U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2019-14558

Change History

Initial Analysis by NIST 10/22/2020 2:55:25 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:celeron_5205u:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_8100:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_8100f:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_8100t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_8300:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_8300t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_8350k:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_9100:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_9100f:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_9100t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_9300:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_9300t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_9320:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_9350k:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i3_9350kf:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_8400:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_8400t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_8500:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_8500t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_8600:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_8600k:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_8600t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9400:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9400f:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9400t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9500:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9500f:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9500t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9600:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9600k:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9600kf:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i5_9600t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_1060g7:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_1060ng7:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_1065g7:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_1068ng7:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_8086k:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_8700:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_8700k:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_8700t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_9700:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_9700f:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_9700k:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_9700kf:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i7_9700t:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i9_9900:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i9_9900k:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i9_9900kf:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i9_9900ks:-:*:*:*:*:*:*:*
          cpe:2.3:h:intel:core_i9_9900t:-:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
NIST (AV:A/AC:L/Au:S/C:N/I:N/A:P)
Added CVSS V3.1

								
							
							
						
NIST AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST NVD-CWE-Other
Changed Reference Type
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html No Types Assigned
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html Vendor Advisory