Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intel:ethernet_network_adapter_e810-2cqda2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "459854C3-D982-47E5-8E1D-72B732BD7A5C", "versionEndExcluding": "1.7.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-2cqda2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DB31D15-0C95-4037-85FD-77B5964665A1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intel:ethernet_network_adapter_e810-cqda1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77C14DE6-4E3B-49AD-9F22-8F10D008FBC9", "versionEndExcluding": "1.7.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1:-:*:*:*:*:*:*:*", "matchCriteriaId": "87F3AB90-46C3-48DD-B0B4-4E036712ECCB", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intel:ethernet_network_adapter_e810-cqda1_for_ocp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29F34B82-C7E7-49A3-8161-54B902A4C6B0", "versionEndExcluding": "1.7.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1_for_ocp:-:*:*:*:*:*:*:*", "matchCriteriaId": "86F81244-F28E-416A-B3B6-7A1F79D8AC73", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intel:ethernet_network_adapter_e810-cqda1_for_ocp_3.0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65E2C711-5C67-422E-A2C7-DE6A4F720A22", "versionEndExcluding": "1.7.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda1_for_ocp_3.0:-:*:*:*:*:*:*:*", "matchCriteriaId": "F06D5B95-4DD0-4BEB-A32A-AAE300046670", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intel:ethernet_network_adapter_e810-cqda2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "665AC27E-47C6-4FEE-89BF-B394FA7CF247", "versionEndExcluding": "1.7.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2:-:*:*:*:*:*:*:*", "matchCriteriaId": "D582770B-4CCD-43A4-B218-FFD9AE530A24", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intel:ethernet_network_adapter_e810-cqda2_for_ocp_3.0_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD7F8FB6-EBE0-4CBA-9BDE-3E398A1AF5EB", "versionEndExcluding": "1.7.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2_for_ocp_3.0:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA63976A-922C-4E50-8D69-D7F6A62AD31E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:intel:ethernet_network_adapter_e810-cqda2t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4600F6C7-8055-4834-8173-9FDB840268D7", "versionEndExcluding": "1.7.1", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:intel:ethernet_network_adapter_e810-cqda2t:-:*:*:*:*:*:*:*", "matchCriteriaId": "66EDE48D-7049-4BBB-B24A-3CEA9BAA3B27", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Out-of-bounds read in the firmware for some Intel(R) E810 Ethernet Controllers and Adapters before version 1.7.1 may allow an unauthenticated user to potentially enable denial of service via adjacent access."}, {"lang": "es", "value": "La lectura fuera de los l\u00edmites en el firmware de Intel(R) E810 Ethernet Controllers and Adapters anteriores a la versi\u00f3n 1.7.1 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente."}], "id": "CVE-2023-28376", "lastModified": "2024-11-21T07:54:57.110", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "secure@intel.com", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2023-11-14T19:15:21.793", "references": [{"source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20231221-0007/"}, {"source": "secure@intel.com", "tags": ["Vendor Advisory"], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00869.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20231221-0007/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00869.html"}], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-125"}], "source": "secure@intel.com", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-125"}], "source": "nvd@nist.gov", "type": "Primary"}]}