
Type: Vendor Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00442.html
Vulnerable Configuration:
Configuration 1
:
cpe:/h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j1750:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j1800:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j1850:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j1900:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j3060:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j3160:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j3355:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j3455:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j4005:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j4025:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j4105:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j4115:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j4125:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j6412:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_j6413:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2805:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2806:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2807:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2808:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2810:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2815:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2820:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2830:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2840:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2910:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2920:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2930:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n2940:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3000:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3010:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3050:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3060:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3150:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3160:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3350:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n3450:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n4000:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n4000c:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n4020:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n4020c:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n4100:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n4120:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n4500:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n4505:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n5095:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n5100:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n5105:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n6210:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:celeron_n6211:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10100:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10100e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10100f:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10100t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10100te:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10100y:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10105:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10105f:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10105t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10110u:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10110y:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10300:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10300t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10305:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10305t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10320:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-10325:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-11100b:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10200h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10210u:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10210y:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10300h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10310u:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10310y:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10400:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10400f:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10400h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10400t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10500:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10500e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10500h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10500t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10500te:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10505:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10600:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10600k:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-10600t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11260h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11300h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11320h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11400:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11400f:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11400h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11400t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11500:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11500b:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11500h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11500t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11600:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11600k:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-11600t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10510u:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10510y:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10610u:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10700:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10700e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10700f:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10700k:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10700t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10700te:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10710u:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10750h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10810u:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10850h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10870h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-10875h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11370h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11375h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11390h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11700:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11700b:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11700f:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11700k:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11700t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11800h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-11850h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10850k:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10885h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10900:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10900e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10900f:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10900k:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10900t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10900te:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10910:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11900:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11900f:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11900h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11900k:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11900t:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11950h:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_j2850:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_j2900:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_j3710:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_j4205:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_j6426:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n3510:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n3520:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n3530:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n3540:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n3700:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n3710:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n4200:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_n6415:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*
OR
cpe:/h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*
Configuration 2
:
cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
OR
cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Configuration RedHat 1
:
cpe:/o:redhat:rhel_els:6:*:*:*:*:*:*:*
Configuration RedHat 2
:
cpe:/o:redhat:enterprise_linux:7:*:*:*:*:*:*:*
Configuration RedHat 3
:
cpe:/o:redhat:enterprise_linux:7::client:*:*:*:*:*
Configuration RedHat 4
:
cpe:/o:redhat:enterprise_linux:7::computenode:*:*:*:*:*
Configuration RedHat 5
:
cpe:/o:redhat:enterprise_linux:7::server:*:*:*:*:*
Configuration RedHat 6
:
cpe:/o:redhat:enterprise_linux:7::workstation:*:*:*:*:*
Configuration RedHat 7
:
cpe:/o:redhat:enterprise_linux:8:*:*:*:*:*:*:*
Configuration RedHat 8
:
cpe:/o:redhat:enterprise_linux:8::baseos:*:*:*:*:*
Configuration CCN 1
:
cpe:/a:ibm:qradar_security_information_and_event_manager:7.3:*:*:*:*:*:*:*
OR
cpe:/a:ibm:qradar_security_information_and_event_manager:7.4:-:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.opensuse.security:def:7821
P
ucode-intel-20230214-150200.21.1 on GA media (Moderate)
2023-06-12
oval:org.opensuse.security:def:718
P
Security update for java-1_8_0-ibm (Important)
2022-08-31
oval:org.opensuse.security:def:3619
P
Security update for expat (Important)
2022-07-06
oval:org.opensuse.security:def:3435
P
at-3.1.14-8.6.1 on GA media (Moderate)
2022-06-28
oval:org.opensuse.security:def:3214
P
libmysqlclient18-10.0.40.1-2.9.1 on GA media (Moderate)
2022-06-28
oval:org.opensuse.security:def:94547
P
expat-2.4.4-150400.2.24 on GA media (Moderate)
2022-06-22
oval:org.opensuse.security:def:94844
P
ucode-intel-20220207-10.1 on GA media (Moderate)
2022-06-22
oval:org.opensuse.security:def:375
P
ucode-intel-20220207-10.1 on GA media (Moderate)
2022-06-10
oval:org.opensuse.security:def:99477
P
(Important)
2022-01-25
oval:org.opensuse.security:def:113549
P
ucode-intel-20210608-1.2 on GA media (Moderate)
2022-01-17
oval:org.opensuse.security:def:106940
P
ucode-intel-20210608-1.2 on GA media (Moderate)
2021-10-01
oval:org.opensuse.security:def:99676
P
(Important)
2021-09-03
oval:org.opensuse.security:def:99984
P
(Moderate)
2021-08-23
oval:com.redhat.rhsa:def:20213028
P
RHSA-2021:3028: microcode_ctl security, bug fix and enhancement update (Important)
2021-08-09
oval:org.opensuse.security:def:101260
P
cups-ddk-2.2.7-3.26.1 on GA media (Moderate)
2021-08-09
oval:com.redhat.rhsa:def:20213027
P
RHSA-2021:3027: microcode_ctl security, bug fix and enhancement update (Important)
2021-08-09
oval:org.opensuse.security:def:111575
P
Security update for ucode-intel (Important)
2021-07-10
oval:org.opensuse.security:def:40578
P
Security update for microcode_ctl (Important)
2021-06-28
oval:org.opensuse.security:def:41570
P
Security update for microcode_ctl (Important)
2021-06-28
oval:org.opensuse.security:def:45008
P
Security update for microcode_ctl (Important)
2021-06-28
oval:org.opensuse.security:def:46000
P
Security update for microcode_ctl (Important)
2021-06-28
oval:org.opensuse.security:def:38241
P
Security update for microcode_ctl (Important)
2021-06-28
oval:org.opensuse.security:def:111435
P
Security update for ucode-intel (Important)
2021-06-16
oval:org.opensuse.security:def:31197
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:60284
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:99278
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:56033
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:87406
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:73830
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:83297
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:8976
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:92527
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:125552
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:33668
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:69668
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:29381
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:58765
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:89404
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:51907
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:85661
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:97056
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:10099
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:93231
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:91942
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:42089
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:31637
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:64524
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:57020
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:88136
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:83417
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:9345
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:92726
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:126722
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:33926
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:69867
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:101449
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:30090
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:59491
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:98892
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:107926
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:55204
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:86101
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:97057
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:10278
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:8602
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:92137
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:32116
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:64708
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:23596
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:57460
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:88449
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:84158
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:9528
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:92925
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:127119
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:34461
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:70239
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:30210
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:59749
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:99087
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:55913
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:86580
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:73646
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:82588
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:8781
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:92328
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:117441
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:32942
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:69485
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:23919
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:57939
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:89146
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:51584
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:84616
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:97055
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:9727
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:93078
P
Security update for ucode-intel (Important)
2021-06-10
oval:org.opensuse.security:def:70418
P
Security update for ucode-intel (Important)
2021-06-10
oval:com.redhat.rhsa:def:20212299
P
RHSA-2021:2299: microcode_ctl security, bug fix and enhancement update (Important)
2021-06-09
oval:com.redhat.rhsa:def:20212305
P
RHSA-2021:2305: microcode_ctl security, bug fix and enhancement update (Important)
2021-06-09
oval:com.redhat.rhsa:def:20212308
P
RHSA-2021:2308: microcode_ctl security, bug fix and enhancement update (Important)
2021-06-09
BACK
intel
atom x5-e3930 -
intel
atom x5-e3940 -
intel
atom x7-e3950 -
intel
celeron j1750 -
intel
celeron j1800 -
intel
celeron j1850 -
intel
celeron j1900 -
intel
celeron j3060 -
intel
celeron j3160 -
intel
celeron j3355 -
intel
celeron j3355e -
intel
celeron j3455 -
intel
celeron j3455e -
intel
celeron j4005 -
intel
celeron j4025 -
intel
celeron j4105 -
intel
celeron j4115 -
intel
celeron j4125 -
intel
celeron j6412 -
intel
celeron j6413 -
intel
celeron n2805 -
intel
celeron n2806 -
intel
celeron n2807 -
intel
celeron n2808 -
intel
celeron n2810 -
intel
celeron n2815 -
intel
celeron n2820 -
intel
celeron n2830 -
intel
celeron n2840 -
intel
celeron n2910 -
intel
celeron n2920 -
intel
celeron n2930 -
intel
celeron n2940 -
intel
celeron n3000 -
intel
celeron n3010 -
intel
celeron n3050 -
intel
celeron n3060 -
intel
celeron n3150 -
intel
celeron n3160 -
intel
celeron n3350 -
intel
celeron n3350e -
intel
celeron n3450 -
intel
celeron n4000 -
intel
celeron n4000c -
intel
celeron n4020 -
intel
celeron n4020c -
intel
celeron n4100 -
intel
celeron n4120 -
intel
celeron n4500 -
intel
celeron n4505 -
intel
celeron n5095 -
intel
celeron n5100 -
intel
celeron n5105 -
intel
celeron n6210 -
intel
celeron n6211 -
intel
core i3-1000g1 -
intel
core i3-1000g4 -
intel
core i3-1000ng4 -
intel
core i3-1005g1 -
intel
core i3-10100 -
intel
core i3-10100e -
intel
core i3-10100f -
intel
core i3-10100t -
intel
core i3-10100te -
intel
core i3-10100y -
intel
core i3-10105 -
intel
core i3-10105f -
intel
core i3-10105t -
intel
core i3-10110u -
intel
core i3-10110y -
intel
core i3-10300 -
intel
core i3-10300t -
intel
core i3-10305 -
intel
core i3-10305t -
intel
core i3-10320 -
intel
core i3-10325 -
intel
core i3-11100b -
intel
core i3-1110g4 -
intel
core i3-1115g4 -
intel
core i3-1115g4e -
intel
core i3-1115gre -
intel
core i3-1120g4 -
intel
core i3-1125g4 -
intel
core i3-l13g4 -
intel
core i5-10200h -
intel
core i5-10210u -
intel
core i5-10210y -
intel
core i5-10300h -
intel
core i5-1030g4 -
intel
core i5-1030g7 -
intel
core i5-1030ng7 -
intel
core i5-10310u -
intel
core i5-10310y -
intel
core i5-1035g1 -
intel
core i5-1035g4 -
intel
core i5-1035g7 -
intel
core i5-1038ng7 -
intel
core i5-10400 -
intel
core i5-10400f -
intel
core i5-10400h -
intel
core i5-10400t -
intel
core i5-10500 -
intel
core i5-10500e -
intel
core i5-10500h -
intel
core i5-10500t -
intel
core i5-10500te -
intel
core i5-10505 -
intel
core i5-10600 -
intel
core i5-10600k -
intel
core i5-10600kf -
intel
core i5-10600t -
intel
core i5-11260h -
intel
core i5-11300h -
intel
core i5-1130g7 -
intel
core i5-11320h -
intel
core i5-1135g7 -
intel
core i5-11400 -
intel
core i5-11400f -
intel
core i5-11400h -
intel
core i5-11400t -
intel
core i5-1140g7 -
intel
core i5-1145g7 -
intel
core i5-1145g7e -
intel
core i5-1145gre -
intel
core i5-11500 -
intel
core i5-11500b -
intel
core i5-11500h -
intel
core i5-11500t -
intel
core i5-1155g7 -
intel
core i5-11600 -
intel
core i5-11600k -
intel
core i5-11600kf -
intel
core i5-11600t -
intel
core i5-l16g7 -
intel
core i7-10510u -
intel
core i7-10510y -
intel
core i7-1060g7 -
intel
core i7-1060ng7 -
intel
core i7-10610u -
intel
core i7-1065g7 -
intel
core i7-1068ng7 -
intel
core i7-10700 -
intel
core i7-10700e -
intel
core i7-10700f -
intel
core i7-10700k -
intel
core i7-10700kf -
intel
core i7-10700t -
intel
core i7-10700te -
intel
core i7-10710u -
intel
core i7-10750h -
intel
core i7-10810u -
intel
core i7-10850h -
intel
core i7-10870h -
intel
core i7-10875h -
intel
core i7-11370h -
intel
core i7-11375h -
intel
core i7-11390h -
intel
core i7-1160g7 -
intel
core i7-1165g7 -
intel
core i7-11700 -
intel
core i7-11700b -
intel
core i7-11700f -
intel
core i7-11700k -
intel
core i7-11700kf -
intel
core i7-11700t -
intel
core i7-11800h -
intel
core i7-1180g7 -
intel
core i7-11850h -
intel
core i7-1185g7 -
intel
core i7-1185g7e -
intel
core i7-1185gre -
intel
core i7-1195g7 -
intel
core i9-10850k -
intel
core i9-10885h -
intel
core i9-10900 -
intel
core i9-10900e -
intel
core i9-10900f -
intel
core i9-10900k -
intel
core i9-10900kf -
intel
core i9-10900t -
intel
core i9-10900te -
intel
core i9-10910 -
intel
core i9-10980hk -
intel
core i9-11900 -
intel
core i9-11900f -
intel
core i9-11900h -
intel
core i9-11900k -
intel
core i9-11900kb -
intel
core i9-11900kf -
intel
core i9-11900t -
intel
core i9-11950h -
intel
core i9-11980hk -
intel
pentium j2850 -
intel
pentium j2900 -
intel
pentium j3710 -
intel
pentium j4205 -
intel
pentium j6426 -
intel
pentium n3510 -
intel
pentium n3520 -
intel
pentium n3530 -
intel
pentium n3540 -
intel
pentium n3700 -
intel
pentium n3710 -
intel
pentium n4200 -
intel
pentium n4200e -
intel
pentium n6415 -
intel
pentium silver a1030 -
intel
pentium silver j5005 -
intel
pentium silver j5040 -
intel
pentium silver n5000 -
intel
pentium silver n5030 -
intel
pentium silver n6000 -
intel
pentium silver n6005 -
debian
debian linux 9.0
debian
debian linux 10.0
ibm
qradar security information and event manager 7.3
ibm
qradar security information and event manager 7.4 -