6.0
MEDIUM
CVE-2017-5703
Intel SPI Flash Configuration Denial of Service
Description

Configuration of SPI Flash in platforms based on multiple Intel platforms allow a local attacker to alter the behavior of the SPI flash potentially leading to a Denial of Service.

INFO

Published Date :

April 3, 2018, 9:29 p.m.

Last Modified :

Nov. 21, 2024, 3:28 a.m.

Remotely Exploitable :

No

Impact Score :

4.0

Exploitability Score :

1.5
Public PoC/Exploit Available at Github

CVE-2017-5703 has a 1 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2017-5703 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel core_i7-8550u
2 Intel core_i7-8559u
3 Intel core_i7-8650u
4 Intel core_i7-8700
5 Intel core_i7-8700b
6 Intel core_i7-8700k
7 Intel core_i7-8700t
8 Intel core_i7-8705g
9 Intel core_i7-8706g
10 Intel core_i7-8709g
11 Intel core_i7-8750h
12 Intel core_i7-8809g
13 Intel core_i7-8850h
14 Intel core_i7-7500u
15 Intel core_i7-7560u
16 Intel core_i7-7567u
17 Intel core_i7-7600u
18 Intel core_i7-7660u
19 Intel core_i7-7700
20 Intel core_i7-7700hq
21 Intel core_i7-7700k
22 Intel core_i7-7700t
23 Intel core_i7-7820eq
24 Intel core_i7-7820hk
25 Intel core_i7-7820hq
26 Intel core_i7-7920hq
27 Intel core_i7-7y75
28 Intel core_i7-6500u
29 Intel core_i7-6560u
30 Intel core_i7-6567u
31 Intel core_i7-6600u
32 Intel core_i7-6650u
33 Intel core_i7-6660u
34 Intel core_i7-6700
35 Intel core_i7-6700hq
36 Intel core_i7-6700k
37 Intel core_i7-6700t
38 Intel core_i7-6700te
39 Intel core_i7-6770hq
40 Intel core_i7-6785r
41 Intel core_i7-6820eq
42 Intel core_i7-6820hk
43 Intel core_i7-6820hq
44 Intel core_i7-6822eq
45 Intel core_i7-6870hq
46 Intel core_i7-6920hq
47 Intel core_i7-6970hq
48 Intel core_i7-5500u
49 Intel core_i7-5550u
50 Intel core_i7-5557u
51 Intel core_i7-5600u
52 Intel core_i7-5650u
53 Intel core_i7-5700eq
54 Intel core_i7-5700hq
55 Intel core_i7-5750hq
56 Intel core_i7-5775c
57 Intel core_i7-5775r
58 Intel core_i7-5850eq
59 Intel core_i7-5850hq
60 Intel core_i7-5950hq
61 Intel celeron_n2805
62 Intel celeron_n2806
63 Intel celeron_n2807
64 Intel celeron_n2808
65 Intel celeron_n2810
66 Intel celeron_n2815
67 Intel celeron_n2820
68 Intel celeron_n2830
69 Intel celeron_n2840
70 Intel celeron_n2920
71 Intel celeron_n3520
72 Intel pentium_n3520
73 Intel atom_x5-e3930
74 Intel atom_x5-e3940
75 Intel atom_x5-e8000
76 Intel atom_x5-z8300
77 Intel atom_x5-z8330
78 Intel atom_x5-z8350
79 Intel atom_x5-z8500
80 Intel atom_x5-z8550
81 Intel atom_x7-z8700
82 Intel atom_x7-z8750
83 Intel pentium_j3710
84 Intel pentium_n3700
85 Intel pentium_n3710
86 Intel celeron_j3060
87 Intel celeron_j3160
88 Intel celeron_j3355
89 Intel celeron_j3455
90 Intel pentium_j4205
91 Intel pentium_n4200
92 Intel celeron_n3350
93 Intel celeron_n3450
94 Intel atom_x7-e3950
95 Intel xeon_3104
96 Intel xeon_3106
97 Intel xeon_4108
98 Intel xeon_4109t
99 Intel xeon_4110
100 Intel xeon_4112
101 Intel xeon_4114
102 Intel xeon_4114t
103 Intel xeon_4116
104 Intel xeon_4116t
105 Intel xeon_5115
106 Intel xeon_5118
107 Intel xeon_5119t
108 Intel xeon_5120
109 Intel xeon_5120t
110 Intel xeon_5122
111 Intel xeon_6126
112 Intel xeon_6126f
113 Intel xeon_6126t
114 Intel xeon_6128
115 Intel xeon_6130
116 Intel xeon_6130f
117 Intel xeon_6130t
118 Intel xeon_6132
119 Intel xeon_6134
120 Intel xeon_6134m
121 Intel xeon_6136
122 Intel xeon_6138
123 Intel xeon_6138f
124 Intel xeon_6138t
125 Intel xeon_6140
126 Intel xeon_6140m
127 Intel xeon_6142
128 Intel xeon_6142f
129 Intel xeon_6142m
130 Intel xeon_6144
131 Intel xeon_6146
132 Intel xeon_6148
133 Intel xeon_6148f
134 Intel xeon_6150
135 Intel xeon_6152
136 Intel xeon_6154
137 Intel xeon_8153
138 Intel xeon_8156
139 Intel xeon_8158
140 Intel xeon_8160
141 Intel xeon_8160f
142 Intel xeon_8160m
143 Intel xeon_8160t
144 Intel xeon_8164
145 Intel xeon_8168
146 Intel xeon_8170
147 Intel xeon_8170m
148 Intel xeon_8176
149 Intel xeon_8176f
150 Intel xeon_8176m
151 Intel xeon_8180
152 Intel xeon_8180m
153 Intel xeon_e3-1220_v6
154 Intel xeon_e3-1225_v6
155 Intel xeon_e3-1230_v6
156 Intel xeon_e3-1240_v6
157 Intel xeon_e3-1245_v6
158 Intel xeon_e3-1270_v6
159 Intel xeon_e3-1275_v6
160 Intel xeon_e3-1280_v6
161 Intel xeon_e3-1285_v6
162 Intel xeon_e3-1501l_v6
163 Intel xeon_e3-1501m_v6
164 Intel xeon_e3-1505l_v6
165 Intel xeon_e3-1505m_v6
166 Intel xeon_e3-1535m_v6
167 Intel xeon_e3-1220_v5
168 Intel xeon_e3-1225_v5
169 Intel xeon_e3-1230_v5
170 Intel xeon_e3-1235l_v5
171 Intel xeon_e3-1240_v5
172 Intel xeon_e3-1240l_v5
173 Intel xeon_e3-1245_v5
174 Intel xeon_e3-1260l_v5
175 Intel xeon_e3-1268l_v5
176 Intel xeon_e3-1270_v5
177 Intel xeon_e3-1275_v5
178 Intel xeon_e3-1280_v5
179 Intel xeon_e3-1505l_v5
180 Intel xeon_e3-1505m_v5
181 Intel xeon_e3-1515m_v5
182 Intel xeon_e3-1535m_v5
183 Intel xeon_e3-1545m_v5
184 Intel xeon_e3-1558l_v5
185 Intel xeon_e3-1565l_v5
186 Intel xeon_e3-1575m_v5
187 Intel xeon_e3-1578l_v5
188 Intel xeon_e3-1585_v5
189 Intel xeon_e3-1585l_v5
190 Intel xeon_e7-4809_v4
191 Intel xeon_e7-4820_v4
192 Intel xeon_e7-4830_v4
193 Intel xeon_e7-4850_v4
194 Intel xeon_e7-8860_v4
195 Intel xeon_e7-8867_v4
196 Intel xeon_e7-8870_v4
197 Intel xeon_e7-8880_v4
198 Intel xeon_e7-8890_v4
199 Intel xeon_e7-8891_v4
200 Intel xeon_e7-8893_v4
201 Intel xeon_e7-8894_v4
202 Intel xeon_e7-4809_v3
203 Intel xeon_e7-4820_v3
204 Intel xeon_e7-4830_v3
205 Intel xeon_e7-4850_v3
206 Intel xeon_e7-8860_v3
207 Intel xeon_e7-8867_v3
208 Intel xeon_e7-8870_v3
209 Intel xeon_e7-8880_v3
210 Intel xeon_e7-8880l_v3
211 Intel xeon_e7-8890_v3
212 Intel xeon_e7-8891_v3
213 Intel xeon_e7-8893_v3
214 Intel xeon_e7-2850_v2
215 Intel xeon_e7-2870_v2
216 Intel xeon_e7-2880_v2
217 Intel xeon_e7-2890_v2
218 Intel xeon_e7-4809_v2
219 Intel xeon_e7-4820_v2
220 Intel xeon_e7-4830_v2
221 Intel xeon_e7-4850_v2
222 Intel xeon_e7-4860_v2
223 Intel xeon_e7-4870_v2
224 Intel xeon_e7-4880_v2
225 Intel xeon_e7-4890_v2
226 Intel xeon_e7-8850_v2
227 Intel xeon_e7-8857_v2
228 Intel xeon_e7-8870_v2
229 Intel xeon_e7-8880_v2
230 Intel xeon_e7-8880l_v2
231 Intel xeon_e7-8890_v2
232 Intel xeon_e7-8891_v2
233 Intel xeon_e7-8893_v2
234 Intel xeon_phi_7210
235 Intel xeon_phi_7210f
236 Intel xeon_phi_7230
237 Intel xeon_phi_7230f
238 Intel xeon_phi_7250
239 Intel xeon_phi_7250f
240 Intel xeon_phi_7290
241 Intel xeon_phi_7290f
242 Intel xeon_d-1513n
243 Intel xeon_d-1518
244 Intel xeon_d-1520
245 Intel xeon_d-1521
246 Intel xeon_d-1523n
247 Intel xeon_d-1527
248 Intel xeon_d-1528
249 Intel xeon_d-1529
250 Intel xeon_d-1531
251 Intel xeon_d-1533n
252 Intel xeon_d-1537
253 Intel xeon_d-1539
254 Intel xeon_d-1540
255 Intel xeon_d-1541
256 Intel xeon_d-1543n
257 Intel xeon_d-1548
258 Intel xeon_d-1553n
259 Intel xeon_d-1557
260 Intel xeon_d-1559
261 Intel xeon_d-1567
262 Intel xeon_d-1571
263 Intel xeon_d-1577
264 Intel xeon_d-2123it
265 Intel xeon_d-2141i
266 Intel xeon_d-2142it
267 Intel xeon_d-2143it
268 Intel xeon_d-2145nt
269 Intel xeon_d-2146nt
270 Intel xeon_d-2161i
271 Intel xeon_d-2163it
272 Intel xeon_d-2166nt
273 Intel xeon_d-2173it
274 Intel xeon_d-2177nt
275 Intel xeon_d-2183it
276 Intel xeon_d-2187nt
277 Intel atom_c2308
278 Intel atom_c2316
279 Intel atom_c2338
280 Intel atom_c2350
281 Intel atom_c2358
282 Intel atom_c2508
283 Intel atom_c2516
284 Intel atom_c2518
285 Intel atom_c2530
286 Intel atom_c2538
287 Intel atom_c2550
288 Intel atom_c2558
289 Intel atom_c2718
290 Intel atom_c2730
291 Intel atom_c2738
292 Intel atom_c2750
293 Intel atom_c2758
294 Intel atom_c3308
295 Intel atom_c3338
296 Intel atom_c3508
297 Intel atom_c3538
298 Intel atom_c3558
299 Intel atom_c3708
300 Intel atom_c3750
301 Intel atom_c3758
302 Intel atom_c3808
303 Intel atom_c3830
304 Intel atom_c3850
305 Intel atom_c3858
306 Intel atom_c3950
307 Intel atom_c3955
308 Intel atom_c3958

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Assembly Makefile GDB Shell

Updated: 2 years, 7 months ago
0 stars 0 fork 0 watcher
Born at : May 12, 2022, 4:27 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-5703 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-5703 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://www.securitytracker.com/id/1040626
    Added Reference https://security.netapp.com/advisory/ntap-20180924-0004/
    Added Reference https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087&languageid=en-fr
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03867en_us
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Oct. 03, 2019

    Action Type Old Value New Value
    Changed CWE CWE-284 CWE-284 CWE-269
  • CVE Modified by [email protected]

    Sep. 25, 2018

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20180924-0004/ [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 29, 2018

    Action Type Old Value New Value
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03867en_us [No Types Assigned]
  • Initial Analysis by [email protected]

    May. 21, 2018

    Action Type Old Value New Value
    Added CVSS V2 (AV:L/AC:L/Au:N/C:N/I:P/A:P)
    Added CVSS V3 AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
    Changed Reference Type http://www.securitytracker.com/id/1040626 No Types Assigned http://www.securitytracker.com/id/1040626 Third Party Advisory, VDB Entry
    Changed Reference Type https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087&languageid=en-fr No Types Assigned https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087&languageid=en-fr Vendor Advisory
    Added CWE CWE-284
    Added CPE Configuration OR *cpe:2.3:a:intel:core_i7-8550u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8559u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8650u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8700:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8700b:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8700k:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8700t:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8705g:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8706g:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8709g:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8750h:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8809g:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-8850h:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:core_i7-7500u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7560u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7567u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7600u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7660u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7700:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7700hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7700k:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7700t:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7820eq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7820hk:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7820hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7920hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-7y75:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:core_i7-6500u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6560u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6567u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6600u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6650u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6660u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6700:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6700hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6700k:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6700t:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6700te:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6770hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6785r:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6820eq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6820hk:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6820hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6822eq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6870hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6920hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-6970hq:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:core_i7-5500u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5550u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5557u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5600u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5650u:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5700eq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5700hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5750hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5775c:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5775r:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5850eq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5850hq:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:core_i7-5950hq:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:celeron_n2805:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2806:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2807:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2808:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2810:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2815:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2820:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2830:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2840:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n2920:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n3520:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:pentium_n3520:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:atom_x5-e3930:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x5-e3940:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x5-e8000:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x5-z8300:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x5-z8330:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x5-z8350:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x5-z8500:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x5-z8550:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x7-z8700:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_x7-z8750:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:pentium_j3710:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:pentium_n3700:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:pentium_n3710:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:celeron_j3060:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_j3160:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_j3355:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_j3455:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:atom_x5-e8000:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:pentium_j4205:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:pentium_n4200:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:celeron_j3355:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_j3455:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n3350:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:celeron_n3450:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:xeon_3104:-:*:*:*:bronze:*:*:* *cpe:2.3:a:intel:xeon_3106:-:*:*:*:bronze:*:*:* *cpe:2.3:a:intel:xeon_4108:-:*:*:*:silver:*:*:* *cpe:2.3:a:intel:xeon_4109t:-:*:*:*:silver:*:*:* *cpe:2.3:a:intel:xeon_4110:-:*:*:*:silver:*:*:* *cpe:2.3:a:intel:xeon_4112:-:*:*:*:silver:*:*:* *cpe:2.3:a:intel:xeon_4114:-:*:*:*:silver:*:*:* *cpe:2.3:a:intel:xeon_4114t:-:*:*:*:silver:*:*:* *cpe:2.3:a:intel:xeon_4116:-:*:*:*:silver:*:*:* *cpe:2.3:a:intel:xeon_4116t:-:*:*:*:silver:*:*:* *cpe:2.3:a:intel:xeon_5115:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_5118:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_5119t:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_5120:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_5120t:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_5122:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6126:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6126f:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6126t:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6128:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6130:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6130f:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6130t:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6132:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6134:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6134m:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6136:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6138:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6138f:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6138t:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6140:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6140m:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6142:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6142f:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6142m:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6144:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6146:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6148:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6148f:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6150:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6152:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_6154:-:*:*:*:gold:*:*:* *cpe:2.3:a:intel:xeon_8153:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8156:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8158:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8160:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8160f:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8160m:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8160t:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8164:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8168:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8170:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8170m:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8176:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8176f:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8176m:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8180:-:*:*:*:platinum:*:*:* *cpe:2.3:a:intel:xeon_8180m:-:*:*:*:platinum:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:xeon_e7-4809_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4820_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4830_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4850_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8860_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8867_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8870_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8880_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8880l_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8890_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8891_v3:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8893_v3:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:xeon_e7-2850_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-2870_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-2880_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-2890_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4809_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4820_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4830_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4850_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4860_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4870_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4880_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-4890_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8850_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8857_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8870_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8880_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8880l_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8890_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8891_v2:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_e7-8893_v2:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:xeon_phi_7210:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_phi_7210f:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_phi_7230:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_phi_7230f:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_phi_7250:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_phi_7250f:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_phi_7290:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_phi_7290f:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:xeon_d-1513n:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1518:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1520:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1521:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1523n:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1527:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1528:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1529:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1531:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1533n:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1537:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1539:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1540:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1541:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1543n:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1548:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1553n:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1557:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1559:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1567:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1571:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-1577:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2123it:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2141i:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2142it:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2143it:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2145nt:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2146nt:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2161i:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2163it:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2166nt:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2173it:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2177nt:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2183it:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:intel:atom_c2308:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2316:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2338:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2350:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2358:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2508:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2516:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2518:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2530:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2538:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2550:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2558:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2718:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2730:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2738:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2750:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c2758:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3308:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3338:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3508:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3538:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3558:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3708:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3750:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3758:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3808:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3830:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3850:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3858:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3950:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3955:-:*:*:*:*:*:*:* *cpe:2.3:a:intel:atom_c3958:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Apr. 07, 2018

    Action Type Old Value New Value
    Added Reference http://www.securitytracker.com/id/1040626 [No Types Assigned]
  • CVE Modified by [email protected]

    Apr. 04, 2018

    Action Type Old Value New Value
    Removed Reference https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087&languageid=en-fr [No Types Assigned]
    Added Reference https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00087&languageid=en-fr [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2017-5703 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2017-5703 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.05635

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability