Intel Atom Exposure of Sensitive Information to an Unauthorized Actor

medium Nessus Plugin ID 500248

Description

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Solution

Refer to vendor advisory for Security Updates

See Also

http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html

http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html

http://support.lenovo.com/us/en/solutions/LEN-22133

http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html

http://www.openwall.com/lists/oss-security/2020/06/10/1

http://www.openwall.com/lists/oss-security/2020/06/10/2

http://www.openwall.com/lists/oss-security/2020/06/10/5

http://www.securityfocus.com/bid/104232

http://www.securitytracker.com/id/1040949

http://www.securitytracker.com/id/1042004

http://xenbits.xen.org/xsa/advisory-263.html

https://access.redhat.com/errata/RHSA-2018:1629

https://access.redhat.com/errata/RHSA-2018:1630

https://access.redhat.com/errata/RHSA-2018:1632

https://access.redhat.com/errata/RHSA-2018:1633

https://access.redhat.com/errata/RHSA-2018:1635

https://access.redhat.com/errata/RHSA-2018:1636

https://access.redhat.com/errata/RHSA-2018:1637

https://access.redhat.com/errata/RHSA-2018:1638

https://access.redhat.com/errata/RHSA-2018:1639

https://access.redhat.com/errata/RHSA-2018:1640

https://access.redhat.com/errata/RHSA-2018:1641

https://access.redhat.com/errata/RHSA-2018:1642

https://access.redhat.com/errata/RHSA-2018:1643

https://access.redhat.com/errata/RHSA-2018:1644

https://access.redhat.com/errata/RHSA-2018:1645

https://access.redhat.com/errata/RHSA-2018:1646

https://access.redhat.com/errata/RHSA-2018:1647

https://access.redhat.com/errata/RHSA-2018:1648

https://access.redhat.com/errata/RHSA-2018:1649

https://access.redhat.com/errata/RHSA-2018:1650

https://access.redhat.com/errata/RHSA-2018:1651

https://access.redhat.com/errata/RHSA-2018:1652

https://access.redhat.com/errata/RHSA-2018:1653

https://access.redhat.com/errata/RHSA-2018:1654

https://access.redhat.com/errata/RHSA-2018:1655

https://access.redhat.com/errata/RHSA-2018:1656

https://access.redhat.com/errata/RHSA-2018:1657

https://access.redhat.com/errata/RHSA-2018:1658

https://access.redhat.com/errata/RHSA-2018:1659

https://access.redhat.com/errata/RHSA-2018:1660

https://access.redhat.com/errata/RHSA-2018:1661

https://access.redhat.com/errata/RHSA-2018:1662

https://access.redhat.com/errata/RHSA-2018:1663

https://access.redhat.com/errata/RHSA-2018:1664

https://access.redhat.com/errata/RHSA-2018:1665

https://access.redhat.com/errata/RHSA-2018:1666

https://access.redhat.com/errata/RHSA-2018:1667

https://access.redhat.com/errata/RHSA-2018:1668

https://access.redhat.com/errata/RHSA-2018:1669

https://access.redhat.com/errata/RHSA-2018:1674

https://access.redhat.com/errata/RHSA-2018:1675

https://access.redhat.com/errata/RHSA-2018:1676

https://access.redhat.com/errata/RHSA-2018:1686

https://access.redhat.com/errata/RHSA-2018:1688

https://access.redhat.com/errata/RHSA-2018:1689

https://access.redhat.com/errata/RHSA-2018:1690

https://access.redhat.com/errata/RHSA-2018:1696

https://access.redhat.com/errata/RHSA-2018:1710

https://access.redhat.com/errata/RHSA-2018:1711

https://access.redhat.com/errata/RHSA-2018:1737

https://access.redhat.com/errata/RHSA-2018:1738

https://access.redhat.com/errata/RHSA-2018:1826

https://access.redhat.com/errata/RHSA-2018:1854

https://access.redhat.com/errata/RHSA-2018:1965

https://access.redhat.com/errata/RHSA-2018:1967

https://access.redhat.com/errata/RHSA-2018:1997

https://access.redhat.com/errata/RHSA-2018:2001

https://access.redhat.com/errata/RHSA-2018:2003

https://access.redhat.com/errata/RHSA-2018:2006

https://access.redhat.com/errata/RHSA-2018:2060

https://access.redhat.com/errata/RHSA-2018:2161

https://access.redhat.com/errata/RHSA-2018:2162

https://access.redhat.com/errata/RHSA-2018:2164

https://access.redhat.com/errata/RHSA-2018:2171

https://access.redhat.com/errata/RHSA-2018:2172

https://access.redhat.com/errata/RHSA-2018:2216

https://access.redhat.com/errata/RHSA-2018:2228

https://access.redhat.com/errata/RHSA-2018:2246

https://access.redhat.com/errata/RHSA-2018:2250

https://access.redhat.com/errata/RHSA-2018:2258

https://access.redhat.com/errata/RHSA-2018:2289

https://access.redhat.com/errata/RHSA-2018:2309

https://access.redhat.com/errata/RHSA-2018:2328

https://access.redhat.com/errata/RHSA-2018:2363

https://access.redhat.com/errata/RHSA-2018:2364

https://access.redhat.com/errata/RHSA-2018:2387

https://access.redhat.com/errata/RHSA-2018:2394

https://access.redhat.com/errata/RHSA-2018:2396

https://access.redhat.com/errata/RHSA-2018:2948

https://access.redhat.com/errata/RHSA-2018:3396

https://access.redhat.com/errata/RHSA-2018:3397

https://access.redhat.com/errata/RHSA-2018:3398

https://access.redhat.com/errata/RHSA-2018:3399

https://access.redhat.com/errata/RHSA-2018:3400

https://access.redhat.com/errata/RHSA-2018:3401

https://access.redhat.com/errata/RHSA-2018:3402

https://access.redhat.com/errata/RHSA-2018:3407

https://access.redhat.com/errata/RHSA-2018:3423

https://access.redhat.com/errata/RHSA-2018:3424

https://access.redhat.com/errata/RHSA-2018:3425

https://access.redhat.com/errata/RHSA-2019:0148

https://access.redhat.com/errata/RHSA-2019:1046

https://bugs.chromium.org/p/project-zero/issues/detail?id=1528

https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf

https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0

https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html

https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html

https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html

https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html

https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html

https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html

https://nvidia.custhelp.com/app/answers/detail/a_id/4787

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004

https://seclists.org/bugtraq/2019/Jun/36

https://security.netapp.com/advisory/ntap-20180521-0001/

https://support.citrix.com/article/CTX235225

https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us

https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel

https://usn.ubuntu.com/3651-1/

https://usn.ubuntu.com/3652-1/

https://usn.ubuntu.com/3653-1/

https://usn.ubuntu.com/3653-2/

https://usn.ubuntu.com/3654-1/

https://usn.ubuntu.com/3654-2/

https://usn.ubuntu.com/3655-1/

https://usn.ubuntu.com/3655-2/

https://usn.ubuntu.com/3679-1/

https://usn.ubuntu.com/3680-1/

https://usn.ubuntu.com/3756-1/

https://usn.ubuntu.com/3777-3/

https://www.debian.org/security/2018/dsa-4210

https://www.debian.org/security/2018/dsa-4273

https://www.exploit-db.com/exploits/44695/

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html

https://www.kb.cert.org/vuls/id/180049

https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006

https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html

https://www.synology.com/support/security/Synology_SA_18_23

https://www.us-cert.gov/ncas/alerts/TA18-141A

Plugin Details

Severity: Medium

ID: 500248

File Name: ot_500248.nasl

Version: 1.0

Type: local

Family: SCADA

Published: 11/8/2019

Updated: 11/8/2019

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-3639

CVSS v2.0

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N

CVSS v3.0

Base Score: 5.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Vulnerability Information

CPE: cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*, cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*, cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*, cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*, cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*, cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*, cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*, cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*, cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*, cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*, cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*, cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*, cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*, cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*, cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*, cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*, cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*, cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*, cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*, cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*, cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*, cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*, cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*, cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*, cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*, cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*, cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*, cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*, cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*, cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*, cpe:2.3:o:redhat:virtualization:4.2:*:*:*:*:*:*:*, cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*, cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*, cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*, cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*, cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*, cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*, cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*, cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*, cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*, cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*, cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*, cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*, cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*, cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*, cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*, cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*, cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*, cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*, cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*, cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*, cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*, cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*, cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*, cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*, cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*, cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*, cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*, cpe:2.3:a:sonicwall:sonicosv:-:*:*:*:*:*:*:*, cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*, cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*

Patch Publication Date: 5/22/2018

Vulnerability Publication Date: 5/22/2018

Reference Information

CVE: CVE-2018-3639