{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Intel oneAPI Base Toolkit versions ant\u00e9rieures \u00e0 2023.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Utilitaire Intel Server Information Retrieval versions ant\u00e9rieures \u00e0 16.0.9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel In-Band Manageability versions ant\u00e9rieures \u00e0 3.0.14","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Micrologiciels Intel Optane SSD et Intel Optane SSD DC","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"8\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel OpenVINO Model Server versions ant\u00e9rieures \u00e0 2022.3","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Micrologiciel Intel NUC, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel MPI Library versions ant\u00e9rieures \u00e0 2021.9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel oneAPI HPC Toolkit versions ant\u00e9rieures \u00e0 2023.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"11\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel OFU versions ant\u00e9rieures \u00e0 14.1.31","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Unison sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Micrologiciel Intel FPGA versions ant\u00e9rieures \u00e0 2.8.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Pilote Intel QAT pour Windows HW versions 2.x ant\u00e9rieures \u00e0 2.04","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Arc RGB Controller versions ant\u00e9rieures \u00e0 1.06","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Pilotes Intel Arc & Iris Xe Graphics WHQL pour Windows versions ant\u00e9rieures \u00e0 31.0.101.4255","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Outil Intel Battery Life Diagnostic versions ant\u00e9rieures \u00e0 2.2.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Application Intel Support pour Android toutes versions","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Application Intel Smart Campus pour Android versions ant\u00e9rieures \u00e0 9.4","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Simics Simulator versions ant\u00e9rieures \u00e0 1.7.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Atom, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Pilote pour Radeon RX Vega M (int\u00e9gr\u00e9 dans les processeurs Intel Core) versions ant\u00e9rieures \u00e0 23.10.01.46","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"13\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"12\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Logiciels pour Intel NUC","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Xeon D, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel RealSense Dynamic Calibration versions ant\u00e9rieures \u00e0 2.13.1.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel OpenVINO toolkit versions ant\u00e9rieures \u00e0 2023.0.0","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Server Configuration Utility versions ant\u00e9rieures \u00e0 16.0.9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Biblioth\u00e8que Intel QAT Library (QATlib) versions ant\u00e9rieures \u00e0 22.07.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel XTU versions ant\u00e9rieures \u00e0 7.12.0.15","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Connectivity Performance Suite sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel QAT pour Linux versions ant\u00e9rieures \u00e0 QAT20.L.1.0.40-00004","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Inspector versions ant\u00e9rieures \u00e0 2023.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Celeron, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"10\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel On Demand Agent sans le dernier correctif de s\u00e9curit\u00e9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Micrologiciels Intel Ethernet Adapters","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Chipset Device versions ant\u00e9rieures \u00e0 10.1.19444.8378","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Micrologiciels Intel Server Board et Server System","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Pilote Intel QAT pour Windows HW versions 1.x ant\u00e9rieures \u00e0 1.10","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel DCM versions ant\u00e9rieures \u00e0 5.2","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Pentium, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Advisor versions ant\u00e9rieures \u00e0 2023.1","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Intel Rapid Storage Technology versions ant\u00e9rieures \u00e0 16.8.5.1014.9","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Micrologiciels Intel Ethernet Controllers","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"Processeur Intel Server, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}},{"description":"9\u00e8me g\u00e9n\u00e9ration de processeur Intel Core, veuillez-vous r\u00e9ferer aux avis de l'\u00e9diteur pour plus d'Informations","product":{"name":"N/A","vendor":{"name":"Intel","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-28388","url":"https://www.cve.org/CVERecord?id=CVE-2023-28388"},{"name":"CVE-2023-25756","url":"https://www.cve.org/CVERecord?id=CVE-2023-25756"},{"name":"CVE-2023-29504","url":"https://www.cve.org/CVERecord?id=CVE-2023-29504"},{"name":"CVE-2023-32661","url":"https://www.cve.org/CVERecord?id=CVE-2023-32661"},{"name":"CVE-2022-41700","url":"https://www.cve.org/CVERecord?id=CVE-2022-41700"},{"name":"CVE-2022-43477","url":"https://www.cve.org/CVERecord?id=CVE-2022-43477"},{"name":"CVE-2023-39230","url":"https://www.cve.org/CVERecord?id=CVE-2023-39230"},{"name":"CVE-2023-33878","url":"https://www.cve.org/CVERecord?id=CVE-2023-33878"},{"name":"CVE-2022-24379","url":"https://www.cve.org/CVERecord?id=CVE-2022-24379"},{"name":"CVE-2023-32204","url":"https://www.cve.org/CVERecord?id=CVE-2023-32204"},{"name":"CVE-2023-28401","url":"https://www.cve.org/CVERecord?id=CVE-2023-28401"},{"name":"CVE-2023-27513","url":"https://www.cve.org/CVERecord?id=CVE-2023-27513"},{"name":"CVE-2023-38411","url":"https://www.cve.org/CVERecord?id=CVE-2023-38411"},{"name":"CVE-2023-28740","url":"https://www.cve.org/CVERecord?id=CVE-2023-28740"},{"name":"CVE-2023-27519","url":"https://www.cve.org/CVERecord?id=CVE-2023-27519"},{"name":"CVE-2023-36860","url":"https://www.cve.org/CVERecord?id=CVE-2023-36860"},{"name":"CVE-2023-39221","url":"https://www.cve.org/CVERecord?id=CVE-2023-39221"},{"name":"CVE-2023-32655","url":"https://www.cve.org/CVERecord?id=CVE-2023-32655"},{"name":"CVE-2023-27879","url":"https://www.cve.org/CVERecord?id=CVE-2023-27879"},{"name":"CVE-2023-24587","url":"https://www.cve.org/CVERecord?id=CVE-2023-24587"},{"name":"CVE-2022-46298","url":"https://www.cve.org/CVERecord?id=CVE-2022-46298"},{"name":"CVE-2023-28378","url":"https://www.cve.org/CVERecord?id=CVE-2023-28378"},{"name":"CVE-2023-22663","url":"https://www.cve.org/CVERecord?id=CVE-2023-22663"},{"name":"CVE-2023-22327","url":"https://www.cve.org/CVERecord?id=CVE-2023-22327"},{"name":"CVE-2022-43666","url":"https://www.cve.org/CVERecord?id=CVE-2022-43666"},{"name":"CVE-2023-22292","url":"https://www.cve.org/CVERecord?id=CVE-2023-22292"},{"name":"CVE-2023-22337","url":"https://www.cve.org/CVERecord?id=CVE-2023-22337"},{"name":"CVE-2022-34302","url":"https://www.cve.org/CVERecord?id=CVE-2022-34302"},{"name":"CVE-2022-27229","url":"https://www.cve.org/CVERecord?id=CVE-2022-27229"},{"name":"CVE-2023-25075","url":"https://www.cve.org/CVERecord?id=CVE-2023-25075"},{"name":"CVE-2023-28377","url":"https://www.cve.org/CVERecord?id=CVE-2023-28377"},{"name":"CVE-2023-28737","url":"https://www.cve.org/CVERecord?id=CVE-2023-28737"},{"name":"CVE-2023-32279","url":"https://www.cve.org/CVERecord?id=CVE-2023-32279"},{"name":"CVE-2023-22290","url":"https://www.cve.org/CVERecord?id=CVE-2023-22290"},{"name":"CVE-2023-39411","url":"https://www.cve.org/CVERecord?id=CVE-2023-39411"},{"name":"CVE-2023-39228","url":"https://www.cve.org/CVERecord?id=CVE-2023-39228"},{"name":"CVE-2023-34350","url":"https://www.cve.org/CVERecord?id=CVE-2023-34350"},{"name":"CVE-2023-33874","url":"https://www.cve.org/CVERecord?id=CVE-2023-33874"},{"name":"CVE-2023-28723","url":"https://www.cve.org/CVERecord?id=CVE-2023-28723"},{"name":"CVE-2023-28404","url":"https://www.cve.org/CVERecord?id=CVE-2023-28404"},{"name":"CVE-2023-20568","url":"https://www.cve.org/CVERecord?id=CVE-2023-20568"},{"name":"CVE-2021-46748","url":"https://www.cve.org/CVERecord?id=CVE-2021-46748"},{"name":"CVE-2023-28397","url":"https://www.cve.org/CVERecord?id=CVE-2023-28397"},{"name":"CVE-2023-22310","url":"https://www.cve.org/CVERecord?id=CVE-2023-22310"},{"name":"CVE-2023-29157","url":"https://www.cve.org/CVERecord?id=CVE-2023-29157"},{"name":"CVE-2023-22448","url":"https://www.cve.org/CVERecord?id=CVE-2023-22448"},{"name":"CVE-2023-27306","url":"https://www.cve.org/CVERecord?id=CVE-2023-27306"},{"name":"CVE-2023-26589","url":"https://www.cve.org/CVERecord?id=CVE-2023-26589"},{"name":"CVE-2022-34301","url":"https://www.cve.org/CVERecord?id=CVE-2022-34301"},{"name":"CVE-2023-40540","url":"https://www.cve.org/CVERecord?id=CVE-2023-40540"},{"name":"CVE-2023-25071","url":"https://www.cve.org/CVERecord?id=CVE-2023-25071"},{"name":"CVE-2023-22285","url":"https://www.cve.org/CVERecord?id=CVE-2023-22285"},{"name":"CVE-2023-24588","url":"https://www.cve.org/CVERecord?id=CVE-2023-24588"},{"name":"CVE-2023-34997","url":"https://www.cve.org/CVERecord?id=CVE-2023-34997"},{"name":"CVE-2023-28376","url":"https://www.cve.org/CVERecord?id=CVE-2023-28376"},{"name":"CVE-2023-29165","url":"https://www.cve.org/CVERecord?id=CVE-2023-29165"},{"name":"CVE-2022-29262","url":"https://www.cve.org/CVERecord?id=CVE-2022-29262"},{"name":"CVE-2022-41689","url":"https://www.cve.org/CVERecord?id=CVE-2022-41689"},{"name":"CVE-2023-40220","url":"https://www.cve.org/CVERecord?id=CVE-2023-40220"},{"name":"CVE-2022-36396","url":"https://www.cve.org/CVERecord?id=CVE-2022-36396"},{"name":"CVE-2022-36377","url":"https://www.cve.org/CVERecord?id=CVE-2022-36377"},{"name":"CVE-2023-20567","url":"https://www.cve.org/CVERecord?id=CVE-2023-20567"},{"name":"CVE-2023-38570","url":"https://www.cve.org/CVERecord?id=CVE-2023-38570"},{"name":"CVE-2022-36374","url":"https://www.cve.org/CVERecord?id=CVE-2022-36374"},{"name":"CVE-2022-33945","url":"https://www.cve.org/CVERecord?id=CVE-2022-33945"},{"name":"CVE-2022-46301","url":"https://www.cve.org/CVERecord?id=CVE-2022-46301"},{"name":"CVE-2023-38131","url":"https://www.cve.org/CVERecord?id=CVE-2023-38131"},{"name":"CVE-2022-46299","url":"https://www.cve.org/CVERecord?id=CVE-2022-46299"},{"name":"CVE-2023-31203","url":"https://www.cve.org/CVERecord?id=CVE-2023-31203"},{"name":"CVE-2022-41659","url":"https://www.cve.org/CVERecord?id=CVE-2022-41659"},{"name":"CVE-2023-23583","url":"https://www.cve.org/CVERecord?id=CVE-2023-23583"},{"name":"CVE-2023-27305","url":"https://www.cve.org/CVERecord?id=CVE-2023-27305"},{"name":"CVE-2023-32660","url":"https://www.cve.org/CVERecord?id=CVE-2023-32660"},{"name":"CVE-2023-32638","url":"https://www.cve.org/CVERecord?id=CVE-2023-32638"},{"name":"CVE-2023-34431","url":"https://www.cve.org/CVERecord?id=CVE-2023-34431"},{"name":"CVE-2023-32278","url":"https://www.cve.org/CVERecord?id=CVE-2023-32278"},{"name":"CVE-2023-22329","url":"https://www.cve.org/CVERecord?id=CVE-2023-22329"},{"name":"CVE-2023-33872","url":"https://www.cve.org/CVERecord?id=CVE-2023-33872"},{"name":"CVE-2022-33898","url":"https://www.cve.org/CVERecord?id=CVE-2022-33898"},{"name":"CVE-2023-29161","url":"https://www.cve.org/CVERecord?id=CVE-2023-29161"},{"name":"CVE-2023-32658","url":"https://www.cve.org/CVERecord?id=CVE-2023-32658"},{"name":"CVE-2022-46646","url":"https://www.cve.org/CVERecord?id=CVE-2022-46646"},{"name":"CVE-2023-32283","url":"https://www.cve.org/CVERecord?id=CVE-2023-32283"},{"name":"CVE-2023-31273","url":"https://www.cve.org/CVERecord?id=CVE-2023-31273"},{"name":"CVE-2022-46647","url":"https://www.cve.org/CVERecord?id=CVE-2022-46647"},{"name":"CVE-2022-29510","url":"https://www.cve.org/CVERecord?id=CVE-2022-29510"},{"name":"CVE-2023-25080","url":"https://www.cve.org/CVERecord?id=CVE-2023-25080"},{"name":"CVE-2023-22305","url":"https://www.cve.org/CVERecord?id=CVE-2023-22305"},{"name":"CVE-2023-28741","url":"https://www.cve.org/CVERecord?id=CVE-2023-28741"},{"name":"CVE-2023-25952","url":"https://www.cve.org/CVERecord?id=CVE-2023-25952"},{"name":"CVE-2023-25949","url":"https://www.cve.org/CVERecord?id=CVE-2023-25949"},{"name":"CVE-2023-32641","url":"https://www.cve.org/CVERecord?id=CVE-2023-32641"},{"name":"CVE-2023-22313","url":"https://www.cve.org/CVERecord?id=CVE-2023-22313"},{"name":"CVE-2022-45469","url":"https://www.cve.org/CVERecord?id=CVE-2022-45469"},{"name":"CVE-2023-34314","url":"https://www.cve.org/CVERecord?id=CVE-2023-34314"},{"name":"CVE-2022-34303","url":"https://www.cve.org/CVERecord?id=CVE-2022-34303"},{"name":"CVE-2023-39412","url":"https://www.cve.org/CVERecord?id=CVE-2023-39412"},{"name":"CVE-2022-42879","url":"https://www.cve.org/CVERecord?id=CVE-2022-42879"},{"name":"CVE-2022-45109","url":"https://www.cve.org/CVERecord?id=CVE-2022-45109"}],"links":[],"reference":"CERTFR-2023-AVI-0953","revisions":[{"description":"Version initiale","revision_date":"2023-11-16T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service, une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Intel du 14 novembre 2023","url":"https://www.intel.com/content/www/us/en/security-center/default.html"}]}
