Description

Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.

INFO

Published Date :

July 12, 2022, 7:15 p.m.

Last Modified :

Feb. 4, 2024, 8:15 a.m.

Remotely Exploitable :

No

Impact Score :

4.0

Exploitability Score :

2.0
Public PoC/Exploit Available at Github

CVE-2022-29901 has a 3 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2022-29901 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel core_i7-6700hq_firmware
2 Intel core_i7-6770hq_firmware
3 Intel core_i7-6820hk_firmware
4 Intel core_i7-6820hq_firmware
5 Intel core_i7-6870hq_firmware
6 Intel core_i7-6920hq_firmware
7 Intel core_i7-6970hq_firmware
8 Intel core_i5-6300hq_firmware
9 Intel core_i5-6350hq_firmware
10 Intel core_i5-6440hq_firmware
11 Intel core_i3-6100h_firmware
12 Intel core_i7-6700_firmware
13 Intel core_i7-6700k_firmware
14 Intel core_i7-6700t_firmware
15 Intel core_i7-6700te_firmware
16 Intel core_i7-6820eq_firmware
17 Intel core_i7-6822eq_firmware
18 Intel core_i5-6400_firmware
19 Intel core_i5-6400t_firmware
20 Intel core_i5-6440eq_firmware
21 Intel core_i5-6442eq_firmware
22 Intel core_i5-6500_firmware
23 Intel core_i5-6500t_firmware
24 Intel core_i5-6500te_firmware
25 Intel core_i5-6600_firmware
26 Intel core_i5-6600k_firmware
27 Intel core_i5-6600t_firmware
28 Intel core_i3-6100_firmware
29 Intel core_i3-6100e_firmware
30 Intel core_i3-6100t_firmware
31 Intel core_i3-6100te_firmware
32 Intel core_i3-6102e_firmware
33 Intel core_i3-6120_firmware
34 Intel core_i3-6120t_firmware
35 Intel core_i3-6300_firmware
36 Intel core_i3-6300t_firmware
37 Intel core_i3-6320_firmware
38 Intel core_i3-6320t_firmware
39 Intel core_i7-8665u_firmware
40 Intel core_i7-8557u_firmware
41 Intel core_i7-8850h_firmware
42 Intel core_i7-8809g_firmware
43 Intel core_i7-8750hf_firmware
44 Intel core_i7-8750h_firmware
45 Intel core_i7-8709g_firmware
46 Intel core_i7-8706g_firmware
47 Intel core_i7-8705g_firmware
48 Intel core_i7-8700b_firmware
49 Intel core_i7-8569u_firmware
50 Intel core_i7-8650u_firmware
51 Intel core_i7-8565u_firmware
52 Intel core_i7-8560u_firmware
53 Intel core_i7-8559u_firmware
54 Intel core_i7-8500y_firmware
55 Intel core_i7-8510y_firmware
56 Intel core_i7-8550u_firmware
57 Intel core_i5-8310y_firmware
58 Intel core_i5-8210y_firmware
59 Intel core_i5-8200y_firmware
60 Intel core_m3-8100y_firmware
61 Intel core_i5-8259u_firmware
62 Intel core_i5-8269u_firmware
63 Intel core_i3-8109u_firmware
64 Intel core_i5-8250u_firmware
65 Intel core_i5-8350u_firmware
66 Intel core_i3-8130u_firmware
67 Intel core_i5-8365u_firmware
68 Intel core_i5-8265u_firmware
69 Intel core_i3-8145u_firmware
70 Intel core_i5-8305g_firmware
71 Intel core_i9-8950hk_firmware
72 Intel core_i5-8300h_firmware
73 Intel core_i5-8400b_firmware
74 Intel core_i5-8400h_firmware
75 Intel core_i5-8500b_firmware
76 Intel core_i7-8700k_firmware
77 Intel core_i5-8600k_firmware
78 Intel core_i5-8650k_firmware
79 Intel core_i7-8670_firmware
80 Intel core_i7-8670t_firmware
81 Intel core_i7-8700_firmware
82 Intel core_i7-8700t_firmware
83 Intel core_i5-8400_firmware
84 Intel core_i5-8400t_firmware
85 Intel core_i5-8420_firmware
86 Intel core_i5-8420t_firmware
87 Intel core_i5-8500_firmware
88 Intel core_i5-8500t_firmware
89 Intel core_i5-8550_firmware
90 Intel core_i5-8600_firmware
91 Intel core_i5-8600t_firmware
92 Intel core_i5-8650_firmware
93 Intel core_i3-8000_firmware
94 Intel core_i3-8000t_firmware
95 Intel core_i3-8020_firmware
96 Intel core_i3-8100_firmware
97 Intel core_i3-8100h_firmware
98 Intel core_i3-8100t_firmware
99 Intel core_i3-8120_firmware
100 Intel core_i3-8300_firmware
101 Intel core_i3-8300t_firmware
102 Intel core_i3-8350k_firmware
103 Intel core_i7-6660u_firmware
104 Intel core_i7-6650u_firmware
105 Intel core_i7-6600u_firmware
106 Intel core_i7-6567u_firmware
107 Intel core_i7-6560u_firmware
108 Intel core_i7-6500u_firmware
109 Intel core_i5-6200u_firmware
110 Intel core_i5-6287u_firmware
111 Intel core_i5-6267u_firmware
112 Intel core_i5-6260u_firmware
113 Intel core_i3-6100u_firmware
114 Intel core_i3-6167u_firmware
115 Intel core_m7-6y75_firmware
116 Intel core_i5-6300u_firmware
117 Intel core_m5-6y57_firmware
118 Intel core_i5-6360u_firmware
119 Intel core_m5-6y54_firmware
120 Intel core_m3-6y30_firmware
121 Intel core_i3-6110u_firmware
122 Intel core_i7-6510u_firmware
123 Intel core_i5-8550u_firmware
124 Intel core_i5-6210u_firmware
125 Intel core_i5-6310u_firmware
1 Fedoraproject fedora
1 Debian debian_linux
1 Xen xen
1 Vmware esxi

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Map Vulnerabilities into Different Layers of the Container Image

Python

Updated: 1 year, 10 months ago
1 stars 0 fork 0 watcher
Born at : Oct. 5, 2022, 12:07 p.m. This repo has been linked 1276 different CVEs too.

SecDB

Updated: 2 months, 4 weeks ago
0 stars 0 fork 0 watcher
Born at : July 1, 2022, 8:37 p.m. This repo has been linked 82 different CVEs too.

Microarchitectural exploitation and other hardware attacks.

meltdown spectre rowhammer microarchitecture infosec hardware state-of-the-art research proof-of-concept exploitation foreshadow sgx intel amd arm side-channel-attacks speculative-execution evictions cache-attack data-sampling

Updated: 3 months, 1 week ago
78 stars 9 fork 9 watcher
Born at : Feb. 2, 2020, 5:31 p.m. This repo has been linked 46 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-29901 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-29901 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Feb. 04, 2024

    Action Type Old Value New Value
    Added Reference Intel Corporation https://security.gentoo.org/glsa/202402-07 [No types assigned]
  • CVE Source Update by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Changed Source Switzerland Government Common Vulnerability Program Intel Corporation
  • CVE Modified by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Added Reference Intel Corporation https://comsec.ethz.ch/retbleed [No types assigned]
    Added Reference Intel Corporation https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html [No types assigned]
    Added Reference Intel Corporation http://www.openwall.com/lists/oss-security/2022/07/12/2 [No types assigned]
    Added Reference Intel Corporation http://www.openwall.com/lists/oss-security/2022/07/12/4 [No types assigned]
    Added Reference Intel Corporation http://www.openwall.com/lists/oss-security/2022/07/12/5 [No types assigned]
    Added Reference Intel Corporation http://www.openwall.com/lists/oss-security/2022/07/13/1 [No types assigned]
    Added Reference Intel Corporation https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ [No types assigned]
    Added Reference Intel Corporation https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ [No types assigned]
    Added Reference Intel Corporation https://www.debian.org/security/2022/dsa-5207 [No types assigned]
    Added Reference Intel Corporation https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html [No types assigned]
    Added Reference Intel Corporation https://security.netapp.com/advisory/ntap-20221007-0007/ [No types assigned]
    Added Reference Intel Corporation https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html [No types assigned]
    Added Reference Intel Corporation https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/ [No types assigned]
    Removed Reference Switzerland Government Common Vulnerability Program http://www.openwall.com/lists/oss-security/2022/07/12/2
    Removed Reference Switzerland Government Common Vulnerability Program https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html
    Removed Reference Switzerland Government Common Vulnerability Program https://comsec.ethz.ch/retbleed
    Removed Reference Switzerland Government Common Vulnerability Program http://www.openwall.com/lists/oss-security/2022/07/12/5
    Removed Reference Switzerland Government Common Vulnerability Program http://www.openwall.com/lists/oss-security/2022/07/12/4
    Removed Reference Switzerland Government Common Vulnerability Program http://www.openwall.com/lists/oss-security/2022/07/13/1
    Removed Reference Switzerland Government Common Vulnerability Program https://lists.fedoraproject.org/archives/list/[email protected]/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/
    Removed Reference Switzerland Government Common Vulnerability Program https://lists.fedoraproject.org/archives/list/[email protected]/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/
    Removed Reference Switzerland Government Common Vulnerability Program https://www.debian.org/security/2022/dsa-5207
    Removed Reference Switzerland Government Common Vulnerability Program https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html
    Removed Reference Switzerland Government Common Vulnerability Program https://security.netapp.com/advisory/ntap-20221007-0007/
    Removed Reference Switzerland Government Common Vulnerability Program https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html
    Removed Reference Switzerland Government Common Vulnerability Program https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
    Added CWE Intel Corporation CWE-200
    Removed CWE Switzerland Government Common Vulnerability Program CWE-200
    Removed CVSS V3.1 Switzerland Government Common Vulnerability Program AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
    Added CVSS V3.1 Intel Corporation AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
  • CVE Modified by [email protected]

    Oct. 17, 2023

    Action Type Old Value New Value
    Added Reference https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/ [No Types Assigned]
  • Modified Analysis by [email protected]

    Feb. 23, 2023

    Action Type Old Value New Value
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html No Types Assigned https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html Mailing List, Third Party Advisory
    Changed CPE Configuration OR *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* OR *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Dec. 24, 2022

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html [No Types Assigned]
  • Modified Analysis by [email protected]

    Oct. 26, 2022

    Action Type Old Value New Value
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html No Types Assigned https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html Mailing List, Third Party Advisory
    Changed Reference Type https://security.netapp.com/advisory/ntap-20221007-0007/ No Types Assigned https://security.netapp.com/advisory/ntap-20221007-0007/ Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2022/dsa-5207 No Types Assigned https://www.debian.org/security/2022/dsa-5207 Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Oct. 07, 2022

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20221007-0007/ [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 11, 2022

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2022/09/msg00011.html [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 16, 2022

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2022/dsa-5207 [No Types Assigned]
  • Reanalysis by [email protected]

    Aug. 03, 2022

    Action Type Old Value New Value
    Added CPE Configuration OR *cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* *cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*
  • Initial Analysis by [email protected]

    Jul. 27, 2022

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:M/Au:N/C:P/I:N/A:N)
    Added CVSS V3.1 NIST AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/07/12/2 No Types Assigned http://www.openwall.com/lists/oss-security/2022/07/12/2 Mailing List, Patch, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/07/12/4 No Types Assigned http://www.openwall.com/lists/oss-security/2022/07/12/4 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/07/12/5 No Types Assigned http://www.openwall.com/lists/oss-security/2022/07/12/5 Mailing List, Third Party Advisory
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/07/13/1 No Types Assigned http://www.openwall.com/lists/oss-security/2022/07/13/1 Mailing List, Third Party Advisory
    Changed Reference Type https://comsec.ethz.ch/retbleed No Types Assigned https://comsec.ethz.ch/retbleed Exploit, Technical Description, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ Mailing List, Third Party Advisory
    Changed Reference Type https://lists.fedoraproject.org/archives/list/[email protected]/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ No Types Assigned https://lists.fedoraproject.org/archives/list/[email protected]/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ Mailing List, Third Party Advisory
    Changed Reference Type https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html No Types Assigned https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00702.html Vendor Advisory
    Added CWE NIST CWE-668
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6500u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6510u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6510u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6560u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6567u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6600u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6650u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6660u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6700hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6700k_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6700t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6770hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6820eq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6820hk_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6820hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6822eq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6870hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6920hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-6970hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6100e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6100h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6100t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6100te_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6100u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6102e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6110u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6110u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6120_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6120:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6120t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6120t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6167u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6300_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6300t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6320_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-6320t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-6320t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8000t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8000t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8020_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8020:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8120_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8120:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6200u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6210u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6210u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6260u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6267u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6287u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6300hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6300u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6310u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6310u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6350hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6360u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6400_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6400t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6440eq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6440hq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6442eq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6500t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6500te_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6600_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6600k_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-6600t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8420_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8420:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8420t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8420t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8550u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8550u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i5-8650k_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i5-8650k:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8510y_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8510y:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8560u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8560u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8670_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8670:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8670t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8670t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8750hf_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8750hf:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_m3-6y30_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_m5-6y54_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_m5-6y57_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:core_m7-6y75_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* *cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* *cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Jul. 15, 2022

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/ [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 14, 2022

    Action Type Old Value New Value
    Added Reference https://lists.fedoraproject.org/archives/list/[email protected]/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/ [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 13, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/07/13/1 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 12, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/07/12/5 [No Types Assigned]
    Added Reference http://www.openwall.com/lists/oss-security/2022/07/12/4 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-29901 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-29901 weaknesses.

CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-22: Exploiting Trust in Client Exploiting Trust in Client CAPEC-59: Session Credential Falsification through Prediction Session Credential Falsification through Prediction CAPEC-60: Reusing Session IDs (aka Session Replay) Reusing Session IDs (aka Session Replay) CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-116: Excavation Excavation CAPEC-169: Footprinting Footprinting CAPEC-224: Fingerprinting Fingerprinting CAPEC-285: ICMP Echo Request Ping ICMP Echo Request Ping CAPEC-287: TCP SYN Scan TCP SYN Scan CAPEC-290: Enumerate Mail Exchange (MX) Records Enumerate Mail Exchange (MX) Records CAPEC-291: DNS Zone Transfers DNS Zone Transfers CAPEC-292: Host Discovery Host Discovery CAPEC-293: Traceroute Route Enumeration Traceroute Route Enumeration CAPEC-294: ICMP Address Mask Request ICMP Address Mask Request CAPEC-295: Timestamp Request Timestamp Request CAPEC-296: ICMP Information Request ICMP Information Request CAPEC-297: TCP ACK Ping TCP ACK Ping CAPEC-298: UDP Ping UDP Ping CAPEC-299: TCP SYN Ping TCP SYN Ping CAPEC-300: Port Scanning Port Scanning CAPEC-301: TCP Connect Scan TCP Connect Scan CAPEC-302: TCP FIN Scan TCP FIN Scan CAPEC-303: TCP Xmas Scan TCP Xmas Scan CAPEC-304: TCP Null Scan TCP Null Scan CAPEC-305: TCP ACK Scan TCP ACK Scan CAPEC-306: TCP Window Scan TCP Window Scan CAPEC-307: TCP RPC Scan TCP RPC Scan CAPEC-308: UDP Scan UDP Scan CAPEC-309: Network Topology Mapping Network Topology Mapping CAPEC-310: Scanning for Vulnerable Software Scanning for Vulnerable Software CAPEC-312: Active OS Fingerprinting Active OS Fingerprinting CAPEC-313: Passive OS Fingerprinting Passive OS Fingerprinting CAPEC-317: IP ID Sequencing Probe IP ID Sequencing Probe CAPEC-318: IP 'ID' Echoed Byte-Order Probe IP 'ID' Echoed Byte-Order Probe CAPEC-319: IP (DF) 'Don't Fragment Bit' Echoing Probe IP (DF) 'Don't Fragment Bit' Echoing Probe CAPEC-320: TCP Timestamp Probe TCP Timestamp Probe CAPEC-321: TCP Sequence Number Probe TCP Sequence Number Probe CAPEC-322: TCP (ISN) Greatest Common Divisor Probe TCP (ISN) Greatest Common Divisor Probe CAPEC-323: TCP (ISN) Counter Rate Probe TCP (ISN) Counter Rate Probe CAPEC-324: TCP (ISN) Sequence Predictability Probe TCP (ISN) Sequence Predictability Probe CAPEC-325: TCP Congestion Control Flag (ECN) Probe TCP Congestion Control Flag (ECN) Probe CAPEC-326: TCP Initial Window Size Probe TCP Initial Window Size Probe CAPEC-327: TCP Options Probe TCP Options Probe CAPEC-328: TCP 'RST' Flag Checksum Probe TCP 'RST' Flag Checksum Probe CAPEC-329: ICMP Error Message Quoting Probe ICMP Error Message Quoting Probe CAPEC-330: ICMP Error Message Echoing Integrity Probe ICMP Error Message Echoing Integrity Probe CAPEC-472: Browser Fingerprinting Browser Fingerprinting CAPEC-497: File Discovery File Discovery CAPEC-508: Shoulder Surfing Shoulder Surfing CAPEC-573: Process Footprinting Process Footprinting CAPEC-574: Services Footprinting Services Footprinting CAPEC-575: Account Footprinting Account Footprinting CAPEC-576: Group Permission Footprinting Group Permission Footprinting CAPEC-577: Owner Footprinting Owner Footprinting CAPEC-616: Establish Rogue Location Establish Rogue Location CAPEC-643: Identify Shared Files/Directories on System Identify Shared Files/Directories on System CAPEC-646: Peripheral Footprinting Peripheral Footprinting CAPEC-651: Eavesdropping Eavesdropping
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.07 }} -0.01%

score

0.29982

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability