{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Intel Quartus Prime Pro Edition versions ant\u00e9rieures \u00e0 19.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel FPGA SDK for OpenCL versions ant\u00e9rieures \u00e0 19.3 et sans le correctif de s\u00e9curit\u00e9 0.24","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel RST versions ant\u00e9rieures \u00e0 17.7.0.1006","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Ethernet I218 Adapter driver for Windows 10 versions ant\u00e9rieures \u00e0 24.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Linux Administrative Tools for Intel Network Adapters versions ant\u00e9rieures \u00e0 24.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Dynamic Platform et Thermal Framework sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Control Center-I versions 2.1.0.0 et ant\u00e9rieures","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC ; voir le site du constructeur pour la liste compl\u00e8te des produits vuln\u00e9rables (cf. section Documentation)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"les processeurs Intel ; voir le site du constructeur pour la liste compl\u00e8te des produits vuln\u00e9rables (cf. section Documentation)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SCS Platform Discovery Utility (produit consid\u00e9r\u00e9 comme obsol\u00e8te par Intel)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2019-14610","url":"https://www.cve.org/CVERecord?id=CVE-2019-14610"},{"name":"CVE-2019-0134","url":"https://www.cve.org/CVERecord?id=CVE-2019-0134"},{"name":"CVE-2019-14605","url":"https://www.cve.org/CVERecord?id=CVE-2019-14605"},{"name":"CVE-2019-11157","url":"https://www.cve.org/CVERecord?id=CVE-2019-11157"},{"name":"CVE-2019-14608","url":"https://www.cve.org/CVERecord?id=CVE-2019-14608"},{"name":"CVE-2019-11165","url":"https://www.cve.org/CVERecord?id=CVE-2019-11165"},{"name":"CVE-2019-14612","url":"https://www.cve.org/CVERecord?id=CVE-2019-14612"},{"name":"CVE-2019-11096","url":"https://www.cve.org/CVERecord?id=CVE-2019-11096"},{"name":"CVE-2019-14599","url":"https://www.cve.org/CVERecord?id=CVE-2019-14599"},{"name":"CVE-2019-14611","url":"https://www.cve.org/CVERecord?id=CVE-2019-14611"},{"name":"CVE-2019-14568","url":"https://www.cve.org/CVERecord?id=CVE-2019-14568"},{"name":"CVE-2019-14603","url":"https://www.cve.org/CVERecord?id=CVE-2019-14603"},{"name":"CVE-2019-14607","url":"https://www.cve.org/CVERecord?id=CVE-2019-14607"},{"name":"CVE-2019-14609","url":"https://www.cve.org/CVERecord?id=CVE-2019-14609"},{"name":"CVE-2019-14604","url":"https://www.cve.org/CVERecord?id=CVE-2019-14604"},{"name":"CVE-2019-0159","url":"https://www.cve.org/CVERecord?id=CVE-2019-0159"}],"links":[],"reference":"CERTFR-2019-AVI-623","revisions":[{"description":"Version initiale","revision_date":"2019-12-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00317 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00317.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00324 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00324.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00299 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00299.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00237 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00237.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00312 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00312.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00253 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00253.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00230 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00230.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00323 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00284 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00284.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00289 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00289.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00311 du 10 d\u00e9cembre 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00311.html"}]}
