{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Processeur Intel Celeron J4105","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel CSME versions 11.0 \u00e0 11.8.55","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel CSME versions 11.20 \u00e0 11.22.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Data Center Manager SDK versions ant\u00e9rieures \u00e0 5.0.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel CSME versions 12.0 \u00e0 12.0.10","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Celeron N4000","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Accelerated Storage Manager RSTe versions 5.5 et ant\u00e9rieures","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Board","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server System","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Core de 7\u00e8me g\u00e9n\u00e9ration","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Compute ModuleIntel Graphics Driver pour Windows versions ant\u00e9rieures \u00e0 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel CSME versions 11.10 \u00e0 11.11.55","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Trusted Execution Engine versions 4.0 \u00e0 4.0.5","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Core de 8\u00e8me g\u00e9n\u00e9ration","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Pentium Silver N5000","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Composant Intel Unite Solution software server version 3.2 \u00e0 3.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Celeron N4100","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Platform Services versions SPS 4.01.00.152.0 \u00e0 SPS 4.01.02.173","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Platform Services versions SPS 4.00.04.367 \u00e0 SPS 4.00.04.382","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Pentium Silver J5005","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Celeron J4005","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Trusted Execution Engine versions 3.0 \u00e0 3.1.50","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2018-12223","url":"https://www.cve.org/CVERecord?id=CVE-2018-12223"},{"name":"CVE-2019-0108","url":"https://www.cve.org/CVERecord?id=CVE-2019-0108"},{"name":"CVE-2018-12215","url":"https://www.cve.org/CVERecord?id=CVE-2018-12215"},{"name":"CVE-2018-12188","url":"https://www.cve.org/CVERecord?id=CVE-2018-12188"},{"name":"CVE-2018-12205","url":"https://www.cve.org/CVERecord?id=CVE-2018-12205"},{"name":"CVE-2019-0103","url":"https://www.cve.org/CVERecord?id=CVE-2019-0103"},{"name":"CVE-2018-12222","url":"https://www.cve.org/CVERecord?id=CVE-2018-12222"},{"name":"CVE-2018-12212","url":"https://www.cve.org/CVERecord?id=CVE-2018-12212"},{"name":"CVE-2018-12213","url":"https://www.cve.org/CVERecord?id=CVE-2018-12213"},{"name":"CVE-2018-12202","url":"https://www.cve.org/CVERecord?id=CVE-2018-12202"},{"name":"CVE-2018-12199","url":"https://www.cve.org/CVERecord?id=CVE-2018-12199"},{"name":"CVE-2018-12221","url":"https://www.cve.org/CVERecord?id=CVE-2018-12221"},{"name":"CVE-2019-0107","url":"https://www.cve.org/CVERecord?id=CVE-2019-0107"},{"name":"CVE-2018-12191","url":"https://www.cve.org/CVERecord?id=CVE-2018-12191"},{"name":"CVE-2018-12200","url":"https://www.cve.org/CVERecord?id=CVE-2018-12200"},{"name":"CVE-2018-12204","url":"https://www.cve.org/CVERecord?id=CVE-2018-12204"},{"name":"CVE-2018-12214","url":"https://www.cve.org/CVERecord?id=CVE-2018-12214"},{"name":"CVE-2019-0105","url":"https://www.cve.org/CVERecord?id=CVE-2019-0105"},{"name":"CVE-2018-18089","url":"https://www.cve.org/CVERecord?id=CVE-2018-18089"},{"name":"CVE-2019-0109","url":"https://www.cve.org/CVERecord?id=CVE-2019-0109"},{"name":"CVE-2018-12187","url":"https://www.cve.org/CVERecord?id=CVE-2018-12187"},{"name":"CVE-2018-12219","url":"https://www.cve.org/CVERecord?id=CVE-2018-12219"},{"name":"CVE-2019-0102","url":"https://www.cve.org/CVERecord?id=CVE-2019-0102"},{"name":"CVE-2018-12192","url":"https://www.cve.org/CVERecord?id=CVE-2018-12192"},{"name":"CVE-2018-12208","url":"https://www.cve.org/CVERecord?id=CVE-2018-12208"},{"name":"CVE-2019-0101","url":"https://www.cve.org/CVERecord?id=CVE-2019-0101"},{"name":"CVE-2018-12217","url":"https://www.cve.org/CVERecord?id=CVE-2018-12217"},{"name":"CVE-2018-12189","url":"https://www.cve.org/CVERecord?id=CVE-2018-12189"},{"name":"CVE-2018-12196","url":"https://www.cve.org/CVERecord?id=CVE-2018-12196"},{"name":"CVE-2019-0135","url":"https://www.cve.org/CVERecord?id=CVE-2019-0135"},{"name":"CVE-2018-12201","url":"https://www.cve.org/CVERecord?id=CVE-2018-12201"},{"name":"CVE-2018-12211","url":"https://www.cve.org/CVERecord?id=CVE-2018-12211"},{"name":"CVE-2019-0106","url":"https://www.cve.org/CVERecord?id=CVE-2019-0106"},{"name":"CVE-2018-12203","url":"https://www.cve.org/CVERecord?id=CVE-2018-12203"},{"name":"CVE-2018-12209","url":"https://www.cve.org/CVERecord?id=CVE-2018-12209"},{"name":"CVE-2019-0112","url":"https://www.cve.org/CVERecord?id=CVE-2019-0112"},{"name":"CVE-2019-0110","url":"https://www.cve.org/CVERecord?id=CVE-2019-0110"},{"name":"CVE-2018-12185","url":"https://www.cve.org/CVERecord?id=CVE-2018-12185"},{"name":"CVE-2019-0111","url":"https://www.cve.org/CVERecord?id=CVE-2019-0111"},{"name":"CVE-2018-12218","url":"https://www.cve.org/CVERecord?id=CVE-2018-12218"},{"name":"CVE-2018-12220","url":"https://www.cve.org/CVERecord?id=CVE-2018-12220"},{"name":"CVE-2018-12216","url":"https://www.cve.org/CVERecord?id=CVE-2018-12216"},{"name":"CVE-2018-12224","url":"https://www.cve.org/CVERecord?id=CVE-2018-12224"},{"name":"CVE-2019-0104","url":"https://www.cve.org/CVERecord?id=CVE-2019-0104"},{"name":"CVE-2018-12210","url":"https://www.cve.org/CVERecord?id=CVE-2018-12210"},{"name":"CVE-2018-12198","url":"https://www.cve.org/CVERecord?id=CVE-2018-12198"},{"name":"CVE-2018-18090","url":"https://www.cve.org/CVERecord?id=CVE-2018-18090"},{"name":"CVE-2018-12190","url":"https://www.cve.org/CVERecord?id=CVE-2018-12190"},{"name":"CVE-2018-18091","url":"https://www.cve.org/CVERecord?id=CVE-2018-18091"}],"links":[],"reference":"CERTFR-2019-AVI-108","revisions":[{"description":"Version initiale","revision_date":"2019-03-13T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d'entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00189 du 12 mars 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00231 du 12 mars 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00231.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00215 du 12 mars 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00185 du 12 mars 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00214 du 12 mars 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00214.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00191 du 12 mars 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html"}]}
