{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Snoop Assisted L1D (voir le site du constructeur pour les versions vuln\u00e9rables, cf. section Documentation)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel FPGA Programmable Acceleration Card N3000","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Graphics Drivers pour Windows sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Max 10 FPGA","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"BlueZ versions ant\u00e9rieures \u00e0 5.53","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Smart Sound Technology sur les processeurs Intel Core i7 de 10\u00e8me g\u00e9n\u00e9ration versions ant\u00e9rieures \u00e0 3431","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Smart Sound Technology sur les processeurs Intel Core 8\u00e8me g\u00e9n\u00e9ration versions ant\u00e9rieures \u00e0 3349","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Optane DC Persistent Memory Module Management versions ant\u00e9rieures \u00e0 1.0.0.3461","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel NUC (voir le site du constructeur pour les versions vuln\u00e9rables, cf. section Documentation)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel SGX (voir le site du constructeur pour les versions vuln\u00e9rables, cf. section Documentation)","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2020-0504","url":"https://www.cve.org/CVERecord?id=CVE-2020-0504"},{"name":"CVE-2020-0508","url":"https://www.cve.org/CVERecord?id=CVE-2020-0508"},{"name":"CVE-2020-0530","url":"https://www.cve.org/CVERecord?id=CVE-2020-0530"},{"name":"CVE-2020-0516","url":"https://www.cve.org/CVERecord?id=CVE-2020-0516"},{"name":"CVE-2020-0514","url":"https://www.cve.org/CVERecord?id=CVE-2020-0514"},{"name":"CVE-2020-0503","url":"https://www.cve.org/CVERecord?id=CVE-2020-0503"},{"name":"CVE-2019-14626","url":"https://www.cve.org/CVERecord?id=CVE-2019-14626"},{"name":"CVE-2020-0511","url":"https://www.cve.org/CVERecord?id=CVE-2020-0511"},{"name":"CVE-2020-0515","url":"https://www.cve.org/CVERecord?id=CVE-2020-0515"},{"name":"CVE-2020-0501","url":"https://www.cve.org/CVERecord?id=CVE-2020-0501"},{"name":"CVE-2020-0546","url":"https://www.cve.org/CVERecord?id=CVE-2020-0546"},{"name":"CVE-2020-0520","url":"https://www.cve.org/CVERecord?id=CVE-2020-0520"},{"name":"CVE-2020-0507","url":"https://www.cve.org/CVERecord?id=CVE-2020-0507"},{"name":"CVE-2020-0550","url":"https://www.cve.org/CVERecord?id=CVE-2020-0550"},{"name":"CVE-2020-0574","url":"https://www.cve.org/CVERecord?id=CVE-2020-0574"},{"name":"CVE-2019-14625","url":"https://www.cve.org/CVERecord?id=CVE-2019-14625"},{"name":"CVE-2020-0502","url":"https://www.cve.org/CVERecord?id=CVE-2020-0502"},{"name":"CVE-2020-0519","url":"https://www.cve.org/CVERecord?id=CVE-2020-0519"},{"name":"CVE-2020-0567","url":"https://www.cve.org/CVERecord?id=CVE-2020-0567"},{"name":"CVE-2020-0506","url":"https://www.cve.org/CVERecord?id=CVE-2020-0506"},{"name":"CVE-2020-0556","url":"https://www.cve.org/CVERecord?id=CVE-2020-0556"},{"name":"CVE-2020-0526","url":"https://www.cve.org/CVERecord?id=CVE-2020-0526"},{"name":"CVE-2020-0551","url":"https://www.cve.org/CVERecord?id=CVE-2020-0551"},{"name":"CVE-2020-0517","url":"https://www.cve.org/CVERecord?id=CVE-2020-0517"},{"name":"CVE-2020-0565","url":"https://www.cve.org/CVERecord?id=CVE-2020-0565"},{"name":"CVE-2020-0583","url":"https://www.cve.org/CVERecord?id=CVE-2020-0583"},{"name":"CVE-2020-0505","url":"https://www.cve.org/CVERecord?id=CVE-2020-0505"}],"links":[],"reference":"CERTFR-2020-AVI-139","revisions":[{"description":"Version initiale","revision_date":"2020-03-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00349 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00349.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00352 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00352.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00330 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00330.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00343 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00319 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00319.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00326 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00326.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00315 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00334 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00354 du 10 mars 2020","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html"}]}
