U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2017-3718

Change History

Initial Analysis by NIST 2/01/2019 8:47:24 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:intel:compute_card_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:intel:compute_card_cd1iv128mk:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:compute_card_cd1m3128mk:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:compute_card_cd1p64gk:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:intel:compute_stick_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:intel:compute_stick_stck1a32wfc:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:compute_stick_stk1aw32sc:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:compute_stick_stk2m3w64cc:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:compute_stick_stk2mv64cc:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:intel:nuc_kit_firmware:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:intel:nuc_kit_d33217gke:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_d53427rke:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_d54250wyb:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_de3815tybe:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_dn2820fykh:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc5cpyh:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc5i3myhe:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc5i5myhe:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc5i7ryh:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc5pgyh:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc6cays:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc6i5syh:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc6i7kyk:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc7cjyh:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc7i3dnhe:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc7i5dnke:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc7i7bnh:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc7i7dnke:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:nuc_kit_nuc8i7hnk:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-264
Changed Reference Type
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00144.html No Types Assigned
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00144.html Patch, Vendor Advisory