{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Intel Core X-series Processors, 4th Generation Intel Core i5 Processors,4th Generation Intel Core i3 Processors, Intel Pentium Processor G Series, Intel Pentium Processor 3000 Series, Intel Celeron Processor 2000 Series, Intel Xeon Processor E7 v3 Family, Intel Xeon Processor E5 v3 Family et Intel Xeon Processor E3 v3 Family","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"ITE Tech Consumer Infrared Driver pour Windows 10 versions ant\u00e9rieures \u00e0 5.4.3.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC, v\u00e9rifier sur le site du constructeur pour les versions vuln\u00e9rables (cf. section Documentation).","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Omni-Path Fabric Manager GUI versions ant\u00e9rieures \u00e0 10.9.2.1.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Accelerated Storage Manager dans Intel RSTe versions ant\u00e9rieures \u00e0 5.5.0.2015","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel RAID Web Console 3 pour Windows versions ant\u00e9rieures \u00e0 7.009.011.000","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Turbo Boost Max Technology 3.0 microgiciels versions 1.0.0.1035 et ant\u00e9rieures","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel PROSet/Wireless WiFi Software versions ant\u00e9rieures \u00e0 21.10 pour Microsoft Windows 7, 8.1 et 10","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SGX DCAP Linux driver versions ant\u00e9rieures \u00e0 1.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Chipset Device Software (INF Update Utility) versions ant\u00e9rieures \u00e0 10.1.1.45","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SGX Linux client driver versions ant\u00e9rieures \u00e0 2.5","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2019-11125","url":"https://www.cve.org/CVERecord?id=CVE-2019-11125"},{"name":"CVE-2019-0178","url":"https://www.cve.org/CVERecord?id=CVE-2019-0178"},{"name":"CVE-2019-0174","url":"https://www.cve.org/CVERecord?id=CVE-2019-0174"},{"name":"CVE-2019-11117","url":"https://www.cve.org/CVERecord?id=CVE-2019-11117"},{"name":"CVE-2019-0130","url":"https://www.cve.org/CVERecord?id=CVE-2019-0130"},{"name":"CVE-2019-11124","url":"https://www.cve.org/CVERecord?id=CVE-2019-11124"},{"name":"CVE-2019-0164","url":"https://www.cve.org/CVERecord?id=CVE-2019-0164"},{"name":"CVE-2019-0181","url":"https://www.cve.org/CVERecord?id=CVE-2019-0181"},{"name":"CVE-2019-0179","url":"https://www.cve.org/CVERecord?id=CVE-2019-0179"},{"name":"CVE-2019-0128","url":"https://www.cve.org/CVERecord?id=CVE-2019-0128"},{"name":"CVE-2019-11127","url":"https://www.cve.org/CVERecord?id=CVE-2019-11127"},{"name":"CVE-2019-11126","url":"https://www.cve.org/CVERecord?id=CVE-2019-11126"},{"name":"CVE-2019-0175","url":"https://www.cve.org/CVERecord?id=CVE-2019-0175"},{"name":"CVE-2019-0180","url":"https://www.cve.org/CVERecord?id=CVE-2019-0180"},{"name":"CVE-2019-11129","url":"https://www.cve.org/CVERecord?id=CVE-2019-11129"},{"name":"CVE-2018-3702","url":"https://www.cve.org/CVERecord?id=CVE-2018-3702"},{"name":"CVE-2019-0177","url":"https://www.cve.org/CVERecord?id=CVE-2019-0177"},{"name":"CVE-2019-11092","url":"https://www.cve.org/CVERecord?id=CVE-2019-11092"},{"name":"CVE-2019-0136","url":"https://www.cve.org/CVERecord?id=CVE-2019-0136"},{"name":"CVE-2019-0183","url":"https://www.cve.org/CVERecord?id=CVE-2019-0183"},{"name":"CVE-2019-0182","url":"https://www.cve.org/CVERecord?id=CVE-2019-0182"},{"name":"CVE-2019-0157","url":"https://www.cve.org/CVERecord?id=CVE-2019-0157"},{"name":"CVE-2019-11119","url":"https://www.cve.org/CVERecord?id=CVE-2019-11119"},{"name":"CVE-2019-11128","url":"https://www.cve.org/CVERecord?id=CVE-2019-11128"},{"name":"CVE-2019-11123","url":"https://www.cve.org/CVERecord?id=CVE-2019-11123"}],"links":[],"reference":"CERTFR-2019-AVI-271","revisions":[{"description":"Version initiale","revision_date":"2019-06-14T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00259 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00232 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00206 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00235 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00243 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00257 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00224 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00226 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00247 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00264 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00248 du 11 juin 2019","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html"}]}
