{"document":{"acknowledgments":[{"urls":["https://kb.cert.org/vuls/id/796611#acknowledgements"]}],"category":"CERT/CC Vulnerability Note","csaf_version":"2.0","notes":[{"category":"summary","text":"### Overview\r\nThe InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM). \r\n\r\n### Description\r\nUEFI software provides an extensible interface between an operating system and platform firmware.  UEFI software uses a highly privileged processor execution mode called System Management Mode (SMM) for handling system-wide functions like power management, system hardware control, or proprietary OEM-designed code.  SMM's privileges, also referred to as \"Ring -2,\" exceed the privileges of the operating system's kernel (\"Ring-0\").  For this reason, SMM is executed in a protected area of memory called the SMRAM.  It is typically accessed via System Management Interrupt (SMI) Handlers using communication buffers, which are also known as \"SMM Comm Buffers.\"  The SMM also provides protection against SPI flash modifications and performs boot time verifications similar to those performed by [SecureBoot](https://wiki.ubuntu.com/UEFI/SecureBoot#What_is_UEFI_Secure_Boot.3F).\r\n\r\nUEFI software requires both openness (for hardware drivers, pluggable devices and Driver eXecution Environment (DXE) updates) as well as very tight security controls (for e.g., [SMM Comm Buffer Security](https://github.com/tianocore-docs/Docs/raw/master/White_Papers/A_Tour_Beyond_BIOS_Secure_SMM_Communication.pdf)), making it a complex software that needs a thorough set of security controls that need validation throughout the software's lifecycle.  UEFI also supports recent capabilities like Virtual Machine Manager (VMM) for virtualization and the increasing demand of virtual computing resources. \r\n\r\nInsyde's H2O UEFI firmware contains several (23) memory management vulnerabilities that were disclosed by [Binarly](https://www.binarly.io).  While these vulnerabilities were discovered in  [Fujitsu](https://www.fujitsu.com/global/) and [Bull Atos](https://atos.net/en/) implementations of Insyde H2O software, the same software is also present in many other vendor implementations due to the complex UEFI supply chain.  The vulnerabilities can be classified by the following [UEFI vulnerability categories](https://medium.com/firmware-threat-hunting/uefi-vulnerabilities-classification-4897596e60af).\r\n\r\n<table><thead><tr><td>Vulnerability Category</td> <td>Count </td>\r\n\t</tr>\r\n\t<thead>\r\n\t\t<tbody>\r\n\t\t\t<tr>\r\n\t\t\t\t<td>SMM Privilege Escalation</td><td> 10 </td>\r\n\t\t\t</tr>\r\n\t\t\t<tr>\r\n\t\t\t<td> SMM Memory Corruption </td> <td>12 </td>\r\n\t\t\t</tr>\r\n\t\t\t<tr>\r\n\t\t\t\t<td> DXE Memory Corruption </td><td>1</td>\r\n\t\t\t\t</tr>\r\n\t</tbody>\r\n\t</table>\r\n\r\n### Impact\r\nThe impacts of these vulnerabilities vary widely due to the nature of SMM capabilities. As an example, a local attacker with administrative privileges (or a remote attacker with administrative privileges)  can exploit these vulnerabilities to elevate privileges above the operating system to execute arbitrary code in SMM mode.    These attacks can be invoked  from the operating system using the unverified or unsafe SMI Handlers, and in some cases these bugs can also be triggered in the UEFI early boot phases ( as well as sleep and recovery like [ACPI](https://uefi.org/acpi)) before the operating system is initialized. \r\n\r\nIn summary, a local attacker with administrative privileges (in some cases a remote attacker with administrative privileges)  can use malicious software to perform any of the following:\r\n\r\n* Invalidate many hardware security features (SecureBoot, Intel [BootGuard](https://edk2-docs.gitbook.io/understanding-the-uefi-secure-boot-chain/secure_boot_chain_in_uefi/intel_boot_guard))\r\n* Install persistent software that cannot be easily erased\r\n* Create backdoors and back communications channels to exfiltrate sensitive data\r\n\r\n### Solution\r\nInstall the latest stable version of firmware provided by your PC vendor or your nearest reseller of your computing environments.  See the links below to resources and updates provided by specific vendors.  \r\n\r\nIf your operating system supports automatic or managed updates for firmware, such as [Linux Vendor Firmware Service](https://fwupd.org/) (LVFS), apply the related software security updates.  Binarly has also provided a set of UEFI software detection rules called [FwHunt rules]( https://github.com/binarly-io/FwHunt/tree/main/rules) to assist with identifying vulnerable software.  LVFS applies these FwHunt rules to detect and support the fix of firmware updates that are impacted by this advisory.\r\n\r\n### Acknowledgements\r\n The efiXplorer team of Binarly researched and reported these vulnerabilities to Insyde Software.  Insyde Software worked closely with CERT/CC during the coordinated disclosure process for these vulnerabilities.\r\n\r\nThis document was written by Vijay Sarvepalli.","title":"Summary"},{"category":"legal_disclaimer","text":"THIS DOCUMENT IS PROVIDED ON AN 'AS IS' BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. ","title":"Legal Disclaimer"},{"category":"other","text":"CERT/CC Vulnerability Note is a limited advisory. It primarily identifies vendors impacted by the advisory and not specific products. We only support \"known_affected\" and \"known_not_affected\" status. Please consult the vendor's statements and advisory URL if provided by the vendor for more details ","title":"Limitations of Advisory"},{"category":"other","text":"HPE has evaluated the integration of the InsydeH20 UEFI BIOS in HPE products. Most HPE products do not integrate, include, or use the InsydeH20 UEFI BIOS and are therefore not affected by these vulnerabilities. A small number of HPE products do include the InsydeH20 UEFI BIOS, but are not affected by these vulnerabilities due to the way the InsydeH20 UEFI BIOS is implemented. Some HPE Aruba products use the InsydeH20 UEFI BIOS and they are affected by some of these vulnerabilities.\r\n\r\nDETAILS\r\nFor more information about the HPE Aruba products affected by the InsydeH20 UEFI BIOS vulnerabilities, see the following Aruba Product Security Advisories:\r\n\r\nhttps://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-001.txt  Non-HPE site\r\n\r\nhttps://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-002.txt  Non-HPE site","title":"Vendor statment from Hewlett Packard Enterprise"},{"category":"other","text":"On February 1st, 2022, CERT-CC, Insyde Inc., and Binarly Inc. collectively disclosed a set of vulnerabilities affecting InsydeH2O Hardware-2-Operating System (H2O) UEFI Bios. \r\nThese vulnerabilities generalize to all Intel configurations a 2020 vulnerability affecting a version of InsydeH2O that supported a specific Intel chipset (CVE-2020-5953). They affect any product using UEFI Bios based on InsydeH2O, including some BullSequana products. \r\nAtos is liaising closely with its suppliers and investigating the exact nature of these vulnerabilities to provide validated remediation.","title":"Vendor statment from Atos SE"},{"category":"other","text":"Aruba has published information about products affected by these vulnerabilities at https://www.arubanetworks.com/support-services/security-bulletins/ with the specific URLs listed as references.","title":"Vendor statment from Aruba Networks"},{"category":"other","text":"Our review indicates that our firmware code is Not Affected by these vulnerabilities.","title":"Vendor statment from Phoenix Technologies"},{"category":"other","text":"Not affected","title":"Vendor statment from Rockwell Automation"},{"category":"other","text":"Fujitsu is aware of the security vulnerabilities in Insyde firmware (InsydeH2O UEFI-BIOS).\r\n\r\nAffected products are Fujitsu CCD (Client Computing Device) mobile devices.\r\n\r\nThe Fujitsu PSIRT released FCCL-IS-2021-090903 on https://security.ts.fujitsu.com (Security Advisories) accordingly.\r\n\r\nIn case of questions regarding this Fujitsu PSIRT Security Notice, please contact the Fujitsu PSIRT (Fujitsu-PSIRT@ts.fujitsu.com).","title":"Vendor statment from Fujitsu"},{"category":"other","text":"NetApp is still investigating some vulnerabilities disclosed. Visit NetApp Advisory page for details. https://security.netapp.com/advisory/","title":"CERT/CC comment on NetApp notes"},{"category":"other","text":"These issues affect a broad range of Insyde's InsydeH2O products. They are not chipset specific, but they are specific to kernel versions, which are listed with each statement. We have disclosed these to all affected customers.","title":"Vendor statment from Insyde Software Corporation"}],"publisher":{"category":"coordinator","contact_details":"Email: cert@cert.org, Phone: +1412 268 5800","issuing_authority":"CERT/CC under DHS/CISA https://www.cisa.gov/cybersecurity also see https://kb.cert.org/ ","name":"CERT/CC","namespace":"https://kb.cert.org/"},"references":[{"url":"https://certcc.github.io/certcc_disclosure_policy","summary":"CERT/CC vulnerability disclosure policy"},{"summary":"CERT/CC document released","category":"self","url":"https://kb.cert.org/vuls/id/796611"},{"url":"https://www.insyde.com/security-pledge","summary":"https://www.insyde.com/security-pledge"},{"url":"https://github.com/binarly-io/Vulnerability-REsearch/tree/main/Insyde","summary":"https://github.com/binarly-io/Vulnerability-REsearch/tree/main/Insyde"},{"url":"https://github.com/binarly-io/Research_Publications/blob/main/OSFC_2021/The%20firmware%20supply-chain%20security%20is%20broken!%20Can%20we%20fix%20it%3F.pdf","summary":"https://github.com/binarly-io/Research_Publications/blob/main/OSFC_2021/The%20firmware%20supply-chain%20security%20is%20broken!%20Can%20we%20fix%20it%3F.pdf"},{"url":"https://www.microsoft.com/security/blog/2020/11/12/system-management-mode-deep-dive-how-smm-isolation-hardens-the-platform/","summary":"https://www.microsoft.com/security/blog/2020/11/12/system-management-mode-deep-dive-how-smm-isolation-hardens-the-platform/"},{"url":"https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html","summary":"https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html"},{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-001.txt","summary":"Reference(s) from vendor \"Aruba Networks\""},{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-002.txt","summary":"Reference(s) from vendor \"Aruba Networks\""},{"url":"https://support.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FCCL-IS-2021-090903-Security-Advisory.asp?lng=com","summary":"Reference(s) from vendor \"Fujitsu\""},{"url":"https://security.netapp.com/advisory/ntap-20220217-0014/","summary":"Reference(s) from vendor \"NetApp\""},{"url":"https://security.netapp.com/advisory/ntap-20220216-0004/","summary":"Reference(s) from vendor \"NetApp\""},{"url":"https://security.netapp.com/advisory/ntap-20220217-0014/","summary":"Reference(s) from vendor \"NetApp\""}],"title":"InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM","tracking":{"current_release_date":"2023-07-17T14:56:15+00:00","generator":{"engine":{"name":"VINCE","version":"3.0.35"}},"id":"VU#796611","initial_release_date":"2022-02-01 19:04:02.788344+00:00","revision_history":[{"date":"2023-07-17T14:56:15+00:00","number":"1.20230717145615.15","summary":"Released on 2023-07-17T14:56:15+00:00"}],"status":"final","version":"1.20230717145615.15"}},"vulnerabilities":[{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(CommBuffer).","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(CommBuffer).  This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. See further details in attachment BRLY-2021-011.md."}],"cve":"CVE-2021-33627","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-569c9288-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a0540e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a2c022-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56993a66-39d9-11f1-8422-122e2785dc9f","CSAFPID-569a75a2-39d9-11f1-8422-122e2785dc9f","CSAFPID-569abbde-39d9-11f1-8422-122e2785dc9f","CSAFPID-569f9a0a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a08b7c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a1d054-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a383a4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a41364-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A security issue was found in certain models of Fujitsu LIFEBOOK that can allow an an attacker to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode (SMM).","notes":[{"category":"summary","text":"A security issue was found in certain models of Fujitsu LIFEBOOK that can allow an an attacker to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode (SMM).  See BRLY-2021-014.md for more details."}],"cve":"CVE-2022-28806","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56ab11b4-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56a5260a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a57934-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a8e09c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56a91b02-39d9-11f1-8422-122e2785dc9f","CSAFPID-56abd946-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ac29dc-39d9-11f1-8422-122e2785dc9f","CSAFPID-56acb906-39d9-11f1-8422-122e2785dc9f","CSAFPID-56acfc04-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ad767a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56adea92-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ae7d2c-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table variable EFI_BOOT_SERVICES.","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table variable EFI_BOOT_SERVICES.  This can be used by an attacker to overwrite address location of any of the functions (FreePool,LocateHandleBuffer,HandleProtocol) to the address location of arbitrary code controlled by the attacker. On system call to SWSMI handler, the arbitrary code can be triggered to execute . See further details in attachment BRLY-2021-017.md."}],"cve":"CVE-2021-41839","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56af48c4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b04508-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b1fe16-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56af7308-39d9-11f1-8422-122e2785dc9f","CSAFPID-56afb1f6-39d9-11f1-8422-122e2785dc9f","CSAFPID-56afef4a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b0fc14-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b18558-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b1c5f4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b23f5c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b27800-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table variables EFI_BOOT_SERVICES and EFI_RUNTIME_SERVICES.","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table variables EFI_BOOT_SERVICES and EFI_RUNTIME_SERVICES.  This can be used by an attacker to overwrite address location of the function (LocateHandleBuffer) to the address location of arbitrary code controlled by the attacker. On system call to SWSMI handler, the arbitrary code can be triggered to execute . See further details in attachment BRLY-2021-018.md."}],"cve":"CVE-2021-41841","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56b415f2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b521d6-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b5d220-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56b307f2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b35ca2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b3c944-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b494be-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b56fd8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b5a7d2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b5fe44-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b629f0-39d9-11f1-8422-122e2785dc9f"]}},{"title":"An unsafe pointer  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler.","notes":[{"category":"summary","text":"An unsafe pointer  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler.  An attacker can use this  unsafe pointer \"current_ptr\" to read or write or manipulate data into SMRAM.  Exploitation of this vulnerability can lead to escalation of privileges reserved only for SMM using the SwSMI handler. See further details in attachment BRLY-2021-009.md."}],"cve":"CVE-2021-41837","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56b78eb2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b8ba80-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bb3a58-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56b6adbc-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b6f740-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b73c50-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b82bba-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b8e99c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56b92c22-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bb8c1a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bbbcb2-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table  EFI_BOOT_SERVICES.","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table  EFI_BOOT_SERVICES.  This can be used by an attacker to overwrite service EFI_BOOT_SERVICES address location to the address location of arbitrary code controlled by the attacker. On system call to SWSMI handler, the arbitrary code can be triggered to execute the unwanted code. See further details in attachment BRLY-2021-020.md."}],"cve":"CVE-2020-27339","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56bd0806-39d9-11f1-8422-122e2785dc9f","CSAFPID-56be4630-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56bc549c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bc93a8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bccf26-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bd3c72-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bd84f2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bdbf9e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56be7ff6-39d9-11f1-8422-122e2785dc9f","CSAFPID-56becd12-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bf1484-39d9-11f1-8422-122e2785dc9f","CSAFPID-56bf594e-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(status code saved at CommBuffer+4 location).","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(status code saved at CommBuffer+4 location).  This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. See further details in attachment BRLY-2021-015.md."}],"cve":"CVE-2021-45970","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56bfd0d6-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c1fd2a-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56c01e9c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c0593e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c0a5e2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c0ff60-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c14d30-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c1c4f4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c22674-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c25b8a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c2a28e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c2cc3c-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in child SW SMI handler registered with GUID `56947330-585c-4470-a95d-c55c529feb47` and located at offset `0x1328` in the driver.  See BRLY-2021-025.md for details."}],"cve":"CVE-2022-24069","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56c54cc8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c59606-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c65e2e-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56c34964-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c372ae-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c3ab84-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c47e42-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c510f0-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c5f920-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c6335e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c69632-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c6c9a4-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer).","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer).  This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. See further details in attachment BRLY-2021-013.md."}],"cve":"CVE-2021-33626","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56c83122-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c936e4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c9e30a-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56c74b22-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c799c4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c7e2a8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c8c394-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c979b0-39d9-11f1-8422-122e2785dc9f","CSAFPID-56c9abec-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ca185c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ca4a16-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in  SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM.","notes":[{"category":"summary","text":"A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in  SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2). This was tested and confirmed on a Fujitsu LIFEBOOK E449/E459.  Reference Binarly ID - see attachment BRLY-2021-008.md for details."}],"cve":"CVE-2020-5953","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56cacc70-39d9-11f1-8422-122e2785dc9f","CSAFPID-56cc1706-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ccfef0-39d9-11f1-8422-122e2785dc9f","CSAFPID-56cd3096-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56cb3782-39d9-11f1-8422-122e2785dc9f","CSAFPID-56cb8480-39d9-11f1-8422-122e2785dc9f","CSAFPID-56cbd08e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ccb1ca-39d9-11f1-8422-122e2785dc9f","CSAFPID-56cde3ba-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ce505c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56cea80e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56cef494-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table variable EFI_BOOT_SERVICES.","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated table variable EFI_BOOT_SERVICES.  This allows an attacker who is capable of executing code in DXE phase to exploit this vulnerability to escalate privileges to SMM.  The attacker can overwrite the LocateProtocol or Freepool memory address location to execute unwanted code . See further details in attachment BRLY-2021-019.md."}],"cve":"CVE-2021-41840","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56d0cdf0-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d165da-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d28032-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56cfe052-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d01c0c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d08d72-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d11742-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d19b72-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d21fca-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d25634-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d2c63c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d31916-39d9-11f1-8422-122e2785dc9f"]}},{"title":"An unsafe pointer  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler.","notes":[{"category":"summary","text":"An unsafe pointer  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler.  An attacker can use this unsafe pointer \"ptr\" to read or write or manipulate data in the SMRAM.  Exploitation of this vulnerability can lead to escalation of privileges reserved only for SMM using the SwSMI handler. See further details in attachment BRLY-2021-010.md."}],"cve":"CVE-2021-41838","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56d48828-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d5b720-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d65c7a-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56d3a462-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d3f228-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d427ca-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d527c4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d5f8f2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d629f8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d6ac34-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d6dc40-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(CommBuffer + 8 location).","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(CommBuffer + 8 location).  This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. See further details in attachment BRLY-2021-016.md."}],"cve":"CVE-2021-45969","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56d8d126-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d913ca-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d9f2b8-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56d75d78-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d786a4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d7aff8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d81d6c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d897ec-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d94e9e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56d99138-39d9-11f1-8422-122e2785dc9f","CSAFPID-56da63e2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56daa3de-39d9-11f1-8422-122e2785dc9f"]}},{"title":"The stack buffer overflow vulnerability leads to arbitrary code execution in UEFI DXE driver on BullSequana Edge server.","notes":[{"category":"summary","text":"The stack buffer overflow vulnerability leads to arbitrary code execution in UEFI DXE driver on BullSequana Edge server.  See BRLY-2021-021.md for further details."}],"cve":"CVE-2021-42059","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56dd0a3e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56dde77e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56de8288-39d9-11f1-8422-122e2785dc9f","CSAFPID-56df5e42-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56db3e2a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56dbb4ea-39d9-11f1-8422-122e2785dc9f","CSAFPID-56dcabfc-39d9-11f1-8422-122e2785dc9f","CSAFPID-56dd7ea6-39d9-11f1-8422-122e2785dc9f","CSAFPID-56dda926-39d9-11f1-8422-122e2785dc9f","CSAFPID-56dec66c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56df0820-39d9-11f1-8422-122e2785dc9f","CSAFPID-56dfa28a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56dfef2e-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server.    The vulnerability exists in SW SMI handler registered with number 0xF9 and located at offset 0x06F0 in the driver. See BRLY-2021-022.md for further details."}],"cve":"CVE-2021-42060","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56e1b26e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e1e072-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e27cd0-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56e06a58-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e0a6b2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e0dbc8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e110b6-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e181fe-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e21dee-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e2549e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e2cc08-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e2f49e-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in child SW SMI handler registered with GUID `1d3de7f0-0807-424f-aa69-11a54e19a46f` and located at offset `0x1E0C` in the driver.  See BRLY-2021-023.md for further details."}],"cve":"CVE-2021-42113","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56e44d62-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e50d10-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e55464-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e5eac8-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56e391ba-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e3e1ce-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e41392-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e4911e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e4d6e2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e58dda-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e5c106-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e61aac-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e6530a-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in child SW SMI handler registered with GUID `56947330-585c-4470-a95d-c55c529feb47` and located at offset `0x1328` in the driver.  See BRLY-2021-026.md for details."}],"cve":"CVE-2022-24030","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56e8b230-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e8ea2a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e9c3f0-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56e6e22a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e72ee2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e77d3e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e7dfd6-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e86762-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e92300-39d9-11f1-8422-122e2785dc9f","CSAFPID-56e9677a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ea0040-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ea41b8-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in SW SMI handler registered with number `0x16` and located at offset `0x3DBC` in the driver. See BRLY-2021-027.md for details."}],"cve":"CVE-2021-42554","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56ebbaca-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ebfb98-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ecda0e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ed6d98-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56eaea78-39d9-11f1-8422-122e2785dc9f","CSAFPID-56eb2a88-39d9-11f1-8422-122e2785dc9f","CSAFPID-56eb684a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56eca3a4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ed0b50-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ed34ae-39d9-11f1-8422-122e2785dc9f","CSAFPID-56edc234-39d9-11f1-8422-122e2785dc9f","CSAFPID-56edef5c-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in SW SMI handler registered with GUID `9c28be0c-ee32-43d8-a223-e7c1614ef7ca` and located at offset `0x23B0` in the driver.  See BRLY-2021-028.md for further details."}],"cve":"CVE-2021-43615","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56efd75e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f028c6-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f0e7b6-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56ee6036-39d9-11f1-8422-122e2785dc9f","CSAFPID-56eead48-39d9-11f1-8422-122e2785dc9f","CSAFPID-56eeec36-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ef3df8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ef71ba-39d9-11f1-8422-122e2785dc9f","CSAFPID-56efa914-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f066ec-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f0ab20-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f11876-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f14242-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in SW SMI handler registered with GUID `9c28be0c-ee32-43d8-a223-e7c1614ef7ca` and located at offset `0x23B0` in the driver. See BRLY-2021-029.md for details."}],"cve":"CVE-2021-33625","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56f28a58-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f348bc-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f37774-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f45cde-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56f1ca28-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f205b0-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f23bc0-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f2fdd0-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f3d570-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f40d7e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f49834-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f4d236-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in SW SMI handler registered with GUID `52c78312-8edc-4233-98f2-1a1aa5e388a5` and located at offset `0x2090` in the driver.  See BRLY-2021-030.md for details."}],"cve":"CVE-2022-24031","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56f6c758-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f70308-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f79944-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56f581fe-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f5bee4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f61650-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f641ac-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f69698-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f72c5c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f75538-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f7c748-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f80af0-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM callout vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in SW SMI handler registered with number `0xFD` and located at offset `0x291C` in the driver.  See BRLY-2021-031.md for details."}],"cve":"CVE-2021-43323","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56f9147c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f9c75a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f9f3e2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fab80e-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56f8722e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f8a5d2-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f8d61a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56f96e7c-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fa373a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fa7b0a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56faed2e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fb302c-39d9-11f1-8422-122e2785dc9f"]}},{"title":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server.","notes":[{"category":"summary","text":"SMM memory corruption vulnerability in combined DXE/SMM driver on BullSequana Edge server. The vulnerability exists in child SW SMI handler registered with GUID `1d3de7f0-0807-424f-aa69-11a54e19a46f` and located at offset `0x1E0C` in the driver.  See BRLY-2021-024.md for further details."}],"cve":"CVE-2021-43522","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-56fc3d78-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fce3a4-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fd457e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fded12-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56fb8acc-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fbcb4a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fc0812-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fc74dc-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fcab6e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fd88b8-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fdb752-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fe2b1a-39d9-11f1-8422-122e2785dc9f","CSAFPID-56fe686e-39d9-11f1-8422-122e2785dc9f"]}},{"title":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(CommBufferData).","notes":[{"category":"summary","text":"A  vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(CommBufferData).  This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. See further details in attachment BRLY-2021-012.md."}],"cve":"CVE-2021-45971","ids":[{"system_name":"CERT/CC V Identifier ","text":"VU#796611"}],"product_status":{"known_affected":["CSAFPID-57003860-39d9-11f1-8422-122e2785dc9f","CSAFPID-5700bb1e-39d9-11f1-8422-122e2785dc9f","CSAFPID-5701363e-39d9-11f1-8422-122e2785dc9f"],"known_not_affected":["CSAFPID-56fedb00-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ff121e-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ff3d84-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ff7b96-39d9-11f1-8422-122e2785dc9f","CSAFPID-56ffb0fc-39d9-11f1-8422-122e2785dc9f","CSAFPID-570069fc-39d9-11f1-8422-122e2785dc9f","CSAFPID-570102fe-39d9-11f1-8422-122e2785dc9f","CSAFPID-57017482-39d9-11f1-8422-122e2785dc9f","CSAFPID-5701b8a2-39d9-11f1-8422-122e2785dc9f"]}}],"product_tree":{"branches":[{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56993a66-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-569a75a2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-569abbde-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-569c9288-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-569f2548-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-569f9a0a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56a00936-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56a0540e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56a08b7c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56a1d054-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56a2c022-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56a383a4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56a41364-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56a5260a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56a57934-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56a8e09c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56a91b02-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56ab11b4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56abd946-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56ac29dc-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56acb906-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56acfc04-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56ad767a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56adea92-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56ae7d2c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56af48c4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56af7308-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56afb1f6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56afef4a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56b04508-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56b06fba-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56b0fc14-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56b1485e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56b18558-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56b1c5f4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56b1fe16-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56b23f5c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56b27800-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56b307f2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56b35ca2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56b3c944-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56b415f2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56b450a8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56b494be-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56b4da50-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56b521d6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56b56fd8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56b5a7d2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56b5d220-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56b5fe44-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56b629f0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56b6adbc-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56b6f740-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56b73c50-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56b78eb2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56b7e6a0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56b82bba-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56b8705c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56b8ba80-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56b8e99c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56b92c22-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56bb3a58-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56bb8c1a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56bbbcb2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56bc549c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56bc93a8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56bccf26-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56bd0806-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56bd3c72-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56bd84f2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56bdbf9e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56bdfd9c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56be4630-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56be7ff6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56becd12-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56bf1484-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56bf594e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56bfd0d6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56c01e9c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56c0593e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56c0a5e2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56c0ff60-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56c14d30-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56c182e6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56c1c4f4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56c1fd2a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56c22674-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56c25b8a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56c2a28e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56c2cc3c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56c34964-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56c372ae-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56c3ab84-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56c47e42-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56c4ca32-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56c510f0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56c54cc8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56c59606-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56c5f920-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56c6335e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56c65e2e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56c69632-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56c6c9a4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56c74b22-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56c799c4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56c7e2a8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56c83122-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56c8913a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56c8c394-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56c8f648-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56c936e4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56c979b0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56c9abec-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56c9e30a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56ca185c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56ca4a16-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56cacc70-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56cb3782-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56cb8480-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56cbd08e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56cc1706-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56cc60f8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56ccb1ca-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56ccfef0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56cd3096-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56cde3ba-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56ce505c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56cea80e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56cef494-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56cfe052-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56d01c0c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56d08d72-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56d0cdf0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56d11742-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56d165da-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56d19b72-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56d1e212-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56d21fca-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56d25634-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56d28032-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56d2c63c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56d31916-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56d3a462-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56d3f228-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56d427ca-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56d48828-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56d4c05e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56d527c4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56d58732-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56d5b720-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56d5f8f2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56d629f8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56d65c7a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56d6ac34-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56d6dc40-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56d75d78-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56d786a4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56d7aff8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56d81d6c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56d86740-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56d897ec-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56d8d126-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56d913ca-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56d94e9e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56d99138-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56d9f2b8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56da63e2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56daa3de-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56db3e2a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56dbb4ea-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56dcabfc-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56dd0a3e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56dd7ea6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56dda926-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56dde77e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56de8288-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56dec66c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56df0820-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56df5e42-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56dfa28a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56dfef2e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56e06a58-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56e0a6b2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56e0dbc8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56e110b6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56e142ac-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56e181fe-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56e1b26e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56e1e072-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56e21dee-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56e2549e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56e27cd0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56e2cc08-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56e2f49e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56e391ba-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56e3e1ce-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56e41392-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56e44d62-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56e4911e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56e4d6e2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56e50d10-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56e55464-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56e58dda-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56e5c106-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56e5eac8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56e61aac-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56e6530a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56e6e22a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56e72ee2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56e77d3e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56e7dfd6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56e823a6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56e86762-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56e8b230-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56e8ea2a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56e92300-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56e9677a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56e9c3f0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56ea0040-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56ea41b8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56eaea78-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56eb2a88-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56eb684a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56ebbaca-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56ebfb98-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56ec571e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56eca3a4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56ecda0e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56ed0b50-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56ed34ae-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56ed6d98-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56edc234-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56edef5c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56ee6036-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56eead48-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56eeec36-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56ef3df8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56ef71ba-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56efa914-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56efd75e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56f028c6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56f066ec-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56f0ab20-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56f0e7b6-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56f11876-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56f14242-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56f1ca28-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56f205b0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56f23bc0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56f28a58-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56f2cc7a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56f2fdd0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56f348bc-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56f37774-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56f3d570-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56f40d7e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56f45cde-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56f49834-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56f4d236-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56f581fe-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56f5bee4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56f61650-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56f641ac-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56f66dd0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56f69698-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56f6c758-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56f70308-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56f72c5c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56f75538-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56f79944-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56f7c748-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56f80af0-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56f8722e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56f8a5d2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56f8d61a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56f9147c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56f94366-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56f96e7c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56f9c75a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56f9f3e2-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56fa373a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56fa7b0a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56fab80e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56faed2e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56fb302c-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56fb8acc-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56fbcb4a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56fc0812-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56fc3d78-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-56fc74dc-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-56fcab6e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-56fce3a4-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-56fd457e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56fd88b8-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-56fdb752-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-56fded12-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-56fe2b1a-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-56fe686e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"AMD","product":{"name":"AMD Products","product_id":"CSAFPID-56fedb00-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Phoenix Technologies","product":{"name":"Phoenix Technologies Products","product_id":"CSAFPID-56ff121e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Hewlett Packard Enterprise","product":{"name":"Hewlett Packard Enterprise Products","product_id":"CSAFPID-56ff3d84-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Aruba Networks","product":{"name":"Aruba Networks Products","product_id":"CSAFPID-56ff7b96-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Toshiba Corporation","product":{"name":"Toshiba Corporation Products","product_id":"CSAFPID-56ffb0fc-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"NetApp","product":{"name":"NetApp Products","product_id":"CSAFPID-57000890-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Insyde Software Corporation","product":{"name":"Insyde Software Corporation Products","product_id":"CSAFPID-57003860-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"American Megatrends Incorporated (AMI)","product":{"name":"American Megatrends Incorporated (AMI) Products","product_id":"CSAFPID-570069fc-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Atos SE","product":{"name":"Atos SE Products","product_id":"CSAFPID-5700bb1e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Intel","product":{"name":"Intel Products","product_id":"CSAFPID-570102fe-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Fujitsu","product":{"name":"Fujitsu Products","product_id":"CSAFPID-5701363e-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Supermicro","product":{"name":"Supermicro Products","product_id":"CSAFPID-57017482-39d9-11f1-8422-122e2785dc9f"}},{"category":"vendor","name":"Rockwell Automation","product":{"name":"Rockwell Automation Products","product_id":"CSAFPID-5701b8a2-39d9-11f1-8422-122e2785dc9f"}}]}}