Vulnerabilites related to cisco - 4351\/k9_integrated_services_router
Vulnerability from fkie_nvd
Published
2020-09-24 18:15
Modified
2024-11-21 05:31
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the IP Address Resolution Protocol (ARP) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers with a 20-Gbps Embedded Services Processor (ESP) installed could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service condition. The vulnerability is due to insufficient error handling when an affected device has reached platform limitations. An attacker could exploit this vulnerability by sending a malicious series of IP ARP messages to an affected device. A successful exploit could allow the attacker to exhaust system resources, which would eventually cause the affected device to reload.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", matchCriteriaId: "296636F1-9242-429B-8472-90352C056106", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", matchCriteriaId: "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.7\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "24A0A74F-82C8-4FE2-9D8B-97C2ED47AF50", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", matchCriteriaId: "E306B09C-CB48-4067-B60C-5F738555EEAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "1E4031A7-0B19-4CDC-9729-BAFBE943B6AF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7EE4F60E-DF3D-4839-8731-7CF16DA8FF26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8EA5EEE3-A084-46B4-84C0-ADFD69800649", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "592F67D5-344B-49AF-A277-1089A40AC2FD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A369CD35-1242-4556-A83D-BD69CC149CFA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "784A1499-1F33-493D-B433-EB2550C03C19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CECFC88D-5480-46E4-BF74-E11A514A8BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E54D16A8-0407-41E3-9599-9A6F57E1AA75", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DF3818CC-8653-4A9E-A57B-950A15914D6B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7EDC790B-B42D-45DB-ACF5-A789F76C2BC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2A6BC84-91F2-437D-9D2E-F8B3F5966767", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7F331F13-5D05-4213-B442-D48D8E22287B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A6E312F4-90DA-40E4-BCD1-92F41BEEEECF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CA32EA3F-946D-430D-B00F-939D828DD72C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D239A09C-34D2-4418-B538-03A1080B8479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2C84561E-DD99-4433-9EF2-083F7C300123", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B29871BE-CA7D-4108-B46A-CBD539C9A2B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "39CD9189-6524-4157-B90E-FF6A81DE3599", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2CF1B702-643A-4AF2-B0AD-3C540CF85F2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "96269625-CB31-4850-872B-B2C1321B13B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5BDE086A-3FE5-46E3-BD66-23D0AE5089BE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "FA53775A-D3ED-4D34-8338-A384DBEB94E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7D4522-D6BB-467F-AF5D-4D753A89D524", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0C680534-C663-40B0-A4AA-7F292EE60FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "BAF4F233-7B47-46ED-BDC5-A589BCFC0B39", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A528EC0-4650-4787-BE52-A588E7E38A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "53898E96-03D6-43A2-AE05-46C62464BD26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*", matchCriteriaId: "465917E5-8BF0-4BBB-85A0-DE8F516880C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D9FA66D9-E465-406E-A95C-608A1BE34D74", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "1456B204-A2A5-4790-A684-7F50D692EC9F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "AD715BDD-7C74-4785-BEDF-75918F6FB37A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4CD10664-94D0-48C0-92EF-E8EA66841245", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "071A47F9-FF35-4F2C-BF5D-897CAC8BC08A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "9E988448-36C9-47E0-9356-DA400EB824E3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "9D067EF9-00DB-4979-B12E-55749059A083", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A9FA300A-44B1-44EE-8111-C1296EB0B638", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8598A543-B30B-4BD4-9974-F432FFFDCDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "48DEBBAD-D28D-4784-BBD8-9FAD1710A919", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8A5FC516-6B48-4D77-B26D-FA097AC91D1A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "6A7437E4-5C09-436C-AFBC-F6B6747A4339", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ECBC0277-4990-4DE7-AD80-20E8A6F561D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7DAF69-662B-4999-A6AD-AA528B53EAF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D28306B1-3DDE-4444-9784-522B3D2163EE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "9257D187-1F2D-40F4-8C87-78978DB56C3F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AF8261-74E0-4F53-B82C-A7BA7559D7CB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "25AE251E-E99F-4546-85B0-C57834B040B7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C62FFCB9-4253-459B-9298-C252DA9177DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2A8413-DF92-4690-8BC1-A21001BDF76B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "882B8D8F-E154-45C3-BB47-5353167C9776", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A54B4EB4-EB41-4522-B7AB-C30F96099EA3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EAD7BE51-0BA6-4750-B274-A6E33D32B484", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "44C3EF8E-DF88-46DC-8E06-B009F346D1D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7E87F823-D924-4718-AD81-248A6C619531", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC866C9-BB98-4320-9FFA-F0960C560DA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C3AD7495-3DA2-4596-9620-CD36D7C561AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E492F3F8-4188-41E4-9A84-5E30C4AC3378", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "718F2FDC-9EA4-4C4C-8821-B15E56AF8101", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E45BCCD0-65BB-431F-B448-221C1595CD92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F33BA722-0680-4074-8D03-41657F8CDCC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "431570C7-74A1-4F7E-8FD0-690AEF0F823B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C5D22E15-E1E8-4115-A55F-5743CA9C5947", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B240B20-CF48-4A72-9653-9D04D59C1391", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", matchCriteriaId: "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", matchCriteriaId: "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74CCD143-3D6E-4880-B275-ECF5B04238C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D3784F-C572-4A6F-83B9-BCF64D339BC9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E09C466B-CE87-4A57-B40B-88C94BAAF36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", matchCriteriaId: "D58FF034-8E07-4518-A858-5F16F22217E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "376AD386-373D-4B24-966F-D11F76C9020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2280CAA3-03F6-4168-8E50-A6B7132A3B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0C1174-C789-4547-9899-F7FCD0905F92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EC366801-655A-403B-ACD9-3BB43802A3C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "05D4D7E4-B195-46D8-8A6B-6AA4B8357618", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "39600E51-4A21-4E5B-9FF9-E7C00AE86646", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B13D6D50-D0FA-4527-BED3-52560DDD5253", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "965BF315-D833-4711-97FC-512151113367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "04072C0F-78A2-4D10-87B2-52DC2537BA89", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5C080E-D5C4-47B2-A46C-4EB3051C5221", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "41CEBEE0-DA67-4EE5-9BCF-263843053A8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FD262F58-C47F-439E-A9FF-D1C60120D306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c3850-12x48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "8B9D6819-2CFC-428A-8C51-F0D4C55D5B29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c3850-12x48u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "B3ECDFFB-DAD1-4BF6-85E1-1E8F94F991EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c3850-12x48u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F80AC0C7-6E96-4A72-B330-33BAF004B4C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", matchCriteriaId: "119A964D-ABC8-424D-8097-85B832A833BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", matchCriteriaId: "5A6B707B-4543-41F1-83DF-49A93BF56FB1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "62081293-8355-4197-A5A8-1E434B808680", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the IP Address Resolution Protocol (ARP) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers with a 20-Gbps Embedded Services Processor (ESP) installed could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service condition. The vulnerability is due to insufficient error handling when an affected device has reached platform limitations. An attacker could exploit this vulnerability by sending a malicious series of IP ARP messages to an affected device. A successful exploit could allow the attacker to exhaust system resources, which would eventually cause the affected device to reload.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad de Address Resolution Protocol (ARP) de IP de Cisco IOS XE Software para Cisco ASR 1000 Series Aggregation Services Routers con un Embedded Services Processor (ESP) de 20-Gbps instalado, podría permitir a un atacante adyacente no autenticado causar la recarga de un dispositivo afectado, resultando en una condición de denegación de servicio. La vulnerabilidad es debido a un manejo insuficiente de errores cuando un dispositivo afectado ha alcanzado las limitaciones de la plataforma. Un atacante podría explotar esta vulnerabilidad mediante el envío de una serie maliciosa de mensajes ARP de IP hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante agotar los recursos del sistema, lo que podría eventualmente causar que el dispositivo afectado se recargue.", }, ], id: "CVE-2020-3508", lastModified: "2024-11-21T05:31:12.983", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-24T18:15:20.963", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-27 18:15
Modified
2024-11-21 07:40
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", matchCriteriaId: "38B87B17-C653-40AC-8AE4-066BB1123C88", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*", matchCriteriaId: "9012A66E-82C4-4ACF-A4BB-37EC54B87B50", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*", matchCriteriaId: "849C6FF1-F7C0-4021-BCA2-A791C87E4F37", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*", matchCriteriaId: "7592C7E3-3735-425F-A276-9EE03224CD5E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*", matchCriteriaId: "1103BE75-EB64-4A9A-801E-EDE6A1F861F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*", matchCriteriaId: "5B0C2129-8149-4362-827C-A5494C9D398B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*", matchCriteriaId: "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*", matchCriteriaId: "D197445E-EC12-429C-BDD4-F63FA5C1B3E3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*", matchCriteriaId: "BD27DF50-9E81-4EC5-BA73-513F1DFB972C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*", matchCriteriaId: "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*", matchCriteriaId: "CCE76032-948F-444F-BA5D-72A34D1CD382", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*", matchCriteriaId: "CF365FC4-46E3-4564-9F25-1C2FBE70057B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*", matchCriteriaId: "CCF17101-9EF9-47BB-B966-0FA9B71AEEFA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F0C218-B0FF-4BEC-B76F-1F4BAA6D0960", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c8500l-8s4x:-:*:*:*:*:*:*:*", matchCriteriaId: "FB2038BF-DC77-4326-B80C-FC3384FED25E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ir8340:-:*:*:*:*:*:*:*", matchCriteriaId: "4E6CCE9B-1F88-42AE-AB12-6345C44D597E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.", }, { lang: "es", value: "Una vulnerabilidad en la Application Quality of Experience (AppQoE) y en el Unified Threat Defense (UTD) en el software Cisco IOS XE podría permitir que un atacante remoto no autenticado provoque que un dispositivo afectado se recargue inesperadamente, lo que resultaría en una condición de denegación de servicio (DoS). Esta vulnerabilidad se debe al mal manejo de un flujo de paquetes manipulado a través de la aplicación AppQoE o UTD. Un atacante podría aprovechar esta vulnerabilidad enviando un flujo de paquetes manipulado a través de un dispositivo afectado. Un exploit exitoso podría permitir que el atacante provoque que el dispositivo se recargue, lo que resultaría en una condición DoS.", }, ], id: "CVE-2023-20226", lastModified: "2024-11-21T07:40:56.363", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-27T18:15:11.307", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-456", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-03-28 22:29
Modified
2025-01-27 21:04
Severity ?
Summary
Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/103556 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103556 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin | Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-03-17", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IOS Software Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.3\\(00.00.19\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "A614606E-0EA1-4C93-B8BE-4F65147B6C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(01\\)ia001.100:*:*:*:*:*:*:*", matchCriteriaId: "6682113B-03CA-4900-83BF-BB23F33B28DA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(01.22\\)t:*:*:*:*:*:*:*", matchCriteriaId: "A41D3D8B-8A14-4A35-BFE2-AA2379DD2A3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:3925_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "83C34A26-E6E2-4651-822D-74F642D7A8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:3925e_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "096C701F-8203-41FB-82DC-BB5C9263A292", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:3945_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "94332BC5-DD19-4422-B4E3-21D6E2BCA367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:3945e_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AB8466AE-B885-40BA-ADB8-C1058D95129C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.3\\(00.00.19\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "A614606E-0EA1-4C93-B8BE-4F65147B6C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(03\\)m4.1:*:*:*:*:*:*:*", matchCriteriaId: "2BDB4F33-0978-4950-922C-28B9FB6DDF55", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5E48D7-2266-4649-90A9-62C476AFE6DE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "99581637-E184-4A02-8313-57C7C31E5479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C58CEA6-69F8-4021-98C9-4676C70AB167", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DF156D97-7C39-49CF-9938-D9681066FF05", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "871AC0F6-5C01-43A1-8436-7885439BD81F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2147DBF8-B733-4F76-90C5-9D94F1E93625", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9222CA59-F4FD-478D-83C9-566B389140B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "03A273EE-41C1-41E9-9002-46F83FC6533F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "E055F58F-F9FB-4B27-841E-61ECAB5F42B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", matchCriteriaId: "2B832863-E366-46ED-BC35-838762F0CE29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", matchCriteriaId: "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*", matchCriteriaId: "A34DAD43-0C95-4830-8078-EFE3E6C0A930", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*", matchCriteriaId: "46F5CBF0-7F55-44C0-B321-896BDBA22679", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*", matchCriteriaId: "D381E343-416F-42AF-A780-D330954F238F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "4B4318C0-0FD0-46B3-8E23-94EC53A34A20", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "16FC6220-78E1-44A6-A596-6368D3EF7CC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "DCAEDE0A-E6F9-4727-8DC2-F47579220BE0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2514A1-486C-40F7-8746-56E2B973CBE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", matchCriteriaId: "917B52DF-4210-4DD6-97EF-8A033497A954", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", matchCriteriaId: "D7F413FB-D4F9-4113-9D67-2956BF1DC30D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*", matchCriteriaId: "7814FA61-CAF1-46DE-9D84-CEBE6480EA03", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7EE4F60E-DF3D-4839-8731-7CF16DA8FF26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8EA5EEE3-A084-46B4-84C0-ADFD69800649", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "592F67D5-344B-49AF-A277-1089A40AC2FD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*", matchCriteriaId: "7434059A-25B8-4FAC-A756-6E571348B76E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DB2A5355-BF40-437C-8683-A7A81DEE362C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "43F4B90E-3499-45D4-864D-18505E2149F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*", matchCriteriaId: "858FEECF-CC69-4E68-8E8A-674643021964", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BE5FCCFF-E491-474F-9B86-AB51D8244582", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*", matchCriteriaId: "EA8464F8-D6D2-4165-ADE8-B40F7D8556C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*", matchCriteriaId: "61007628-A81B-43E0-86DE-1F7DDAD9F1A7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*", matchCriteriaId: "91B9F022-4C3D-493E-9418-E9CDDAFEC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*", matchCriteriaId: "B39F250E-6A89-4537-BD31-1FB81734A9A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CB4E3B69-DDE8-4EA2-8E63-D6EEF41083B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*", matchCriteriaId: "8904EAF5-25E7-4A6B-8117-1859F913B83B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A369CD35-1242-4556-A83D-BD69CC149CFA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "784A1499-1F33-493D-B433-EB2550C03C19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*", matchCriteriaId: "59A990D6-B748-4AFD-B924-1D19680BD3DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CECFC88D-5480-46E4-BF74-E11A514A8BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E54D16A8-0407-41E3-9599-9A6F57E1AA75", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DF3818CC-8653-4A9E-A57B-950A15914D6B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7EDC790B-B42D-45DB-ACF5-A789F76C2BC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2A6BC84-91F2-437D-9D2E-F8B3F5966767", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7F331F13-5D05-4213-B442-D48D8E22287B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A6E312F4-90DA-40E4-BCD1-92F41BEEEECF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CA32EA3F-946D-430D-B00F-939D828DD72C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D239A09C-34D2-4418-B538-03A1080B8479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2C84561E-DD99-4433-9EF2-083F7C300123", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B29871BE-CA7D-4108-B46A-CBD539C9A2B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "39CD9189-6524-4157-B90E-FF6A81DE3599", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2CF1B702-643A-4AF2-B0AD-3C540CF85F2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "96269625-CB31-4850-872B-B2C1321B13B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*", matchCriteriaId: "426B68A6-3A41-43DB-846F-AEFBA62E221B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5BDE086A-3FE5-46E3-BD66-23D0AE5089BE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "FA53775A-D3ED-4D34-8338-A384DBEB94E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7D4522-D6BB-467F-AF5D-4D753A89D524", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*", matchCriteriaId: "9C96215F-A300-4B4E-9D3A-C32E484BFC5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0C680534-C663-40B0-A4AA-7F292EE60FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "BAF4F233-7B47-46ED-BDC5-A589BCFC0B39", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A528EC0-4650-4787-BE52-A588E7E38A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "53898E96-03D6-43A2-AE05-46C62464BD26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*", matchCriteriaId: "465917E5-8BF0-4BBB-85A0-DE8F516880C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D9FA66D9-E465-406E-A95C-608A1BE34D74", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "1456B204-A2A5-4790-A684-7F50D692EC9F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "AD715BDD-7C74-4785-BEDF-75918F6FB37A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4CD10664-94D0-48C0-92EF-E8EA66841245", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "071A47F9-FF35-4F2C-BF5D-897CAC8BC08A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "9E988448-36C9-47E0-9356-DA400EB824E3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "9D067EF9-00DB-4979-B12E-55749059A083", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A9FA300A-44B1-44EE-8111-C1296EB0B638", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8598A543-B30B-4BD4-9974-F432FFFDCDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "48DEBBAD-D28D-4784-BBD8-9FAD1710A919", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8A5FC516-6B48-4D77-B26D-FA097AC91D1A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "6A7437E4-5C09-436C-AFBC-F6B6747A4339", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ECBC0277-4990-4DE7-AD80-20E8A6F561D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7DAF69-662B-4999-A6AD-AA528B53EAF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D28306B1-3DDE-4444-9784-522B3D2163EE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "9257D187-1F2D-40F4-8C87-78978DB56C3F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AF8261-74E0-4F53-B82C-A7BA7559D7CB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "25AE251E-E99F-4546-85B0-C57834B040B7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C62FFCB9-4253-459B-9298-C252DA9177DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*", matchCriteriaId: "991CBDFB-6836-4D1F-80A9-14EBCE3F855F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B4C0250-DA0D-4CEE-99F4-C211163C6653", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8D453BF6-AB9F-4D47-B4DF-C25C67358FFE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*", matchCriteriaId: "005F5347-A5E6-4954-ACAB-E4DF29119724", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2A8413-DF92-4690-8BC1-A21001BDF76B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "882B8D8F-E154-45C3-BB47-5353167C9776", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*", matchCriteriaId: "C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A54B4EB4-EB41-4522-B7AB-C30F96099EA3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EAD7BE51-0BA6-4750-B274-A6E33D32B484", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "44C3EF8E-DF88-46DC-8E06-B009F346D1D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7E87F823-D924-4718-AD81-248A6C619531", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CCAC93E0-F982-4E37-866E-43B7BC5AC82E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC866C9-BB98-4320-9FFA-F0960C560DA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C3AD7495-3DA2-4596-9620-CD36D7C561AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E492F3F8-4188-41E4-9A84-5E30C4AC3378", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "718F2FDC-9EA4-4C4C-8821-B15E56AF8101", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "EC5CB558-BD42-4615-BC31-41CCF25DE5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E45BCCD0-65BB-431F-B448-221C1595CD92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F33BA722-0680-4074-8D03-41657F8CDCC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", matchCriteriaId: "295C46B4-5E9F-4DD8-861B-00BA43923306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "431570C7-74A1-4F7E-8FD0-690AEF0F823B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C5D22E15-E1E8-4115-A55F-5743CA9C5947", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*", matchCriteriaId: "F840171D-CA1C-4E25-BD41-6B871C47BB84", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B240B20-CF48-4A72-9653-9D04D59C1391", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", matchCriteriaId: "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", matchCriteriaId: "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74CCD143-3D6E-4880-B275-ECF5B04238C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D3784F-C572-4A6F-83B9-BCF64D339BC9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E09C466B-CE87-4A57-B40B-88C94BAAF36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", matchCriteriaId: "D58FF034-8E07-4518-A858-5F16F22217E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "376AD386-373D-4B24-966F-D11F76C9020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2280CAA3-03F6-4168-8E50-A6B7132A3B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0C1174-C789-4547-9899-F7FCD0905F92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EC366801-655A-403B-ACD9-3BB43802A3C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FF5463D0-A8D3-43EC-8CFF-F659A8C84436", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "05D4D7E4-B195-46D8-8A6B-6AA4B8357618", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "39600E51-4A21-4E5B-9FF9-E7C00AE86646", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "47E4D5A8-7E4A-44C5-81DC-84712781206D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B13D6D50-D0FA-4527-BED3-52560DDD5253", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "965BF315-D833-4711-97FC-512151113367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", matchCriteriaId: "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "04072C0F-78A2-4D10-87B2-52DC2537BA89", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5C080E-D5C4-47B2-A46C-4EB3051C5221", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "41CEBEE0-DA67-4EE5-9BCF-263843053A8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FD262F58-C47F-439E-A9FF-D1C60120D306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "35490BDE-DF21-495E-9F8A-7631FCB32A1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", matchCriteriaId: "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", matchCriteriaId: "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", matchCriteriaId: "7670A322-31C2-4A8A-86E9-09D63C52E4C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", matchCriteriaId: "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "0972076B-5C87-44B3-90EC-4C200B89318A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74AED057-2458-4DE0-8D51-ABD766D07F68", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "19538C03-5FB8-4401-8B21-489C629D7E7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B26D7061-F471-4DF0-A892-ED132958B84A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "033ED443-80E7-4012-9825-07AAC0D44B96", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "AD3F3CC6-A349-47B1-B282-B6458683C191", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CB24EF21-1C10-48A7-BC68-FFC842A28D12", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ED0625A2-BF14-4552-83D8-AEE0A04EA023", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", matchCriteriaId: "21AFDC0D-7629-424E-827B-C8A8767324C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "A263CFF2-A659-405B-90EA-51E49B25C6D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFBD449-217D-4569-99F7-D56B853A3E07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED668FC-D1A5-4175-A234-23760BA6E788", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0D650C48-9241-42F7-87A9-20733329489A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3ED16A65-9AFF-4825-95D1-162FBA0F566D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82D345E7-8208-41AC-B11A-4425D29E98A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E386D461-F1C1-4970-B056-D6119E74D449", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "99F3A466-F665-4132-ABC4-2DFC0A7E2B55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B3395168-FF2E-4CB6-AABE-5E36DEB241CA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "226F985C-4669-4D0A-9DB4-CB1465B37B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0B736A43-6F4E-40A9-84E4-D9E251489234", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", matchCriteriaId: "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E99CA124-7D86-463B-A31E-A7836B7493E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E014B028-8DD9-428C-B705-8F428F145932", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A6C44229-A842-49B2-AD3E-79C83DB63EBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5306E847-C718-4C83-9C97-8AB498DC4A88", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "18287CEF-B574-4498-A256-567CA6E6CA7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "1E9AAA2C-495E-4FD1-9050-264FDC25254B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5713043E-2535-4540-B3EF-41FAC40BECE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "67701D77-8B03-446A-AE22-4B8CCCD6F029", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "831A2390-7170-4FC0-A95E-3DAB1791017D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "F788CBC4-782F-4A43-AC80-4AEF1C43A22D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "493989DC-8F1B-45C9-AD11-38B97B958C9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", matchCriteriaId: "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", matchCriteriaId: "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", matchCriteriaId: "F168FB20-0C44-4A5B-910A-04B9517545C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", matchCriteriaId: "737F22AB-C5A9-4A18-BA3D-38A222491397", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "D5508320-8318-41A8-8026-4A61907C1CD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD337D8-8C72-4025-A8C3-E63598DE7BDB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", matchCriteriaId: "176ACF88-6112-4179-8492-50C50577B300", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*", matchCriteriaId: "D07FC868-0B38-4F24-BA40-87966FF80AB7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", matchCriteriaId: "C19A801D-02D7-40B0-88E8-FE7BA8630E60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", matchCriteriaId: "D4035136-CC10-4DDD-92AF-9DC41D19CF8A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "19017B10-F630-42CD-ACD2-E817FEF0E7F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "04A41A34-58D2-4DBC-ABC9-20A62BC8A838", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "2BA015C4-7163-4FCD-ADE1-D5481B10EACA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", matchCriteriaId: "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "74E1226B-46CF-4C82-911A-86C818A75DFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "1C85BAAF-819B-40E7-9099-04AA8D9AB114", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.", }, { lang: "es", value: "Múltiples vulnerabilidades en la característica Login Enhancements (Login Block) de Cisco IOS Software permite que un atacante remoto no autenticado desencadene el reinicio de un sistema afectado. Esto resulta una condición de denegación de servicio (DoS). Estas vulnerabilidades afectan a los dispositivos Cisco que ejecutan Cisco IOS Software Release 15.4(2)T, 15.4(3)M o 15.4(2)CG y siguientes. Cisco Bug IDs: CSCuy32360, CSCuz60599.", }, ], id: "CVE-2018-0179", lastModified: "2025-01-27T21:04:36.627", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-28T22:29:01.467", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/103556", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/103556", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-24 18:15
Modified
2024-11-21 05:30
Severity ?
6.8 (Medium) - CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
7.2 (High) - CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Summary
A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", matchCriteriaId: "C98DED36-D4B5-48D6-964E-EEEE97936700", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "F257D2BE-7618-4B6A-AFCE-6D9D0084FA1D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*", matchCriteriaId: "8BA927CE-9D8E-4BC0-9EA6-641E7C4F71B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "9A46D298-1685-410E-879C-2EBC45C185AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "CA4ACF54-E576-4D8A-A4E6-17A37EEC53DA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*", matchCriteriaId: "196A7C06-8371-479D-973D-591DEB181739", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "EE42511E-9883-4779-A8E5-FC3E16EF2793", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*", matchCriteriaId: "DB06AD21-91A7-46B8-8F44-683828A5422D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "5DA169AF-3743-4051-B63B-FF6E1ADCD886", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "7D13CF5B-4482-4C7D-8D6A-E220F3E4F868", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*", matchCriteriaId: "92134C0A-4E5B-43EF-8439-484DF504C43C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*", matchCriteriaId: "26ECF9BD-F632-4A02-8993-C0D44B91289C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "48730DB5-94AF-4BE7-8047-52B8B47CE35A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "E3A88142-3284-4C25-8774-36004B5F9087", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "8EB76311-4B6D-4897-A683-4244E92BD570", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "CDDA2975-CDB7-4182-A03E-D34F15CDF6F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "35B9D0B5-4BE1-490E-9A68-00A3D357BC3D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "71FA2F5A-6146-4142-96A8-552118E4BB67", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*", matchCriteriaId: "BEF786D6-F28F-49D8-A15C-BFD0AA934355", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*", matchCriteriaId: "CA32B0AC-1B0A-4ED8-8532-9C7BE6E059D4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*", matchCriteriaId: "1FEFF895-6E4A-4108-BD25-D7DC83154832", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "A485A9A0-2EEC-4C13-846C-0DE2265B2A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "3B9F1ACA-9D67-4BF0-A357-40D39A61ED00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*", matchCriteriaId: "6BFEE45F-C5AC-483D-9DE6-4CEB98D80A0C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*", matchCriteriaId: "FD6F5BBC-4627-4A3E-B827-3CEE7EE969D0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*", matchCriteriaId: "8B2E41E2-00CE-42C4-8C91-9307D76F5D7A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "98CB2D23-B5F8-4FA9-8431-3B0124CE2140", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*", matchCriteriaId: "E8A8BA9F-3361-43CD-8031-A5DF0AD68BEB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*", matchCriteriaId: "6DFE4BB6-FC9A-42B3-B8A0-2610D71BB9B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*", matchCriteriaId: "53D13F1D-345D-45D5-9000-DAFE8A85D71B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "8CFB064E-E390-47B5-AA76-5D3D2E368055", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "62081293-8355-4197-A5A8-1E434B808680", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.", }, { lang: "es", value: "Una vulnerabilidad en el sistema de archivos en la USB 3.0 Solid State Drive (SSD) conectable para el Cisco IOS XE Software, podría permitir a un atacante físico autenticado eliminar el SSD USB 3.0 y modificar áreas sensibles del sistema de archivos, incluyendo las protecciones del contenedor de espacio de nombres. La vulnerabilidad se produce porque los datos de control del SSD USB 3.0 no se almacenan en la memoria flash de arranque interna. Un atacante podría explotar esta vulnerabilidad quitando el SSD USB 3.0, modificando o eliminando archivos en el SSD USB 3.0 usando otro dispositivo y luego reinsertando el SSD USB 3.0 en el dispositivo original. Una explotación con éxito podría permitir al atacante eliminar las protecciones del contenedor y realizar acciones de archivos fuera del espacio de nombres del contenedor con privilegios root.", }, ], id: "CVE-2020-3396", lastModified: "2024-11-21T05:30:56.857", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.4, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 5.8, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-24T18:15:17.683", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-269", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-24 18:15
Modified
2024-11-21 05:31
Severity ?
Summary
A vulnerability in the ISDN subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the ISDN Q.931 messages are processed. An attacker could exploit this vulnerability by sending a malicious ISDN Q.931 message to an affected device. A successful exploit could allow the attacker to cause the process to crash, resulting in a reload of the affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:15.1\\(4\\)m:*:*:*:*:*:*:*", matchCriteriaId: "698E9E84-006D-4EA6-A65C-60BE80BAF35C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "03A273EE-41C1-41E9-9002-46F83FC6533F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "0C24227E-9FF6-4757-A342-958CA4B8BF63", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "9E529335-18D1-4CEC-A8D5-CC1CA33D64F5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "3072DEFA-61D6-413F-97FD-F64C0E90155C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "D9FBFB5C-347B-4F73-93BE-4D3137D8F93A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "9F040372-CDAD-4AC4-9B7C-BFF9658B6BF2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "C33862F1-652A-4F60-BD3E-A6B3733E56A9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "130205FD-CA31-4E49-B8C4-181840270C70", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "908A56D8-64AF-4813-9D4D-C429C0603A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "03A2AA1C-7568-4BB6-BBD3-8E03D32CDA1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "53DAF422-7E0B-44EB-AD8D-4643A9711739", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "1F7F661E-335C-4123-9363-E2E5D51846C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:csr1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "62081293-8355-4197-A5A8-1E434B808680", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the ISDN subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the ISDN Q.931 messages are processed. An attacker could exploit this vulnerability by sending a malicious ISDN Q.931 message to an affected device. A successful exploit could allow the attacker to cause the process to crash, resulting in a reload of the affected device.", }, { lang: "es", value: "Una vulnerabilidad en el subsistema ISDN de Cisco IOS Software y Cisco IOS XE Software, podría permitir a un atacante adyacente no autenticado causar una recarga de un dispositivo afectado, resultando en una condición de denegación de servicio (DoS). La vulnerabilidad es debido a una comprobación insuficiente de la entrada cuando son procesados los mensajes ISDN Q.931. Un atacante podría explotar esta vulnerabilidad mediante el envío de un mensaje ISDN Q.931 malicioso hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante causar que el proceso se bloquee, resultando en una recarga del dispositivo afectado.", }, ], id: "CVE-2020-3511", lastModified: "2024-11-21T05:31:13.380", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-24T18:15:21.230", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-30 19:15
Modified
2024-11-21 06:43
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B4A52514-31EF-4AEF-967B-FAD0FD67E54D", versionEndExcluding: "20.6.3", versionStartIncluding: "20.6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "475E91CB-34F3-4B63-8CCE-7F0A9A02D136", versionEndExcluding: "20.7.2", versionStartIncluding: "20.7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8:*:*:*:*:*:*:*", matchCriteriaId: "0493FE21-BB5A-41D3-9EBD-2C2BD165D5CF", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*", matchCriteriaId: "4300237B-0872-49AD-B139-DBED88329796", versionEndExcluding: "20.6.3", versionStartIncluding: "20.6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*", matchCriteriaId: "C7585F8E-F42D-4EA2-8CBC-E157252868B9", versionEndExcluding: "20.7.2", versionStartIncluding: "20.7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:20.8:*:*:*:*:*:*:*", matchCriteriaId: "B62FF06E-8A11-41B5-B67C-9C008B5832F6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "60E3B315-1E13-4C27-8506-2D3C45D7A7CC", versionEndExcluding: "20.6.3", versionStartIncluding: "20.6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "85F91EBF-3E14-453A-AEF9-BA2BB9F4445C", versionEndExcluding: "20.7.2", versionStartIncluding: "20.7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan_vsmart_controller:20.8:*:*:*:*:*:*:*", matchCriteriaId: "D65F88EF-F2A8-4798-A88B-5B0584760E7A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*", matchCriteriaId: "0F0A437E-56C5-4DD2-90C4-5E62D2C97A9A", versionEndExcluding: "20.6.3", versionStartIncluding: "20.6", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*", matchCriteriaId: "9113890B-7A2A-4FD1-8328-169E4AB41117", versionEndExcluding: "20.7.2", versionStartIncluding: "20.7", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan:20.8:*:*:*:*:*:*:*", matchCriteriaId: "8CEAD0DC-6407-4D23-A73D-0089C31CEB39", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*", matchCriteriaId: "CF365FC4-46E3-4564-9F25-1C2FBE70057B", vulnerable: false, }, { criteria: "cpe:2.3:a:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:*", matchCriteriaId: "36AFCB37-1760-4808-AEA5-875F45C05464", vulnerable: false, }, { criteria: "cpe:2.3:a:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C146F67C-0FCF-4C5C-B6B8-D67746E69CFB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "E055F58F-F9FB-4B27-841E-61ECAB5F42B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", matchCriteriaId: "2B832863-E366-46ED-BC35-838762F0CE29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", matchCriteriaId: "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2514A1-486C-40F7-8746-56E2B973CBE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.", }, { lang: "es", value: "Varias vulnerabilidades en la CLI del software Cisco SD-WAN podrían permitir a un atacante local autenticado conseguir altos privilegios. Estas vulnerabilidades son debido a controles de acceso inapropiados en los comandos de la aplicación CLI. Un atacante podría explotar estas vulnerabilidades al ejecutar un comando malicioso en la CLI de la aplicación. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios como usuario root", }, ], id: "CVE-2022-20775", lastModified: "2024-11-21T06:43:31.933", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-30T19:15:11.467", references: [ { source: "psirt@cisco.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-25", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-03-27 09:29
Modified
2025-01-27 19:13
Severity ?
Summary
A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101676 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101676 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp | Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-03-24", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IOS XE Software Ethernet Virtual Private Network Border Gateway Protocol Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*", matchCriteriaId: "237D305E-016D-4E84-827C-44D04E3E0999", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "4A8AE730-B4DA-4CC7-8B48-BB603AC495DD", versionEndExcluding: "16.3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5E48D7-2266-4649-90A9-62C476AFE6DE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "99581637-E184-4A02-8313-57C7C31E5479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C58CEA6-69F8-4021-98C9-4676C70AB167", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DF156D97-7C39-49CF-9938-D9681066FF05", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "871AC0F6-5C01-43A1-8436-7885439BD81F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2147DBF8-B733-4F76-90C5-9D94F1E93625", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9222CA59-F4FD-478D-83C9-566B389140B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "03A273EE-41C1-41E9-9002-46F83FC6533F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "E055F58F-F9FB-4B27-841E-61ECAB5F42B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", matchCriteriaId: "2B832863-E366-46ED-BC35-838762F0CE29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", matchCriteriaId: "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*", matchCriteriaId: "A34DAD43-0C95-4830-8078-EFE3E6C0A930", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*", matchCriteriaId: "46F5CBF0-7F55-44C0-B321-896BDBA22679", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*", matchCriteriaId: "D381E343-416F-42AF-A780-D330954F238F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "4B4318C0-0FD0-46B3-8E23-94EC53A34A20", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "16FC6220-78E1-44A6-A596-6368D3EF7CC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "DCAEDE0A-E6F9-4727-8DC2-F47579220BE0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2514A1-486C-40F7-8746-56E2B973CBE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "C2C3816C-95F4-443C-9C79-72F0251528F4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "E1810C73-93B8-4EB5-85FC-3585AD5256BA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2BC76E-A166-4E71-B058-F49FF84A9E19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "542244A0-300C-4630-812A-BF45F61E38DD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", matchCriteriaId: "917B52DF-4210-4DD6-97EF-8A033497A954", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", matchCriteriaId: "D7F413FB-D4F9-4113-9D67-2956BF1DC30D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_900:-:*:*:*:*:*:*:*", matchCriteriaId: "EA873342-542E-4FC8-9C22-B5A43F9F3E9D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "D6279A69-2F9D-4CD9-9C19-62E701C3C4F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*", matchCriteriaId: "A46BB1E3-D813-4C19-81FA-96B8EF3E2F7B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "64E9CCC6-CA54-44C4-9A41-D2CA3A25BE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*", matchCriteriaId: "BC4E0CC8-9C67-4EB0-97A1-BAEFC6E9708A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*", matchCriteriaId: "DDB1A95C-8513-4CC7-8CDF-012B212FF02F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "AE761B1C-D749-4E1B-9A4A-7F41D1DF9C8C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-fs-a:-:*:*:*:*:*:*:*", matchCriteriaId: "97B64B28-7F3F-40BC-B289-0D1DB55B6461", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-fs-d:-:*:*:*:*:*:*:*", matchCriteriaId: "F5603296-34B3-4EEB-B242-C44BC56BFBB8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*", matchCriteriaId: "6C2A515C-797D-47EE-8051-F3FBE417BCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*", matchCriteriaId: "E673A75F-EFF8-4591-8E0F-A21083563DBA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-2sg-f-ah:-:*:*:*:*:*:*:*", matchCriteriaId: "E5456C70-6BA4-456A-BCFA-06FD052E44EF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-2sg-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "515CD97F-DDBD-4F75-A6DB-646890A30B32", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-3sg-f-ah:-:*:*:*:*:*:*:*", matchCriteriaId: "6E181FC9-6790-4C12-874F-67252B6879BA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-3sg-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "CAD4F12D-3F97-44D2-9DE2-571425E75F4E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-4sg-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1288DB-5946-4091-A6E8-42E0A0E7B2B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*", matchCriteriaId: "70352B04-C3FD-47F5-A2F8-691CF63EB50D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*", matchCriteriaId: "FE063AF2-5579-4D7E-8829-9102FC7CB994", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", matchCriteriaId: "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", matchCriteriaId: "7670A322-31C2-4A8A-86E9-09D63C52E4C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", matchCriteriaId: "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "0972076B-5C87-44B3-90EC-4C200B89318A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74AED057-2458-4DE0-8D51-ABD766D07F68", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "19538C03-5FB8-4401-8B21-489C629D7E7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B26D7061-F471-4DF0-A892-ED132958B84A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "033ED443-80E7-4012-9825-07AAC0D44B96", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "AD3F3CC6-A349-47B1-B282-B6458683C191", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CB24EF21-1C10-48A7-BC68-FFC842A28D12", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ED0625A2-BF14-4552-83D8-AEE0A04EA023", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", matchCriteriaId: "21AFDC0D-7629-424E-827B-C8A8767324C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "A263CFF2-A659-405B-90EA-51E49B25C6D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFBD449-217D-4569-99F7-D56B853A3E07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED668FC-D1A5-4175-A234-23760BA6E788", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0D650C48-9241-42F7-87A9-20733329489A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3ED16A65-9AFF-4825-95D1-162FBA0F566D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82D345E7-8208-41AC-B11A-4425D29E98A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E386D461-F1C1-4970-B056-D6119E74D449", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "99F3A466-F665-4132-ABC4-2DFC0A7E2B55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B3395168-FF2E-4CB6-AABE-5E36DEB241CA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "226F985C-4669-4D0A-9DB4-CB1465B37B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0B736A43-6F4E-40A9-84E4-D9E251489234", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", matchCriteriaId: "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E99CA124-7D86-463B-A31E-A7836B7493E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E014B028-8DD9-428C-B705-8F428F145932", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A6C44229-A842-49B2-AD3E-79C83DB63EBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5306E847-C718-4C83-9C97-8AB498DC4A88", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "18287CEF-B574-4498-A256-567CA6E6CA7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "1E9AAA2C-495E-4FD1-9050-264FDC25254B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5713043E-2535-4540-B3EF-41FAC40BECE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "67701D77-8B03-446A-AE22-4B8CCCD6F029", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "831A2390-7170-4FC0-A95E-3DAB1791017D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "F788CBC4-782F-4A43-AC80-4AEF1C43A22D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "493989DC-8F1B-45C9-AD11-38B97B958C9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", matchCriteriaId: "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", matchCriteriaId: "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", matchCriteriaId: "F168FB20-0C44-4A5B-910A-04B9517545C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", matchCriteriaId: "737F22AB-C5A9-4A18-BA3D-38A222491397", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "2E5DCFD5-2B46-4D06-9E4C-B2325F440F02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "D5508320-8318-41A8-8026-4A61907C1CD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD337D8-8C72-4025-A8C3-E63598DE7BDB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", matchCriteriaId: "176ACF88-6112-4179-8492-50C50577B300", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*", matchCriteriaId: "D07FC868-0B38-4F24-BA40-87966FF80AB7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", matchCriteriaId: "C19A801D-02D7-40B0-88E8-FE7BA8630E60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA59279-3504-417D-9E86-E5886EE198BD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", matchCriteriaId: "D4035136-CC10-4DDD-92AF-9DC41D19CF8A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "86879AC0-890E-42F4-9561-6851F38FE0AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "19017B10-F630-42CD-ACD2-E817FEF0E7F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "2BA015C4-7163-4FCD-ADE1-D5481B10EACA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:network_convergence_system_520:-:*:*:*:*:*:*:*", matchCriteriaId: "E7A35D05-30AC-460F-ADBF-5B7EB0801ACD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.", }, { lang: "es", value: "Una vulnerabilidad en el protocolo BGP (Border Gateway Protocol) en una red Ethernet Virtual Private Network (EVPN) para Cisco IOS XE Software podría permitir que un atacante remoto no autenticado haga que el dispositivo se reinicie, lo que da lugar a una denegación de servicio (DoS) o, posiblemente, a que se corrompa la tabla de enrutamiento BGP, que a su vez puede dar como resultado la inestabilidad de la red. La vulnerabilidad existe debido a cambios en la implementación de la versión de borrador de BGP MPLS-Based Ethernet VPN RFC (RFC 7432) entre distribuciones de software IOS XE. Cuando se reciben los paquetes de actualización BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route, es posible que el campo de longitud de dirección IP se calcule de manera incorrecta. Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete BGP manipulado a un dispositivo afectado después de que se establezca una sesión BGP. Un exploit podría permitir que el atacante haga que se reinicie el dispositivo afectado o que corrompa la tabla de enrutamiento BGP. En cualquiera de los dos casos, el resultado sería una denegación de servicio (DoS). Esta vulnerabilidad puede tener lugar cuando el router recibe un mensaje BGP manipulado desde un peer o una sesión BGP existente. La vulnerabilidad afecta a todas las distribuciones de Cisco IOS XE Software anteriores a la versión 16.3 que soporta configuraciones BGP EVPN. Si el dispositivo no está configurado para EVPN, no es vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.", }, ], id: "CVE-2017-12319", lastModified: "2025-01-27T19:13:34.663", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-27T09:29:00.280", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101676", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101676", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-29 01:34
Modified
2025-01-27 19:23
Severity ?
Summary
A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101044 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1039452 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101044 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039452 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-03-24", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IOS Software for Cisco Integrated Services Routers Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "650EB42C-D85F-482B-972D-7DCAC210DC48", versionEndIncluding: "15.6", versionStartIncluding: "15.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5E48D7-2266-4649-90A9-62C476AFE6DE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "99581637-E184-4A02-8313-57C7C31E5479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C58CEA6-69F8-4021-98C9-4676C70AB167", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DF156D97-7C39-49CF-9938-D9681066FF05", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "871AC0F6-5C01-43A1-8436-7885439BD81F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2147DBF8-B733-4F76-90C5-9D94F1E93625", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9222CA59-F4FD-478D-83C9-566B389140B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "03A273EE-41C1-41E9-9002-46F83FC6533F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "398D63B0-F15B-409B-AFBC-DE6C94FAF815", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D05CC9-8D04-4DE0-A854-375192B4D46C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9030977A-7753-4ED5-A082-4B2F5749D37D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:860vae-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "4C9C511D-7D5E-4758-A335-70019EBD9F8C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:861_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E109E908-78B9-44ED-8719-B057057C2185", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:861w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "31F8D515-3D54-459F-8CE7-FFA91439C0D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:866vae_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "510B60EF-AA4D-469F-8EEF-133F354DDF55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:867_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EF7E6C9E-326B-42EF-86D4-4FB2C13E2BA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:867vae_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8D562373-BD3F-4690-928F-9FE0325A3379", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:871_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F1A300FE-D6D3-41AC-9792-4D0E28621F72", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:880-voice_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62165B-6CA9-4DD8-8A36-B658F61FF9EF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:880_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2F1852-8ADC-42E0-8D05-961A733523D1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DA5ACE25-8C18-49B0-AFFC-17CB30F61930", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AB6E4CF5-D944-4281-94E5-72BC5437BC62", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CFB6E8CC-89B8-490A-BFCF-FA9D55543B21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "480629DC-DA23-4A9E-B90F-E8AB894C9353", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BCEBDDE6-0EA0-4C2B-9A04-87236312A269", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "4D3EA60A-1BA9-43E8-AF81-914846C26CC1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "FA7C5306-B810-4036-A241-7178F48ABE8E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5413C7E7-F55C-4158-ABDF-2D8844B96680", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886vag_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6745ADF-DCE3-42C3-A548-F9E44AEE88CC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "FEFD38B2-348F-4EF2-A9B7-40A9AA5FF511", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887v_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F9EA2E-9EE7-4F68-9765-C78F85624F2D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1563AC8D-4E4D-4126-8C5D-84B449AAEF57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3945CCD-E6F5-412D-9935-160BCD664B10", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B0C23393-F7BB-4BA9-81A5-C298D84EBF0B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vag_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "61B623C2-D81B-430B-9FD2-E2764EE94809", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vam-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "828E07F6-1E92-4990-AEBC-DBFE4B5B2DE4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vamg_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "08B77C60-06E0-47FF-8CD4-35FE5C60FF95", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7E97DA13-D485-42BE-A0E9-F40A0C823735", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E984A1EA-728A-4663-8494-1787AB5D93C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888e-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "35D9B6C7-A707-41CD-953F-5773FB3F7685", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888e_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "716E154A-5586-4F58-8203-EC8256E00BAD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888eg_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7CC0F79A-52CA-46A6-9C6A-0596718053E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8054E665-E4DA-4453-A34B-830B69D273A7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891-24x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BEA480B3-25E2-4B05-9F46-417B696789B4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "526558F9-C72D-4DDA-B0DF-CAF7B97E30C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B4B9D069-85C0-4299-BCAF-441A2D6227BF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "53AFBDFF-3D83-4685-82EE-A9EA4DC09241", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892f-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AB4AF464-B247-40CF-A2B5-1B278303418B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D674C533-304A-42A4-97EE-1CA39908E888", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", matchCriteriaId: "917B52DF-4210-4DD6-97EF-8A033497A954", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", matchCriteriaId: "D7F413FB-D4F9-4113-9D67-2956BF1DC30D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000_:-:*:*:*:*:*:*:*", matchCriteriaId: "0ABA6B44-E3FB-4B9C-8148-D9F10E617DB8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, { lang: "es", value: "Una vulnerabilidad en la implementación de un protocolo en los routers Cisco Integrated Services Routers Generation 2 (ISR G2) que ejecuten Cisco IOS desde la versión 15.0 hasta la 15.6 podría permitir que un atacante adyacente sin autenticar haga que el dispositivo afectado se reinicie, provocando una denegación de servicio (DoS) en consecuencia. Esta vulnerabilidad se debe a una clasificación incorrecta de los frames Ethernet. Un atacante podría explotar esta vulnerabilidad enviando un frame Ethernet al dispositivo afectado. Si se explota con éxito, podría permitir que el atacante provoque que el dispositivo afectado se reinicie, provocando una denegación de servicio. Cisco Bug IDs: CSCvc03809.", }, ], id: "CVE-2017-12232", lastModified: "2025-01-27T19:23:29.077", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-29T01:34:48.780", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101044", }, { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039452", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101044", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039452", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-03-28 22:29
Modified
2025-01-27 21:16
Severity ?
Summary
Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/103556 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103556 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin | Mitigation, Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-03-17", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IOS Software Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.3\\(00.00.19\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "A614606E-0EA1-4C93-B8BE-4F65147B6C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(01\\)ia001.100:*:*:*:*:*:*:*", matchCriteriaId: "6682113B-03CA-4900-83BF-BB23F33B28DA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(01.22\\)t:*:*:*:*:*:*:*", matchCriteriaId: "A41D3D8B-8A14-4A35-BFE2-AA2379DD2A3A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:3925_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "83C34A26-E6E2-4651-822D-74F642D7A8FE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:3925e_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "096C701F-8203-41FB-82DC-BB5C9263A292", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:3945_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "94332BC5-DD19-4422-B4E3-21D6E2BCA367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:3945e_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AB8466AE-B885-40BA-ADB8-C1058D95129C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.3\\(00.00.19\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "A614606E-0EA1-4C93-B8BE-4F65147B6C5D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(03\\)m4.1:*:*:*:*:*:*:*", matchCriteriaId: "2BDB4F33-0978-4950-922C-28B9FB6DDF55", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5E48D7-2266-4649-90A9-62C476AFE6DE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "99581637-E184-4A02-8313-57C7C31E5479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C58CEA6-69F8-4021-98C9-4676C70AB167", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DF156D97-7C39-49CF-9938-D9681066FF05", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "871AC0F6-5C01-43A1-8436-7885439BD81F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2147DBF8-B733-4F76-90C5-9D94F1E93625", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9222CA59-F4FD-478D-83C9-566B389140B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "03A273EE-41C1-41E9-9002-46F83FC6533F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "E055F58F-F9FB-4B27-841E-61ECAB5F42B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", matchCriteriaId: "2B832863-E366-46ED-BC35-838762F0CE29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", matchCriteriaId: "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*", matchCriteriaId: "A34DAD43-0C95-4830-8078-EFE3E6C0A930", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*", matchCriteriaId: "46F5CBF0-7F55-44C0-B321-896BDBA22679", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*", matchCriteriaId: "D381E343-416F-42AF-A780-D330954F238F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "4B4318C0-0FD0-46B3-8E23-94EC53A34A20", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "16FC6220-78E1-44A6-A596-6368D3EF7CC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "DCAEDE0A-E6F9-4727-8DC2-F47579220BE0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2514A1-486C-40F7-8746-56E2B973CBE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", matchCriteriaId: "917B52DF-4210-4DD6-97EF-8A033497A954", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", matchCriteriaId: "D7F413FB-D4F9-4113-9D67-2956BF1DC30D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*", matchCriteriaId: "7814FA61-CAF1-46DE-9D84-CEBE6480EA03", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7EE4F60E-DF3D-4839-8731-7CF16DA8FF26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8EA5EEE3-A084-46B4-84C0-ADFD69800649", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "592F67D5-344B-49AF-A277-1089A40AC2FD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*", matchCriteriaId: "7434059A-25B8-4FAC-A756-6E571348B76E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DB2A5355-BF40-437C-8683-A7A81DEE362C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "43F4B90E-3499-45D4-864D-18505E2149F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*", matchCriteriaId: "858FEECF-CC69-4E68-8E8A-674643021964", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BE5FCCFF-E491-474F-9B86-AB51D8244582", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*", matchCriteriaId: "EA8464F8-D6D2-4165-ADE8-B40F7D8556C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*", matchCriteriaId: "61007628-A81B-43E0-86DE-1F7DDAD9F1A7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*", matchCriteriaId: "91B9F022-4C3D-493E-9418-E9CDDAFEC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*", matchCriteriaId: "B39F250E-6A89-4537-BD31-1FB81734A9A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CB4E3B69-DDE8-4EA2-8E63-D6EEF41083B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*", matchCriteriaId: "8904EAF5-25E7-4A6B-8117-1859F913B83B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A369CD35-1242-4556-A83D-BD69CC149CFA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "784A1499-1F33-493D-B433-EB2550C03C19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*", matchCriteriaId: "59A990D6-B748-4AFD-B924-1D19680BD3DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CECFC88D-5480-46E4-BF74-E11A514A8BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E54D16A8-0407-41E3-9599-9A6F57E1AA75", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DF3818CC-8653-4A9E-A57B-950A15914D6B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7EDC790B-B42D-45DB-ACF5-A789F76C2BC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2A6BC84-91F2-437D-9D2E-F8B3F5966767", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7F331F13-5D05-4213-B442-D48D8E22287B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A6E312F4-90DA-40E4-BCD1-92F41BEEEECF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CA32EA3F-946D-430D-B00F-939D828DD72C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D239A09C-34D2-4418-B538-03A1080B8479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2C84561E-DD99-4433-9EF2-083F7C300123", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B29871BE-CA7D-4108-B46A-CBD539C9A2B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "39CD9189-6524-4157-B90E-FF6A81DE3599", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2CF1B702-643A-4AF2-B0AD-3C540CF85F2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "96269625-CB31-4850-872B-B2C1321B13B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*", matchCriteriaId: "426B68A6-3A41-43DB-846F-AEFBA62E221B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5BDE086A-3FE5-46E3-BD66-23D0AE5089BE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "FA53775A-D3ED-4D34-8338-A384DBEB94E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7D4522-D6BB-467F-AF5D-4D753A89D524", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*", matchCriteriaId: "9C96215F-A300-4B4E-9D3A-C32E484BFC5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0C680534-C663-40B0-A4AA-7F292EE60FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "BAF4F233-7B47-46ED-BDC5-A589BCFC0B39", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A528EC0-4650-4787-BE52-A588E7E38A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "53898E96-03D6-43A2-AE05-46C62464BD26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*", matchCriteriaId: "465917E5-8BF0-4BBB-85A0-DE8F516880C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D9FA66D9-E465-406E-A95C-608A1BE34D74", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "1456B204-A2A5-4790-A684-7F50D692EC9F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "AD715BDD-7C74-4785-BEDF-75918F6FB37A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4CD10664-94D0-48C0-92EF-E8EA66841245", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "071A47F9-FF35-4F2C-BF5D-897CAC8BC08A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "9E988448-36C9-47E0-9356-DA400EB824E3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "9D067EF9-00DB-4979-B12E-55749059A083", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A9FA300A-44B1-44EE-8111-C1296EB0B638", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8598A543-B30B-4BD4-9974-F432FFFDCDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "48DEBBAD-D28D-4784-BBD8-9FAD1710A919", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8A5FC516-6B48-4D77-B26D-FA097AC91D1A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "6A7437E4-5C09-436C-AFBC-F6B6747A4339", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ECBC0277-4990-4DE7-AD80-20E8A6F561D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7DAF69-662B-4999-A6AD-AA528B53EAF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D28306B1-3DDE-4444-9784-522B3D2163EE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "9257D187-1F2D-40F4-8C87-78978DB56C3F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AF8261-74E0-4F53-B82C-A7BA7559D7CB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "25AE251E-E99F-4546-85B0-C57834B040B7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C62FFCB9-4253-459B-9298-C252DA9177DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*", matchCriteriaId: "991CBDFB-6836-4D1F-80A9-14EBCE3F855F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B4C0250-DA0D-4CEE-99F4-C211163C6653", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8D453BF6-AB9F-4D47-B4DF-C25C67358FFE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*", matchCriteriaId: "005F5347-A5E6-4954-ACAB-E4DF29119724", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2A8413-DF92-4690-8BC1-A21001BDF76B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "882B8D8F-E154-45C3-BB47-5353167C9776", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*", matchCriteriaId: "C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A54B4EB4-EB41-4522-B7AB-C30F96099EA3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EAD7BE51-0BA6-4750-B274-A6E33D32B484", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "44C3EF8E-DF88-46DC-8E06-B009F346D1D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7E87F823-D924-4718-AD81-248A6C619531", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CCAC93E0-F982-4E37-866E-43B7BC5AC82E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC866C9-BB98-4320-9FFA-F0960C560DA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C3AD7495-3DA2-4596-9620-CD36D7C561AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E492F3F8-4188-41E4-9A84-5E30C4AC3378", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "718F2FDC-9EA4-4C4C-8821-B15E56AF8101", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "EC5CB558-BD42-4615-BC31-41CCF25DE5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E45BCCD0-65BB-431F-B448-221C1595CD92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F33BA722-0680-4074-8D03-41657F8CDCC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", matchCriteriaId: "295C46B4-5E9F-4DD8-861B-00BA43923306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "431570C7-74A1-4F7E-8FD0-690AEF0F823B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C5D22E15-E1E8-4115-A55F-5743CA9C5947", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*", matchCriteriaId: "F840171D-CA1C-4E25-BD41-6B871C47BB84", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B240B20-CF48-4A72-9653-9D04D59C1391", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", matchCriteriaId: "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", matchCriteriaId: "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74CCD143-3D6E-4880-B275-ECF5B04238C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D3784F-C572-4A6F-83B9-BCF64D339BC9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E09C466B-CE87-4A57-B40B-88C94BAAF36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", matchCriteriaId: "D58FF034-8E07-4518-A858-5F16F22217E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "376AD386-373D-4B24-966F-D11F76C9020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2280CAA3-03F6-4168-8E50-A6B7132A3B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0C1174-C789-4547-9899-F7FCD0905F92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EC366801-655A-403B-ACD9-3BB43802A3C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FF5463D0-A8D3-43EC-8CFF-F659A8C84436", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "05D4D7E4-B195-46D8-8A6B-6AA4B8357618", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "39600E51-4A21-4E5B-9FF9-E7C00AE86646", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "47E4D5A8-7E4A-44C5-81DC-84712781206D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B13D6D50-D0FA-4527-BED3-52560DDD5253", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "965BF315-D833-4711-97FC-512151113367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", matchCriteriaId: "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "04072C0F-78A2-4D10-87B2-52DC2537BA89", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5C080E-D5C4-47B2-A46C-4EB3051C5221", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "41CEBEE0-DA67-4EE5-9BCF-263843053A8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FD262F58-C47F-439E-A9FF-D1C60120D306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "35490BDE-DF21-495E-9F8A-7631FCB32A1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", matchCriteriaId: "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", matchCriteriaId: "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", matchCriteriaId: "7670A322-31C2-4A8A-86E9-09D63C52E4C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", matchCriteriaId: "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "0972076B-5C87-44B3-90EC-4C200B89318A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74AED057-2458-4DE0-8D51-ABD766D07F68", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "19538C03-5FB8-4401-8B21-489C629D7E7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B26D7061-F471-4DF0-A892-ED132958B84A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "033ED443-80E7-4012-9825-07AAC0D44B96", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "AD3F3CC6-A349-47B1-B282-B6458683C191", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CB24EF21-1C10-48A7-BC68-FFC842A28D12", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ED0625A2-BF14-4552-83D8-AEE0A04EA023", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", matchCriteriaId: "21AFDC0D-7629-424E-827B-C8A8767324C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "A263CFF2-A659-405B-90EA-51E49B25C6D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFBD449-217D-4569-99F7-D56B853A3E07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED668FC-D1A5-4175-A234-23760BA6E788", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0D650C48-9241-42F7-87A9-20733329489A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3ED16A65-9AFF-4825-95D1-162FBA0F566D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82D345E7-8208-41AC-B11A-4425D29E98A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E386D461-F1C1-4970-B056-D6119E74D449", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "99F3A466-F665-4132-ABC4-2DFC0A7E2B55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B3395168-FF2E-4CB6-AABE-5E36DEB241CA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "226F985C-4669-4D0A-9DB4-CB1465B37B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0B736A43-6F4E-40A9-84E4-D9E251489234", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", matchCriteriaId: "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E99CA124-7D86-463B-A31E-A7836B7493E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E014B028-8DD9-428C-B705-8F428F145932", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A6C44229-A842-49B2-AD3E-79C83DB63EBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5306E847-C718-4C83-9C97-8AB498DC4A88", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "18287CEF-B574-4498-A256-567CA6E6CA7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "1E9AAA2C-495E-4FD1-9050-264FDC25254B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5713043E-2535-4540-B3EF-41FAC40BECE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "67701D77-8B03-446A-AE22-4B8CCCD6F029", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "831A2390-7170-4FC0-A95E-3DAB1791017D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "F788CBC4-782F-4A43-AC80-4AEF1C43A22D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "493989DC-8F1B-45C9-AD11-38B97B958C9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", matchCriteriaId: "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", matchCriteriaId: "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", matchCriteriaId: "F168FB20-0C44-4A5B-910A-04B9517545C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", matchCriteriaId: "737F22AB-C5A9-4A18-BA3D-38A222491397", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "D5508320-8318-41A8-8026-4A61907C1CD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD337D8-8C72-4025-A8C3-E63598DE7BDB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", matchCriteriaId: "176ACF88-6112-4179-8492-50C50577B300", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*", matchCriteriaId: "D07FC868-0B38-4F24-BA40-87966FF80AB7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", matchCriteriaId: "C19A801D-02D7-40B0-88E8-FE7BA8630E60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", matchCriteriaId: "D4035136-CC10-4DDD-92AF-9DC41D19CF8A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "19017B10-F630-42CD-ACD2-E817FEF0E7F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "04A41A34-58D2-4DBC-ABC9-20A62BC8A838", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "2BA015C4-7163-4FCD-ADE1-D5481B10EACA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", matchCriteriaId: "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "74E1226B-46CF-4C82-911A-86C818A75DFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "1C85BAAF-819B-40E7-9099-04AA8D9AB114", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.", }, { lang: "es", value: "Múltiples vulnerabilidades en la característica Login Enhancements (Login Block) de Cisco IOS Software permite que un atacante remoto no autenticado desencadene el reinicio de un sistema afectado. Esto resulta una condición de denegación de servicio (DoS). Estas vulnerabilidades afectan a los dispositivos Cisco que ejecutan Cisco IOS Software Release 15.4(2)T, 15.4(3)M o 15.4(2)CG y siguientes. Cisco Bug IDs: CSCuy32360, CSCuz60599.", }, ], id: "CVE-2018-0180", lastModified: "2025-01-27T21:16:17.263", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-28T22:29:01.547", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/103556", }, { source: "psirt@cisco.com", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/103556", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-09-25 21:15
Modified
2024-11-21 04:23
Severity ?
Summary
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", matchCriteriaId: "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1:a:*:*:*:*:*:*", matchCriteriaId: "A2C32E72-009C-4377-8EF0-5090A64450AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "0C24227E-9FF6-4757-A342-958CA4B8BF63", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "9E529335-18D1-4CEC-A8D5-CC1CA33D64F5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "3072DEFA-61D6-413F-97FD-F64C0E90155C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "D9FBFB5C-347B-4F73-93BE-4D3137D8F93A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "9F040372-CDAD-4AC4-9B7C-BFF9658B6BF2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "C33862F1-652A-4F60-BD3E-A6B3733E56A9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "130205FD-CA31-4E49-B8C4-181840270C70", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "908A56D8-64AF-4813-9D4D-C429C0603A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "03A2AA1C-7568-4BB6-BBD3-8E03D32CDA1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "53DAF422-7E0B-44EB-AD8D-4643A9711739", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "1F7F661E-335C-4123-9363-E2E5D51846C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c1117-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "E93E05E8-32E9-4441-BA6D-FCDC413979BF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c1117-4plteea:-:*:*:*:*:*:*:*", matchCriteriaId: "0EB9CE31-BA5F-4111-881D-EB8546950BA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c1117-4pltela:-:*:*:*:*:*:*:*", matchCriteriaId: "1693D321-0465-42D9-A947-4A428F836CDD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:encs5412\\/k9:-:*:*:*:*:*:*:*", matchCriteriaId: "FF3E4DCA-455C-4D93-973C-C613781E6406", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:encs5412\\/k9-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "313B08AE-E0ED-43E8-A182-9578CFA1BFD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:sasr1k1xucmk9-1610:-:*:*:*:*:*:*:*", matchCriteriaId: "8DBC3978-6CA8-46E3-ADFB-0C67E7BAC5CE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:sasr1k2xucmk9-1610:-:*:*:*:*:*:*:*", matchCriteriaId: "38348475-5EFC-471E-B32A-487967F9D479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:sasr1khxucmk9-1610:-:*:*:*:*:*:*:*", matchCriteriaId: "5D01ABAC-C744-4A8B-9DAD-EEA9AC01EA56", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:sisr1100ucmk9-1610:-:*:*:*:*:*:*:*", matchCriteriaId: "3B354F0C-36C4-492F-BE33-B89042F36876", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.", }, { lang: "es", value: "Una vulnerabilidad en la CLI del Software Cisco IOS XE, podría permitir a un atacante local autenticado conseguir acceso de shell en un dispositivo afectado y ejecutar comandos sobre el sistema operativo (SO) subyacente. La vulnerabilidad es debido a la aplicación insuficiente del token de consentimiento en la autorización del acceso de shell. Un atacante podría explotar esta vulnerabilidad mediante la autenticación en la CLI y solicitando acceso de shell en un dispositivo afectado. Una explotación con éxito podría permitir al atacante conseguir acceso de shell en el dispositivo afectado y ejecutar comandos en el Sistema Operativo subyacente.", }, ], id: "CVE-2019-12671", lastModified: "2024-11-21T04:23:19.470", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-09-25T21:15:11.750", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-285", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-27 18:15
Modified
2024-11-21 07:40
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
Note: Only traffic directed to the affected system can be used to exploit this vulnerability.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", matchCriteriaId: "57D4F634-03D5-4D9F-901C-7E9CE45F2F38", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", matchCriteriaId: "4463A1D1-E169-4F0B-91B2-FA126BB444CB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", matchCriteriaId: "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", matchCriteriaId: "CDD58C58-1B0C-4A71-8C02-F555CEF9C253", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", matchCriteriaId: "96852D16-AF50-4C70-B125-D2349E6765D7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", matchCriteriaId: "A15B882A-BA60-4932-A55E-F4A798B30EEB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", matchCriteriaId: "5C9C585C-A6EC-4385-B915-046C110BF95F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", matchCriteriaId: "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", matchCriteriaId: "47DBE4ED-1CD8-4134-9B33-17A91F44F17B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", matchCriteriaId: "119A964D-ABC8-424D-8097-85B832A833BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", matchCriteriaId: "0375BF9E-D04B-4E5B-9051-536806ECA44E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", matchCriteriaId: "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", matchCriteriaId: "78DE7780-4E8B-4BB6-BDEB-58032EC65851", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", matchCriteriaId: "F29CEE37-4044-4A3C-9685-C9C021FD346A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", matchCriteriaId: "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", matchCriteriaId: "E4BF9829-F80E-4837-A420-39B291C4E17B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", matchCriteriaId: "F5AB80E7-0714-44ED-9671-12C877B36A1E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", matchCriteriaId: "10182B94-6831-461E-B0FC-9476EAB6EBEF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", matchCriteriaId: "961F8312-31B9-44E7-8858-EF8E2134F447", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*", matchCriteriaId: "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*", matchCriteriaId: "79CF8D4E-F82A-469C-A8C2-0C203A800A05", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", matchCriteriaId: "DB6BD18B-B9BD-452F-986E-16A6668E46B6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", matchCriteriaId: "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", matchCriteriaId: "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", matchCriteriaId: "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", matchCriteriaId: "04081A51-E08F-4114-9276-584E836181D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", matchCriteriaId: "ADED0D82-2A4D-4235-BFAC-5EE2D862B652", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", matchCriteriaId: "62A46516-CEB7-48D4-879B-341963A1FA31", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", matchCriteriaId: "D6EF98FA-6DF9-4935-9639-143E08462BC4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", matchCriteriaId: "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", matchCriteriaId: "0A443E93-6C4B-4F86-BA7C-7C2A929E795A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", matchCriteriaId: "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", matchCriteriaId: "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", matchCriteriaId: "314C7763-A64D-4023-9F3F-9A821AE4151F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", matchCriteriaId: "5820D71D-FC93-45AA-BC58-A26A1A39C936", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", matchCriteriaId: "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", matchCriteriaId: "B53E377A-0296-4D7A-B97C-576B0026543D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", matchCriteriaId: "C98DED36-D4B5-48D6-964E-EEEE97936700", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", matchCriteriaId: "CD98C9E8-3EA6-4160-970D-37C389576516", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", matchCriteriaId: "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", matchCriteriaId: "9027A528-2588-4C06-810B-5BB313FE4323", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", matchCriteriaId: "7745ED34-D59D-49CC-B174-96BCA03B3374", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", matchCriteriaId: "19AF4CF3-6E79-4EA3-974D-CD451A192BA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", matchCriteriaId: "313BD54C-073C-4F27-82D5-C99EFC3A20F7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", matchCriteriaId: "93B96E01-3777-4C33-9225-577B469A6CE5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*", matchCriteriaId: "D18B32E3-6B33-4E3D-879A-82E2F0BFC906", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*", matchCriteriaId: "46E37204-FC9A-4397-AFA4-9CAC7A116D55", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", matchCriteriaId: "E5019B59-508E-40B0-9C92-2C26F58E2FBE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", matchCriteriaId: "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", matchCriteriaId: "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", matchCriteriaId: "D5750264-2990-4942-85F4-DB9746C5CA2B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", matchCriteriaId: "B9173AD6-6658-4267-AAA7-D50D0B657528", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", matchCriteriaId: "7F02EE9D-45B1-43D6-B05D-6FF19472216B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", matchCriteriaId: "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*", matchCriteriaId: "8FCB9440-F470-45D1-AAFA-01FB5D76B600", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*", matchCriteriaId: "3F66ECFE-B631-47AE-995F-024A4E586A85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*", matchCriteriaId: "5B736F09-3B51-4B2A-92F6-602847001F15", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*", matchCriteriaId: "2F58A94E-B050-4EFA-84BA-43B11BA22E77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*", matchCriteriaId: "5E864BB1-FD23-4AB3-9138-5FD8B62EAF5B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*", matchCriteriaId: "838D6C2D-C131-4A9C-AAE5-5BF38E637E4B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", matchCriteriaId: "E306B09C-CB48-4067-B60C-5F738555EEAC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", matchCriteriaId: "CD446C51-E713-4E46-8328-0A0477D140D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", matchCriteriaId: "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", matchCriteriaId: "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", matchCriteriaId: "8B4D4659-A304-459F-8AB3-ED6D84B44C0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", matchCriteriaId: "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", matchCriteriaId: "B51FA707-8DB1-4596-9122-D4BFEF17F400", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", matchCriteriaId: "C04DF35A-1B6F-420A-8D84-74EB41BF3700", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", matchCriteriaId: "211CC9B2-6108-4C50-AB31-DC527C43053E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", matchCriteriaId: "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", matchCriteriaId: "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", matchCriteriaId: "128F95D7-E49F-4B36-8F47-823C0298449E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", matchCriteriaId: "E21B3881-37E9-4C00-9336-12C9C28D1B61", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*", matchCriteriaId: "E54599DB-A85E-4EEA-9985-2CBF90E28A08", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*", matchCriteriaId: "4046C325-7EDB-4C95-AA98-541BEC8F9E0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*", matchCriteriaId: "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", matchCriteriaId: "2B270A04-9961-4E99-806B-441CD674AFBD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", matchCriteriaId: "1360069D-0358-4746-8C3F-44C2A40988D7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*", matchCriteriaId: "C5DD2403-113B-4100-8BD4-90E1927E6648", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*", matchCriteriaId: "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*", matchCriteriaId: "2DDB1E60-C2A9-4570-BE80-F3D478A53738", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*", matchCriteriaId: "0CEF022B-271F-4017-B74B-82748D5EBA01", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*", matchCriteriaId: "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*", matchCriteriaId: "8871B890-78F4-4D9D-AEFF-6A393493C51E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*", matchCriteriaId: "9E489AC5-A445-44FF-AA85-F0915577384E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*", matchCriteriaId: "917BA05C-2A18-4C68-B508-85C2B5A94416", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*", matchCriteriaId: "06337791-7D8D-4EAA-BACC-4E270F377B3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", matchCriteriaId: "5A6B707B-4543-41F1-83DF-49A93BF56FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*", matchCriteriaId: "DC8F611B-D347-4A21-90E6-56CF4D8A35A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*", matchCriteriaId: "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*", matchCriteriaId: "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*", matchCriteriaId: "46B52A51-51DB-4A12-AB1D-8D9605226599", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*", matchCriteriaId: "938B0720-8CA7-43BA-9708-5CE9EC7A565A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*", matchCriteriaId: "D4BE7166-DBD3-4CE6-A14A-725FE896B85E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.5.1b:*:*:*:*:*:*:*", matchCriteriaId: "4B5244CD-ECFA-4CCD-B611-C5A59368C5E1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.5.1c:*:*:*:*:*:*:*", matchCriteriaId: "BDEDC7A0-D031-433B-ABF5-4EC0A43D80CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*", matchCriteriaId: "CF365FC4-46E3-4564-9F25-1C2FBE70057B", vulnerable: false, }, { criteria: "cpe:2.3:a:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "237136F5-5A1B-4033-8B7C-CDAD66AF25DF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*", matchCriteriaId: "CCF17101-9EF9-47BB-B966-0FA9B71AEEFA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F0C218-B0FF-4BEC-B76F-1F4BAA6D0960", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c8500l-8s4x:-:*:*:*:*:*:*:*", matchCriteriaId: "FB2038BF-DC77-4326-B80C-FC3384FED25E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg400-2fxs\\/2fxo:-:*:*:*:*:*:*:*", matchCriteriaId: "9FC16DF0-4615-4708-94C7-65C1904E0C88", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg400-4fxs\\/4fxo:-:*:*:*:*:*:*:*", matchCriteriaId: "12929A1A-E99D-42F8-98A7-1A4834776C33", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg400-6fxs\\/6fxo:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAF0FE8-6B3D-4E05-BA56-68C348823702", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg400-8fxs:-:*:*:*:*:*:*:*", matchCriteriaId: "C55C2498-7DDF-4B67-ACF6-3E2F908691F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg420-132fxs\\/6fxo:-:*:*:*:*:*:*:*", matchCriteriaId: "7AC254AB-3347-4331-B50A-97E7EE6386F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg420-144fxs:-:*:*:*:*:*:*:*", matchCriteriaId: "8C350434-E44A-414F-A78A-EAE4F9768CE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg420-84fxs\\/6fxo:-:*:*:*:*:*:*:*", matchCriteriaId: "B122209A-F538-4DE9-9074-1460FA32FD42", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg450-144fxs\\/k9:-:*:*:*:*:*:*:*", matchCriteriaId: "16F71181-1455-495A-A644-5D97DEC2624E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg450-72fxs\\/k9:-:*:*:*:*:*:*:*", matchCriteriaId: "6D6E3CD4-B437-43D7-93E9-60E2AC5C46F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:vg450\\/k9:-:*:*:*:*:*:*:*", matchCriteriaId: "E756FCB7-053D-4F37-AC93-5B8BD2E13287", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.\r\n\r Note: Only traffic directed to the affected system can be used to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad en la función Layer 2 Tunneling Protocol (L2TP) del software Cisco IOS XE podría permitir que un atacante remoto no autenticado cause una condición de denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe al manejo inadecuado de ciertos paquetes L2TP. Un atacante podría aprovechar esta vulnerabilidad enviando paquetes L2TP manipulados a un dispositivo afectado. Un exploit exitoso podría permitir que el atacante haga que el dispositivo se recargue inesperadamente, lo que resultaría en una condición DoS. Nota: Solo se puede utilizar el tráfico dirigido al sistema afectado para aprovechar esta vulnerabilidad.", }, ], id: "CVE-2023-20227", lastModified: "2024-11-21T07:40:56.480", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-27T18:15:11.370", references: [ { source: "psirt@cisco.com", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mitigation", "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-388", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-29 01:34
Modified
2025-01-27 19:01
Severity ?
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101037 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1039460 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101037 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039460 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike | Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-03-24", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IOS and IOS XE Software Internet Key Exchange Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "650EB42C-D85F-482B-972D-7DCAC210DC48", versionEndIncluding: "15.6", versionStartIncluding: "15.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "F6F88B83-D6C8-4B41-94B2-F95E6E6E5248", versionEndIncluding: "16.5", versionStartIncluding: "3.5.0e", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5E48D7-2266-4649-90A9-62C476AFE6DE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "99581637-E184-4A02-8313-57C7C31E5479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C58CEA6-69F8-4021-98C9-4676C70AB167", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DF156D97-7C39-49CF-9938-D9681066FF05", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "871AC0F6-5C01-43A1-8436-7885439BD81F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2147DBF8-B733-4F76-90C5-9D94F1E93625", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9222CA59-F4FD-478D-83C9-566B389140B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "03A273EE-41C1-41E9-9002-46F83FC6533F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "E055F58F-F9FB-4B27-841E-61ECAB5F42B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", matchCriteriaId: "2B832863-E366-46ED-BC35-838762F0CE29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", matchCriteriaId: "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*", matchCriteriaId: "A34DAD43-0C95-4830-8078-EFE3E6C0A930", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*", matchCriteriaId: "46F5CBF0-7F55-44C0-B321-896BDBA22679", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*", matchCriteriaId: "D381E343-416F-42AF-A780-D330954F238F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "4B4318C0-0FD0-46B3-8E23-94EC53A34A20", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "16FC6220-78E1-44A6-A596-6368D3EF7CC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "DCAEDE0A-E6F9-4727-8DC2-F47579220BE0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2514A1-486C-40F7-8746-56E2B973CBE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "C2C3816C-95F4-443C-9C79-72F0251528F4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "E1810C73-93B8-4EB5-85FC-3585AD5256BA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2BC76E-A166-4E71-B058-F49FF84A9E19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "542244A0-300C-4630-812A-BF45F61E38DD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*", matchCriteriaId: "7814FA61-CAF1-46DE-9D84-CEBE6480EA03", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7EE4F60E-DF3D-4839-8731-7CF16DA8FF26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8EA5EEE3-A084-46B4-84C0-ADFD69800649", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "592F67D5-344B-49AF-A277-1089A40AC2FD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*", matchCriteriaId: "7434059A-25B8-4FAC-A756-6E571348B76E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DB2A5355-BF40-437C-8683-A7A81DEE362C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "43F4B90E-3499-45D4-864D-18505E2149F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*", matchCriteriaId: "858FEECF-CC69-4E68-8E8A-674643021964", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BE5FCCFF-E491-474F-9B86-AB51D8244582", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*", matchCriteriaId: "EA8464F8-D6D2-4165-ADE8-B40F7D8556C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*", matchCriteriaId: "61007628-A81B-43E0-86DE-1F7DDAD9F1A7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*", matchCriteriaId: "91B9F022-4C3D-493E-9418-E9CDDAFEC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*", matchCriteriaId: "B39F250E-6A89-4537-BD31-1FB81734A9A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CB4E3B69-DDE8-4EA2-8E63-D6EEF41083B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*", matchCriteriaId: "8904EAF5-25E7-4A6B-8117-1859F913B83B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A369CD35-1242-4556-A83D-BD69CC149CFA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "784A1499-1F33-493D-B433-EB2550C03C19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*", matchCriteriaId: "59A990D6-B748-4AFD-B924-1D19680BD3DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CECFC88D-5480-46E4-BF74-E11A514A8BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E54D16A8-0407-41E3-9599-9A6F57E1AA75", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DF3818CC-8653-4A9E-A57B-950A15914D6B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7EDC790B-B42D-45DB-ACF5-A789F76C2BC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2A6BC84-91F2-437D-9D2E-F8B3F5966767", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7F331F13-5D05-4213-B442-D48D8E22287B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A6E312F4-90DA-40E4-BCD1-92F41BEEEECF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CA32EA3F-946D-430D-B00F-939D828DD72C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D239A09C-34D2-4418-B538-03A1080B8479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2C84561E-DD99-4433-9EF2-083F7C300123", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B29871BE-CA7D-4108-B46A-CBD539C9A2B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "39CD9189-6524-4157-B90E-FF6A81DE3599", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2CF1B702-643A-4AF2-B0AD-3C540CF85F2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "96269625-CB31-4850-872B-B2C1321B13B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*", matchCriteriaId: "426B68A6-3A41-43DB-846F-AEFBA62E221B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5BDE086A-3FE5-46E3-BD66-23D0AE5089BE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "FA53775A-D3ED-4D34-8338-A384DBEB94E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7D4522-D6BB-467F-AF5D-4D753A89D524", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*", matchCriteriaId: "9C96215F-A300-4B4E-9D3A-C32E484BFC5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0C680534-C663-40B0-A4AA-7F292EE60FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "BAF4F233-7B47-46ED-BDC5-A589BCFC0B39", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A528EC0-4650-4787-BE52-A588E7E38A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "53898E96-03D6-43A2-AE05-46C62464BD26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*", matchCriteriaId: "465917E5-8BF0-4BBB-85A0-DE8F516880C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D9FA66D9-E465-406E-A95C-608A1BE34D74", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "1456B204-A2A5-4790-A684-7F50D692EC9F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "AD715BDD-7C74-4785-BEDF-75918F6FB37A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4CD10664-94D0-48C0-92EF-E8EA66841245", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "071A47F9-FF35-4F2C-BF5D-897CAC8BC08A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "9E988448-36C9-47E0-9356-DA400EB824E3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "9D067EF9-00DB-4979-B12E-55749059A083", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A9FA300A-44B1-44EE-8111-C1296EB0B638", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8598A543-B30B-4BD4-9974-F432FFFDCDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "48DEBBAD-D28D-4784-BBD8-9FAD1710A919", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8A5FC516-6B48-4D77-B26D-FA097AC91D1A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "6A7437E4-5C09-436C-AFBC-F6B6747A4339", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ECBC0277-4990-4DE7-AD80-20E8A6F561D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7DAF69-662B-4999-A6AD-AA528B53EAF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D28306B1-3DDE-4444-9784-522B3D2163EE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "9257D187-1F2D-40F4-8C87-78978DB56C3F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AF8261-74E0-4F53-B82C-A7BA7559D7CB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "25AE251E-E99F-4546-85B0-C57834B040B7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C62FFCB9-4253-459B-9298-C252DA9177DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*", matchCriteriaId: "991CBDFB-6836-4D1F-80A9-14EBCE3F855F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B4C0250-DA0D-4CEE-99F4-C211163C6653", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8D453BF6-AB9F-4D47-B4DF-C25C67358FFE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*", matchCriteriaId: "005F5347-A5E6-4954-ACAB-E4DF29119724", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2A8413-DF92-4690-8BC1-A21001BDF76B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "882B8D8F-E154-45C3-BB47-5353167C9776", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*", matchCriteriaId: "C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A54B4EB4-EB41-4522-B7AB-C30F96099EA3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EAD7BE51-0BA6-4750-B274-A6E33D32B484", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "44C3EF8E-DF88-46DC-8E06-B009F346D1D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7E87F823-D924-4718-AD81-248A6C619531", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CCAC93E0-F982-4E37-866E-43B7BC5AC82E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC866C9-BB98-4320-9FFA-F0960C560DA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C3AD7495-3DA2-4596-9620-CD36D7C561AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E492F3F8-4188-41E4-9A84-5E30C4AC3378", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "718F2FDC-9EA4-4C4C-8821-B15E56AF8101", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "EC5CB558-BD42-4615-BC31-41CCF25DE5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E45BCCD0-65BB-431F-B448-221C1595CD92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F33BA722-0680-4074-8D03-41657F8CDCC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", matchCriteriaId: "295C46B4-5E9F-4DD8-861B-00BA43923306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "431570C7-74A1-4F7E-8FD0-690AEF0F823B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C5D22E15-E1E8-4115-A55F-5743CA9C5947", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*", matchCriteriaId: "F840171D-CA1C-4E25-BD41-6B871C47BB84", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B240B20-CF48-4A72-9653-9D04D59C1391", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", matchCriteriaId: "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", matchCriteriaId: "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74CCD143-3D6E-4880-B275-ECF5B04238C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D3784F-C572-4A6F-83B9-BCF64D339BC9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E09C466B-CE87-4A57-B40B-88C94BAAF36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", matchCriteriaId: "D58FF034-8E07-4518-A858-5F16F22217E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "376AD386-373D-4B24-966F-D11F76C9020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2280CAA3-03F6-4168-8E50-A6B7132A3B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0C1174-C789-4547-9899-F7FCD0905F92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EC366801-655A-403B-ACD9-3BB43802A3C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FF5463D0-A8D3-43EC-8CFF-F659A8C84436", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "05D4D7E4-B195-46D8-8A6B-6AA4B8357618", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "39600E51-4A21-4E5B-9FF9-E7C00AE86646", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "47E4D5A8-7E4A-44C5-81DC-84712781206D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B13D6D50-D0FA-4527-BED3-52560DDD5253", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "965BF315-D833-4711-97FC-512151113367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", matchCriteriaId: "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "04072C0F-78A2-4D10-87B2-52DC2537BA89", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5C080E-D5C4-47B2-A46C-4EB3051C5221", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "41CEBEE0-DA67-4EE5-9BCF-263843053A8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FD262F58-C47F-439E-A9FF-D1C60120D306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "35490BDE-DF21-495E-9F8A-7631FCB32A1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", matchCriteriaId: "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", matchCriteriaId: "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", matchCriteriaId: "7670A322-31C2-4A8A-86E9-09D63C52E4C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", matchCriteriaId: "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "0972076B-5C87-44B3-90EC-4C200B89318A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74AED057-2458-4DE0-8D51-ABD766D07F68", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "19538C03-5FB8-4401-8B21-489C629D7E7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B26D7061-F471-4DF0-A892-ED132958B84A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "033ED443-80E7-4012-9825-07AAC0D44B96", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "AD3F3CC6-A349-47B1-B282-B6458683C191", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CB24EF21-1C10-48A7-BC68-FFC842A28D12", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ED0625A2-BF14-4552-83D8-AEE0A04EA023", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", matchCriteriaId: "21AFDC0D-7629-424E-827B-C8A8767324C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "A263CFF2-A659-405B-90EA-51E49B25C6D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFBD449-217D-4569-99F7-D56B853A3E07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED668FC-D1A5-4175-A234-23760BA6E788", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0D650C48-9241-42F7-87A9-20733329489A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3ED16A65-9AFF-4825-95D1-162FBA0F566D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82D345E7-8208-41AC-B11A-4425D29E98A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E386D461-F1C1-4970-B056-D6119E74D449", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "99F3A466-F665-4132-ABC4-2DFC0A7E2B55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B3395168-FF2E-4CB6-AABE-5E36DEB241CA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "226F985C-4669-4D0A-9DB4-CB1465B37B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0B736A43-6F4E-40A9-84E4-D9E251489234", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", matchCriteriaId: "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E99CA124-7D86-463B-A31E-A7836B7493E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E014B028-8DD9-428C-B705-8F428F145932", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A6C44229-A842-49B2-AD3E-79C83DB63EBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5306E847-C718-4C83-9C97-8AB498DC4A88", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "18287CEF-B574-4498-A256-567CA6E6CA7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "1E9AAA2C-495E-4FD1-9050-264FDC25254B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5713043E-2535-4540-B3EF-41FAC40BECE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "67701D77-8B03-446A-AE22-4B8CCCD6F029", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "831A2390-7170-4FC0-A95E-3DAB1791017D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "F788CBC4-782F-4A43-AC80-4AEF1C43A22D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "493989DC-8F1B-45C9-AD11-38B97B958C9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", matchCriteriaId: "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", matchCriteriaId: "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", matchCriteriaId: "F168FB20-0C44-4A5B-910A-04B9517545C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", matchCriteriaId: "737F22AB-C5A9-4A18-BA3D-38A222491397", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "2E5DCFD5-2B46-4D06-9E4C-B2325F440F02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "D5508320-8318-41A8-8026-4A61907C1CD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD337D8-8C72-4025-A8C3-E63598DE7BDB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", matchCriteriaId: "176ACF88-6112-4179-8492-50C50577B300", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*", matchCriteriaId: "D07FC868-0B38-4F24-BA40-87966FF80AB7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", matchCriteriaId: "C19A801D-02D7-40B0-88E8-FE7BA8630E60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA59279-3504-417D-9E86-E5886EE198BD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", matchCriteriaId: "D4035136-CC10-4DDD-92AF-9DC41D19CF8A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "86879AC0-890E-42F4-9561-6851F38FE0AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "19017B10-F630-42CD-ACD2-E817FEF0E7F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "04A41A34-58D2-4DBC-ABC9-20A62BC8A838", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*", matchCriteriaId: "8DF0025D-8DE1-437D-9A4E-72C3AC6B46CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CCBE67-E509-43EC-9AFB-8A9B6A115126", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "2BA015C4-7163-4FCD-ADE1-D5481B10EACA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*", matchCriteriaId: "44D19136-4ECB-437F-BA8A-E2FE35A39BF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.", }, { lang: "es", value: "Una vulnerabilidad en el módulo Internet Key Exchange Version 2 (IKEv2) de Cisco IOS desde la versión 15.0 hasta la 15.6 y Cisco IOS XE desde la versión 3.5 hasta la 16.5 podría permitir que un atacante remoto no autenticado provoque que haya un consumo elevado de recursos de CPU, que pueda leer trazas del sistema o que reinicie el dispositivo afectado para provocar una denegación de servicio (DoS). Esta vulnerabilidad se debe a la manera en la que el dispositivo afectado procesa ciertos paquetes IKEv2. Un atacante podría explotar esta vulnerabilidad enviando unos paquetes IKEv2 específicos al dispositivo afectado para que los procese. Una explotación exitosa podría permitir al atacante provocar que haya un consumo elevado de recursos de CPU, que pueda leer trazas del sistema o que reinicie el dispositivo afectado para provocar una denegación de servicio (DoS). Esta vulnerabilidad afecta a dispositivos de Cisco que tienen habilitado ISAKMP (Internet Security Association and Key Management Protocol). Aunque solo se pueden utilizar paquetes IKEv2 para desencadenar esta vulnerabilidad, los dispositivos que ejecuten Cisco IOS o Cisco IOS XE serían también vulnerables cuando ISAKMP está habilitado. No se necesita configurar los dispositivos con ninguna característica específica de IKEv2 para que sean vulnerables. Muchas características utilizan IKEv2, incluyendo diferentes tipos de VPN como los mostrados a continuación: LAN-to-LAN VPN; Remote-access VPN, excepto SSL VPN; Dynamic Multipoint VPN (DMVPN) y FlexVPN. Cisco Bug IDs: CSCvc41277.", }, ], id: "CVE-2017-12237", lastModified: "2025-01-27T19:01:05.863", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-29T01:34:48.967", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101037", }, { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039460", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101037", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039460", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2018-03-28 22:29
Modified
2025-01-27 20:09
Severity ?
Summary
A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/103559 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1040585 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103559 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040585 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos | Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-03-17", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IOS Software Integrated Services Module for VPN Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*", matchCriteriaId: "B6230A85-30D2-4934-A8A0-11499B7B09F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5E48D7-2266-4649-90A9-62C476AFE6DE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "99581637-E184-4A02-8313-57C7C31E5479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C58CEA6-69F8-4021-98C9-4676C70AB167", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DF156D97-7C39-49CF-9938-D9681066FF05", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "871AC0F6-5C01-43A1-8436-7885439BD81F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2147DBF8-B733-4F76-90C5-9D94F1E93625", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9222CA59-F4FD-478D-83C9-566B389140B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "E055F58F-F9FB-4B27-841E-61ECAB5F42B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", matchCriteriaId: "2B832863-E366-46ED-BC35-838762F0CE29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", matchCriteriaId: "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8208:-:*:*:*:*:*:*:*", matchCriteriaId: "A34DAD43-0C95-4830-8078-EFE3E6C0A930", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8212:-:*:*:*:*:*:*:*", matchCriteriaId: "46F5CBF0-7F55-44C0-B321-896BDBA22679", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8218:-:*:*:*:*:*:*:*", matchCriteriaId: "D381E343-416F-42AF-A780-D330954F238F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "4B4318C0-0FD0-46B3-8E23-94EC53A34A20", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "16FC6220-78E1-44A6-A596-6368D3EF7CC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "DCAEDE0A-E6F9-4727-8DC2-F47579220BE0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2514A1-486C-40F7-8746-56E2B973CBE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "C2C3816C-95F4-443C-9C79-72F0251528F4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "E1810C73-93B8-4EB5-85FC-3585AD5256BA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "CE2BC76E-A166-4E71-B058-F49FF84A9E19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "542244A0-300C-4630-812A-BF45F61E38DD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", matchCriteriaId: "917B52DF-4210-4DD6-97EF-8A033497A954", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", matchCriteriaId: "D7F413FB-D4F9-4113-9D67-2956BF1DC30D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*", matchCriteriaId: "005F5347-A5E6-4954-ACAB-E4DF29119724", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2A8413-DF92-4690-8BC1-A21001BDF76B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "882B8D8F-E154-45C3-BB47-5353167C9776", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*", matchCriteriaId: "C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A54B4EB4-EB41-4522-B7AB-C30F96099EA3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EAD7BE51-0BA6-4750-B274-A6E33D32B484", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "44C3EF8E-DF88-46DC-8E06-B009F346D1D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7E87F823-D924-4718-AD81-248A6C619531", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CCAC93E0-F982-4E37-866E-43B7BC5AC82E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC866C9-BB98-4320-9FFA-F0960C560DA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C3AD7495-3DA2-4596-9620-CD36D7C561AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E492F3F8-4188-41E4-9A84-5E30C4AC3378", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "718F2FDC-9EA4-4C4C-8821-B15E56AF8101", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "EC5CB558-BD42-4615-BC31-41CCF25DE5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E45BCCD0-65BB-431F-B448-221C1595CD92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F33BA722-0680-4074-8D03-41657F8CDCC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", matchCriteriaId: "295C46B4-5E9F-4DD8-861B-00BA43923306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "431570C7-74A1-4F7E-8FD0-690AEF0F823B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C5D22E15-E1E8-4115-A55F-5743CA9C5947", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*", matchCriteriaId: "F840171D-CA1C-4E25-BD41-6B871C47BB84", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B240B20-CF48-4A72-9653-9D04D59C1391", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", matchCriteriaId: "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", matchCriteriaId: "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74CCD143-3D6E-4880-B275-ECF5B04238C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D3784F-C572-4A6F-83B9-BCF64D339BC9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E09C466B-CE87-4A57-B40B-88C94BAAF36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", matchCriteriaId: "D58FF034-8E07-4518-A858-5F16F22217E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "376AD386-373D-4B24-966F-D11F76C9020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2280CAA3-03F6-4168-8E50-A6B7132A3B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0C1174-C789-4547-9899-F7FCD0905F92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EC366801-655A-403B-ACD9-3BB43802A3C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FF5463D0-A8D3-43EC-8CFF-F659A8C84436", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "05D4D7E4-B195-46D8-8A6B-6AA4B8357618", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "39600E51-4A21-4E5B-9FF9-E7C00AE86646", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "47E4D5A8-7E4A-44C5-81DC-84712781206D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B13D6D50-D0FA-4527-BED3-52560DDD5253", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "965BF315-D833-4711-97FC-512151113367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", matchCriteriaId: "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "04072C0F-78A2-4D10-87B2-52DC2537BA89", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5C080E-D5C4-47B2-A46C-4EB3051C5221", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "41CEBEE0-DA67-4EE5-9BCF-263843053A8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FD262F58-C47F-439E-A9FF-D1C60120D306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "35490BDE-DF21-495E-9F8A-7631FCB32A1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", matchCriteriaId: "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", matchCriteriaId: "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", matchCriteriaId: "7670A322-31C2-4A8A-86E9-09D63C52E4C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", matchCriteriaId: "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "0972076B-5C87-44B3-90EC-4C200B89318A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74AED057-2458-4DE0-8D51-ABD766D07F68", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "19538C03-5FB8-4401-8B21-489C629D7E7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B26D7061-F471-4DF0-A892-ED132958B84A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "033ED443-80E7-4012-9825-07AAC0D44B96", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "AD3F3CC6-A349-47B1-B282-B6458683C191", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CB24EF21-1C10-48A7-BC68-FFC842A28D12", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ED0625A2-BF14-4552-83D8-AEE0A04EA023", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", matchCriteriaId: "21AFDC0D-7629-424E-827B-C8A8767324C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "A263CFF2-A659-405B-90EA-51E49B25C6D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFBD449-217D-4569-99F7-D56B853A3E07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED668FC-D1A5-4175-A234-23760BA6E788", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0D650C48-9241-42F7-87A9-20733329489A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3ED16A65-9AFF-4825-95D1-162FBA0F566D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82D345E7-8208-41AC-B11A-4425D29E98A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E386D461-F1C1-4970-B056-D6119E74D449", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "99F3A466-F665-4132-ABC4-2DFC0A7E2B55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B3395168-FF2E-4CB6-AABE-5E36DEB241CA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "226F985C-4669-4D0A-9DB4-CB1465B37B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0B736A43-6F4E-40A9-84E4-D9E251489234", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", matchCriteriaId: "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E99CA124-7D86-463B-A31E-A7836B7493E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E014B028-8DD9-428C-B705-8F428F145932", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A6C44229-A842-49B2-AD3E-79C83DB63EBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5306E847-C718-4C83-9C97-8AB498DC4A88", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "18287CEF-B574-4498-A256-567CA6E6CA7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "1E9AAA2C-495E-4FD1-9050-264FDC25254B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5713043E-2535-4540-B3EF-41FAC40BECE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "67701D77-8B03-446A-AE22-4B8CCCD6F029", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "831A2390-7170-4FC0-A95E-3DAB1791017D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "F788CBC4-782F-4A43-AC80-4AEF1C43A22D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "493989DC-8F1B-45C9-AD11-38B97B958C9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", matchCriteriaId: "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", matchCriteriaId: "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", matchCriteriaId: "F168FB20-0C44-4A5B-910A-04B9517545C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", matchCriteriaId: "737F22AB-C5A9-4A18-BA3D-38A222491397", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "2E5DCFD5-2B46-4D06-9E4C-B2325F440F02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "D5508320-8318-41A8-8026-4A61907C1CD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD337D8-8C72-4025-A8C3-E63598DE7BDB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", matchCriteriaId: "176ACF88-6112-4179-8492-50C50577B300", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*", matchCriteriaId: "D07FC868-0B38-4F24-BA40-87966FF80AB7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", matchCriteriaId: "C19A801D-02D7-40B0-88E8-FE7BA8630E60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA59279-3504-417D-9E86-E5886EE198BD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", matchCriteriaId: "D4035136-CC10-4DDD-92AF-9DC41D19CF8A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "8E283C34-43AE-49A5-A72B-32DEA185ABD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB3AF13-5324-42CD-8EDB-6F730BF46214", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "78706517-83F4-4D44-A6EC-B78ADCEABAC0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "86879AC0-890E-42F4-9561-6851F38FE0AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "19017B10-F630-42CD-ACD2-E817FEF0E7F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "04A41A34-58D2-4DBC-ABC9-20A62BC8A838", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*", matchCriteriaId: "8DF0025D-8DE1-437D-9A4E-72C3AC6B46CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cbr8_converged_broadband_router:-:*:*:*:*:*:*:*", matchCriteriaId: "141CA33C-7453-417F-8A16-A64CE97C9052", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-con-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "B5E69A6F-DFC0-4C8A-B77F-B7329FA5F567", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr-6300-ncp-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "2BA015C4-7163-4FCD-ADE1-D5481B10EACA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*", matchCriteriaId: "44D19136-4ECB-437F-BA8A-E2FE35A39BF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267.", }, { lang: "es", value: "Una vulnerabilidad en el motor criptográfico del módulo Cisco Integrated Services Module for VPN (ISM-VPN) que ejecute Cisco IOS Software podría permitir que un atacante remoto sin autenticar provoque una denegación de servicio (DoS) en un sistema afectado. Esta vulnerabilidad se debe a una gestión insuficiente de tráfico VPN por parte de un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad enviando trafico VPN manipulado a un dispositivo afectado. Si se explota con éxito, esta situación podría permitir que el atacante consiga que el dispositivo se bloquee o se cierre de manera inesperada, lo que daría como resultado una denegación de servicio (DoS). Cisco Bug IDs: CSCvd39267.", }, ], id: "CVE-2018-0154", lastModified: "2025-01-27T20:09:29.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.8, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2018-03-28T22:29:00.373", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/103559", }, { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1040585", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/103559", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1040585", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-30 19:15
Modified
2024-11-21 06:43
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*", matchCriteriaId: "907DC50A-5624-413C-A61F-157B2B1E52BE", versionEndExcluding: "20.9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*", matchCriteriaId: "1F48596B-7315-4FF0-A91A-25B6AA94955B", versionEndExcluding: "20.9", vulnerable: true, }, { criteria: "cpe:2.3:a:cisco:sd-wan_vsmart_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "A6AC232B-0AF3-4B67-B080-72944C42CAE9", versionEndExcluding: "20.9", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:sd-wan:*:*:*:*:*:*:*:*", matchCriteriaId: "070EBD00-E21A-4510-BE38-A935E788FA39", versionEndExcluding: "20.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:catalyst_8000v_edge:-:*:*:*:*:*:*:*", matchCriteriaId: "CF365FC4-46E3-4564-9F25-1C2FBE70057B", vulnerable: false, }, { criteria: "cpe:2.3:a:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:*", matchCriteriaId: "36AFCB37-1760-4808-AEA5-875F45C05464", vulnerable: false, }, { criteria: "cpe:2.3:a:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C146F67C-0FCF-4C5C-B6B8-D67746E69CFB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "E055F58F-F9FB-4B27-841E-61ECAB5F42B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", matchCriteriaId: "2B832863-E366-46ED-BC35-838762F0CE29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", matchCriteriaId: "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", matchCriteriaId: "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", matchCriteriaId: "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", matchCriteriaId: "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2514A1-486C-40F7-8746-56E2B973CBE6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.", }, { lang: "es", value: "Múltiples vulnerabilidades en la CLI del software Cisco SD-WAN podrían permitir a un atacante local autenticado conseguir altos privilegios. Estas vulnerabilidades son debido a controles de acceso inapropiados en los comandos dentro de la aplicación CLI. Un atacante podría explotar estas vulnerabilidades al ejecutar un comando malicioso en la CLI de la aplicación. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios como usuario root", }, ], id: "CVE-2022-20818", lastModified: "2024-11-21T06:43:36.913", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-30T19:15:11.867", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-25", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2023-20226
Vulnerability from cvelistv5
Published
2023-09-27 17:21
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: 17.7.1 Version: 17.7.1a Version: 17.7.2 Version: 17.10.1 Version: 17.10.1a Version: 17.8.1 Version: 17.8.1a Version: 17.9.1 Version: 17.9.2 Version: 17.9.1a Version: 17.9.2a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:35.907Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-appqoe-utd-dos-p8O57p5y", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco IOS XE Software", vendor: "Cisco", versions: [ { status: "affected", version: "17.7.1", }, { status: "affected", version: "17.7.1a", }, { status: "affected", version: "17.7.2", }, { status: "affected", version: "17.10.1", }, { status: "affected", version: "17.10.1a", }, { status: "affected", version: "17.8.1", }, { status: "affected", version: "17.8.1a", }, { status: "affected", version: "17.9.1", }, { status: "affected", version: "17.9.2", }, { status: "affected", version: "17.9.1a", }, { status: "affected", version: "17.9.2a", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-456", description: "Missing Initialization of a Variable", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:58:24.979Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-appqoe-utd-dos-p8O57p5y", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appqoe-utd-dos-p8O57p5y", }, ], source: { advisory: "cisco-sa-appqoe-utd-dos-p8O57p5y", defects: [ "CSCwd67335", ], discovery: "INTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20226", datePublished: "2023-09-27T17:21:10.910Z", dateReserved: "2022-10-27T18:47:50.368Z", dateUpdated: "2024-08-02T09:05:35.907Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3511
Vulnerability from cvelistv5
Published
2020-09-24 17:51
Modified
2024-11-13 18:00
Severity ?
EPSS score ?
Summary
A vulnerability in the ISDN subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the ISDN Q.931 messages are processed. An attacker could exploit this vulnerability by sending a malicious ISDN Q.931 message to an affected device. A successful exploit could allow the attacker to cause the process to crash, resulting in a reload of the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.701Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200924 Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3511", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:23:34.355395Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:00:40.783Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-09-24T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the ISDN subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the ISDN Q.931 messages are processed. An attacker could exploit this vulnerability by sending a malicious ISDN Q.931 message to an affected device. A successful exploit could allow the attacker to cause the process to crash, resulting in a reload of the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-24T17:51:39", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200924 Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf", }, ], source: { advisory: "cisco-sa-iosxe-isdn-q931-dos-67eUZBTf", defect: [ [ "CSCvr57760", ], ], discovery: "INTERNAL", }, title: "Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-09-24T16:00:00", ID: "CVE-2020-3511", STATE: "PUBLIC", TITLE: "Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the ISDN subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation when the ISDN Q.931 messages are processed. An attacker could exploit this vulnerability by sending a malicious ISDN Q.931 message to an affected device. A successful exploit could allow the attacker to cause the process to crash, resulting in a reload of the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.4", vectorString: "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200924 Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-isdn-q931-dos-67eUZBTf", }, ], }, source: { advisory: "cisco-sa-iosxe-isdn-q931-dos-67eUZBTf", defect: [ [ "CSCvr57760", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3511", datePublished: "2020-09-24T17:51:39.806711Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T18:00:40.783Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0180
Vulnerability from cvelistv5
Published
2018-03-28 22:00
Modified
2024-11-13 18:22
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103556 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:14:17.088Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, { name: "103556", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/103556", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0180", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:22:07.904642Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2018-0180", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:22:49.108Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "n/a", versions: [ { status: "affected", version: "Cisco IOS", }, ], }, ], datePublic: "2018-03-28T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-31T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, { name: "103556", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/103556", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0180", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "Cisco IOS", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, { name: "103556", refsource: "BID", url: "http://www.securityfocus.com/bid/103556", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0180", datePublished: "2018-03-28T22:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-13T18:22:49.108Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20818
Vulnerability from cvelistv5
Published
2022-09-30 18:45
Modified
2024-11-01 18:51
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco SD-WAN Solution |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.956Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220928 Cisco SD-WAN Software Privilege Escalation Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20818", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-01T18:42:18.470570Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-01T18:51:20.116Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-09-28T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-25", description: "CWE-25", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-30T18:45:36", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220928 Cisco SD-WAN Software Privilege Escalation Vulnerabilities", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, ], source: { advisory: "cisco-sa-sd-wan-priv-E6e8tEdF", defect: [ [ "CSCwa52793", "CSCwb54198", ], ], discovery: "INTERNAL", }, title: "Cisco SD-WAN Software Privilege Escalation Vulnerabilities", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-09-28T16:00:00", ID: "CVE-2022-20818", STATE: "PUBLIC", TITLE: "Cisco SD-WAN Software Privilege Escalation Vulnerabilities", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco SD-WAN Solution", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.", }, ], }, exploit: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], impact: { cvss: { baseScore: "7.8", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-25", }, ], }, ], }, references: { reference_data: [ { name: "20220928 Cisco SD-WAN Software Privilege Escalation Vulnerabilities", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, ], }, source: { advisory: "cisco-sa-sd-wan-priv-E6e8tEdF", defect: [ [ "CSCwa52793", "CSCwb54198", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20818", datePublished: "2022-09-30T18:45:36.170921Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-01T18:51:20.116Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12319
Vulnerability from cvelistv5
Published
2018-03-27 09:00
Modified
2024-11-15 17:54
Severity ?
EPSS score ?
Summary
A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101676 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco IOS XE |
Version: Cisco IOS XE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:36:55.657Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp", }, { name: "101676", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101676", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2017-12319", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:31:35.276199Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-12319", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:54:30.185Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS XE", vendor: "n/a", versions: [ { status: "affected", version: "Cisco IOS XE", }, ], }, ], datePublic: "2018-03-27T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-27T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp", }, { name: "101676", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101676", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12319", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS XE", version: { version_data: [ { version_value: "Cisco IOS XE", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171103-bgp", }, { name: "101676", refsource: "BID", url: "http://www.securityfocus.com/bid/101676", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12319", datePublished: "2018-03-27T09:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-11-15T17:54:30.185Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3508
Vulnerability from cvelistv5
Published
2020-09-24 17:51
Modified
2024-11-13 18:00
Severity ?
EPSS score ?
Summary
A vulnerability in the IP Address Resolution Protocol (ARP) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers with a 20-Gbps Embedded Services Processor (ESP) installed could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service condition. The vulnerability is due to insufficient error handling when an affected device has reached platform limitations. An attacker could exploit this vulnerability by sending a malicious series of IP ARP messages to an affected device. A successful exploit could allow the attacker to exhaust system resources, which would eventually cause the affected device to reload.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:37:54.688Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200924 Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3508", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:23:32.882586Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:00:09.880Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS XE Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-09-24T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the IP Address Resolution Protocol (ARP) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers with a 20-Gbps Embedded Services Processor (ESP) installed could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service condition. The vulnerability is due to insufficient error handling when an affected device has reached platform limitations. An attacker could exploit this vulnerability by sending a malicious series of IP ARP messages to an affected device. A successful exploit could allow the attacker to exhaust system resources, which would eventually cause the affected device to reload.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-24T17:51:52", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200924 Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ", }, ], source: { advisory: "cisco-sa-esp20-arp-dos-GvHVggqJ", defect: [ [ "CSCva53392", "CSCvu04413", ], ], discovery: "INTERNAL", }, title: "Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-09-24T16:00:00", ID: "CVE-2020-3508", STATE: "PUBLIC", TITLE: "Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS XE Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the IP Address Resolution Protocol (ARP) feature of Cisco IOS XE Software for Cisco ASR 1000 Series Aggregation Services Routers with a 20-Gbps Embedded Services Processor (ESP) installed could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service condition. The vulnerability is due to insufficient error handling when an affected device has reached platform limitations. An attacker could exploit this vulnerability by sending a malicious series of IP ARP messages to an affected device. A successful exploit could allow the attacker to exhaust system resources, which would eventually cause the affected device to reload.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.4", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-400", }, ], }, ], }, references: { reference_data: [ { name: "20200924 Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esp20-arp-dos-GvHVggqJ", }, ], }, source: { advisory: "cisco-sa-esp20-arp-dos-GvHVggqJ", defect: [ [ "CSCva53392", "CSCvu04413", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3508", datePublished: "2020-09-24T17:51:52.664572Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T18:00:09.880Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-12671
Vulnerability from cvelistv5
Published
2019-09-25 20:15
Modified
2024-11-20 17:10
Severity ?
EPSS score ?
Summary
A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software 3.2.9SG |
Version: unspecified < n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T23:24:39.172Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190925 Cisco IOS XE Software Consent Token Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-12671", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:51:49.655033Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:10:08.306Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS XE Software 3.2.9SG", vendor: "Cisco", versions: [ { lessThan: "n/a", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-09-25T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-285", description: "CWE-285", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-09-25T20:15:34", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190925 Cisco IOS XE Software Consent Token Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass", }, ], source: { advisory: "cisco-sa-20190925-iosxe-ctbypass", defect: [ [ "CSCvp34481", ], ], discovery: "INTERNAL", }, title: "Cisco IOS XE Software Consent Token Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-09-25T16:00:00-0700", ID: "CVE-2019-12671", STATE: "PUBLIC", TITLE: "Cisco IOS XE Software Consent Token Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS XE Software 3.2.9SG", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, local attacker to gain shell access on an affected device and execute commands on the underlying operating system (OS). The vulnerability is due to insufficient enforcement of the consent token in authorizing shell access. An attacker could exploit this vulnerability by authenticating to the CLI and requesting shell access on an affected device. A successful exploit could allow the attacker to gain shell access on the affected device and execute commands on the underlying OS.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.7", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-285", }, ], }, ], }, references: { reference_data: [ { name: "20190925 Cisco IOS XE Software Consent Token Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-iosxe-ctbypass", }, ], }, source: { advisory: "cisco-sa-20190925-iosxe-ctbypass", defect: [ [ "CSCvp34481", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-12671", datePublished: "2019-09-25T20:15:34.874877Z", dateReserved: "2019-06-04T00:00:00", dateUpdated: "2024-11-20T17:10:08.306Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0179
Vulnerability from cvelistv5
Published
2018-03-28 22:00
Modified
2024-11-13 18:23
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/103556 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:14:16.950Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, { name: "103556", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/103556", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0179", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:22:39.111375Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2018-0179", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T18:23:06.404Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "n/a", versions: [ { status: "affected", version: "Cisco IOS", }, ], }, ], datePublic: "2018-03-28T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-31T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, { name: "103556", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/103556", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0179", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "Cisco IOS", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple vulnerabilities in the Login Enhancements (Login Block) feature of Cisco IOS Software could allow an unauthenticated, remote attacker to trigger a reload of an affected system, resulting in a denial of service (DoS) condition. These vulnerabilities affect Cisco devices that are running Cisco IOS Software Release 15.4(2)T, 15.4(3)M, or 15.4(2)CG and later. Cisco Bug IDs: CSCuy32360, CSCuz60599.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-slogin", }, { name: "103556", refsource: "BID", url: "http://www.securityfocus.com/bid/103556", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0179", datePublished: "2018-03-28T22:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-13T18:23:06.404Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-3396
Vulnerability from cvelistv5
Published
2020-09-24 18:02
Modified
2024-11-13 17:54
Severity ?
EPSS score ?
Summary
A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:30:58.382Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200924 Cisco IOS XE Software IOx Guest Shell USB SSD Namespace Protection Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3396", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-13T17:17:39.669992Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-13T17:54:22.654Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS XE Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-09-24T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "PHYSICAL", availabilityImpact: "NONE", baseScore: 6.8, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-24T18:02:27", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200924 Cisco IOS XE Software IOx Guest Shell USB SSD Namespace Protection Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj", }, ], source: { advisory: "cisco-sa-iox-usb-guestshell-WmevScDj", defect: [ [ "CSCvr50406", ], ], discovery: "INTERNAL", }, title: "Cisco IOS XE Software IOx Guest Shell USB SSD Namespace Protection Privilege Escalation Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-09-24T16:00:00", ID: "CVE-2020-3396", STATE: "PUBLIC", TITLE: "Cisco IOS XE Software IOx Guest Shell USB SSD Namespace Protection Privilege Escalation Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS XE Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the file system on the pluggable USB 3.0 Solid State Drive (SSD) for Cisco IOS XE Software could allow an authenticated, physical attacker to remove the USB 3.0 SSD and modify sensitive areas of the file system, including the namespace container protections. The vulnerability occurs because the USB 3.0 SSD control data is not stored on the internal boot flash. An attacker could exploit this vulnerability by removing the USB 3.0 SSD, modifying or deleting files on the USB 3.0 SSD by using another device, and then reinserting the USB 3.0 SSD on the original device. A successful exploit could allow the attacker to remove container protections and perform file actions outside the namespace of the container with root privileges.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "6.8", vectorString: "CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-284", }, ], }, ], }, references: { reference_data: [ { name: "20200924 Cisco IOS XE Software IOx Guest Shell USB SSD Namespace Protection Privilege Escalation Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-usb-guestshell-WmevScDj", }, ], }, source: { advisory: "cisco-sa-iox-usb-guestshell-WmevScDj", defect: [ [ "CSCvr50406", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3396", datePublished: "2020-09-24T18:02:27.374901Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-13T17:54:22.654Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2018-0154
Vulnerability from cvelistv5
Published
2018-03-28 22:00
Modified
2024-11-15 17:54
Severity ?
EPSS score ?
Summary
A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/103559 | vdb-entry, x_refsource_BID | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1040585 | vdb-entry, x_refsource_SECTRACK |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T03:14:16.878Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "103559", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/103559", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos", }, { name: "1040585", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1040585", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2018-0154", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:28:43.434941Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2018-0154", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:54:07.806Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "n/a", versions: [ { status: "affected", version: "Cisco IOS", }, ], }, ], datePublic: "2018-03-28T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2018-03-31T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "103559", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/103559", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos", }, { name: "1040585", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1040585", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2018-0154", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "Cisco IOS", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the crypto engine of the Cisco Integrated Services Module for VPN (ISM-VPN) running Cisco IOS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of VPN traffic by the affected device. An attacker could exploit this vulnerability by sending crafted VPN traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to hang or crash, resulting in a DoS condition. Cisco Bug IDs: CSCvd39267.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "103559", refsource: "BID", url: "http://www.securityfocus.com/bid/103559", }, { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos", }, { name: "1040585", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1040585", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2018-0154", datePublished: "2018-03-28T22:00:00", dateReserved: "2017-11-27T00:00:00", dateUpdated: "2024-11-15T17:54:07.806Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20775
Vulnerability from cvelistv5
Published
2022-09-30 18:45
Modified
2024-11-06 16:04
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco SD-WAN Solution |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:49.634Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220928 Cisco SD-WAN Software Privilege Escalation Vulnerabilities", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, { tags: [ "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, { tags: [ "x_transferred", ], url: "https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20775", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-06T15:59:59.012148Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-06T16:04:36.905Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco SD-WAN Solution", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-09-28T00:00:00", descriptions: [ { lang: "en", value: "Multiple vulnerabilities in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to gain elevated privileges. These vulnerabilities are due to improper access controls on commands within the application CLI. An attacker could exploit these vulnerabilities by running a malicious command on the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-25", description: "CWE-25", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-10-11T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220928 Cisco SD-WAN Software Privilege Escalation Vulnerabilities", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, { url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sd-wan-priv-E6e8tEdF", }, { url: "https://github.com/orangecertcc/security-research/security/advisories/GHSA-wmjv-552v-pxjc", }, ], source: { advisory: "cisco-sa-sd-wan-priv-E6e8tEdF", defect: [ [ "CSCwa52793", "CSCwb54198", ], ], discovery: "INTERNAL", }, title: "Cisco SD-WAN Software Privilege Escalation Vulnerabilities", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20775", datePublished: "2022-09-30T18:45:26.687373Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-06T16:04:36.905Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20227
Vulnerability from cvelistv5
Published
2023-09-27 17:21
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
Note: Only traffic directed to the affected system can be used to exploit this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: 16.8.1 Version: 16.8.1a Version: 16.8.1b Version: 16.8.1s Version: 16.8.1c Version: 16.8.1d Version: 16.8.2 Version: 16.8.1e Version: 16.8.3 Version: 16.9.1 Version: 16.9.2 Version: 16.9.1a Version: 16.9.1b Version: 16.9.1s Version: 16.9.3 Version: 16.9.4 Version: 16.9.5 Version: 16.9.5f Version: 16.9.6 Version: 16.9.7 Version: 16.9.8 Version: 16.10.1 Version: 16.10.1a Version: 16.10.1b Version: 16.10.1s Version: 16.10.1c Version: 16.10.1e Version: 16.10.1d Version: 16.10.2 Version: 16.10.1f Version: 16.10.1g Version: 16.10.3 Version: 16.11.1 Version: 16.11.1a Version: 16.11.1b Version: 16.11.2 Version: 16.11.1s Version: 16.12.1 Version: 16.12.1s Version: 16.12.1a Version: 16.12.1c Version: 16.12.1w Version: 16.12.2 Version: 16.12.1y Version: 16.12.2a Version: 16.12.3 Version: 16.12.8 Version: 16.12.2s Version: 16.12.1x Version: 16.12.1t Version: 16.12.4 Version: 16.12.3s Version: 16.12.4a Version: 16.12.5 Version: 16.12.6 Version: 16.12.1z1 Version: 16.12.5a Version: 16.12.1z2 Version: 16.12.6a Version: 16.12.7 Version: 16.12.10a Version: 17.1.1 Version: 17.1.1a Version: 17.1.1s Version: 17.1.1t Version: 17.1.3 Version: 17.2.1 Version: 17.2.1r Version: 17.2.1a Version: 17.2.1v Version: 17.2.2 Version: 17.2.3 Version: 17.3.1 Version: 17.3.2 Version: 17.3.3 Version: 17.3.1a Version: 17.3.1w Version: 17.3.2a Version: 17.3.1x Version: 17.3.1z Version: 17.3.4 Version: 17.3.5 Version: 17.3.4a Version: 17.3.6 Version: 17.3.4c Version: 17.3.5a Version: 17.3.5b Version: 17.3.7 Version: 17.4.1 Version: 17.4.2 Version: 17.4.1a Version: 17.4.1b Version: 17.4.2a Version: 17.5.1 Version: 17.5.1a Version: 17.5.1b Version: 17.5.1c |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:35.876Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-ios-xe-l2tp-dos-eB5tuFmV", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco IOS XE Software", vendor: "Cisco", versions: [ { status: "affected", version: "16.8.1", }, { status: "affected", version: "16.8.1a", }, { status: "affected", version: "16.8.1b", }, { status: "affected", version: "16.8.1s", }, { status: "affected", version: "16.8.1c", }, { status: "affected", version: "16.8.1d", }, { status: "affected", version: "16.8.2", }, { status: "affected", version: "16.8.1e", }, { status: "affected", version: "16.8.3", }, { status: "affected", version: "16.9.1", }, { status: "affected", version: "16.9.2", }, { status: "affected", version: "16.9.1a", }, { status: "affected", version: "16.9.1b", }, { status: "affected", version: "16.9.1s", }, { status: "affected", version: "16.9.3", }, { status: "affected", version: "16.9.4", }, { status: "affected", version: "16.9.5", }, { status: "affected", version: "16.9.5f", }, { status: "affected", version: "16.9.6", }, { status: "affected", version: "16.9.7", }, { status: "affected", version: "16.9.8", }, { status: "affected", version: "16.10.1", }, { status: "affected", version: "16.10.1a", }, { status: "affected", version: "16.10.1b", }, { status: "affected", version: "16.10.1s", }, { status: "affected", version: "16.10.1c", }, { status: "affected", version: "16.10.1e", }, { status: "affected", version: "16.10.1d", }, { status: "affected", version: "16.10.2", }, { status: "affected", version: "16.10.1f", }, { status: "affected", version: "16.10.1g", }, { status: "affected", version: "16.10.3", }, { status: "affected", version: "16.11.1", }, { status: "affected", version: "16.11.1a", }, { status: "affected", version: "16.11.1b", }, { status: "affected", version: "16.11.2", }, { status: "affected", version: "16.11.1s", }, { status: "affected", version: "16.12.1", }, { status: "affected", version: "16.12.1s", }, { status: "affected", version: "16.12.1a", }, { status: "affected", version: "16.12.1c", }, { status: "affected", version: "16.12.1w", }, { status: "affected", version: "16.12.2", }, { status: "affected", version: "16.12.1y", }, { status: "affected", version: "16.12.2a", }, { status: "affected", version: "16.12.3", }, { status: "affected", version: "16.12.8", }, { status: "affected", version: "16.12.2s", }, { status: "affected", version: "16.12.1x", }, { status: "affected", version: "16.12.1t", }, { status: "affected", version: "16.12.4", }, { status: "affected", version: "16.12.3s", }, { status: "affected", version: "16.12.4a", }, { status: "affected", version: "16.12.5", }, { status: "affected", version: "16.12.6", }, { status: "affected", version: "16.12.1z1", }, { status: "affected", version: "16.12.5a", }, { status: "affected", version: "16.12.1z2", }, { status: "affected", version: "16.12.6a", }, { status: "affected", version: "16.12.7", }, { status: "affected", version: "16.12.10a", }, { status: "affected", version: "17.1.1", }, { status: "affected", version: "17.1.1a", }, { status: "affected", version: "17.1.1s", }, { status: "affected", version: "17.1.1t", }, { status: "affected", version: "17.1.3", }, { status: "affected", version: "17.2.1", }, { status: "affected", version: "17.2.1r", }, { status: "affected", version: "17.2.1a", }, { status: "affected", version: "17.2.1v", }, { status: "affected", version: "17.2.2", }, { status: "affected", version: "17.2.3", }, { status: "affected", version: "17.3.1", }, { status: "affected", version: "17.3.2", }, { status: "affected", version: "17.3.3", }, { status: "affected", version: "17.3.1a", }, { status: "affected", version: "17.3.1w", }, { status: "affected", version: "17.3.2a", }, { status: "affected", version: "17.3.1x", }, { status: "affected", version: "17.3.1z", }, { status: "affected", version: "17.3.4", }, { status: "affected", version: "17.3.5", }, { status: "affected", version: "17.3.4a", }, { status: "affected", version: "17.3.6", }, { status: "affected", version: "17.3.4c", }, { status: "affected", version: "17.3.5a", }, { status: "affected", version: "17.3.5b", }, { status: "affected", version: "17.3.7", }, { status: "affected", version: "17.4.1", }, { status: "affected", version: "17.4.2", }, { status: "affected", version: "17.4.1a", }, { status: "affected", version: "17.4.1b", }, { status: "affected", version: "17.4.2a", }, { status: "affected", version: "17.5.1", }, { status: "affected", version: "17.5.1a", }, { status: "affected", version: "17.5.1b", }, { status: "affected", version: "17.5.1c", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.\r\n\r Note: Only traffic directed to the affected system can be used to exploit this vulnerability.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-388", description: "Error Handling", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:58:25.292Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-ios-xe-l2tp-dos-eB5tuFmV", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-l2tp-dos-eB5tuFmV", }, ], source: { advisory: "cisco-sa-ios-xe-l2tp-dos-eB5tuFmV", defects: [ "CSCwe70596", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20227", datePublished: "2023-09-27T17:21:38.623Z", dateReserved: "2022-10-27T18:47:50.369Z", dateUpdated: "2024-08-02T09:05:35.876Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12237
Vulnerability from cvelistv5
Published
2017-09-28 07:00
Modified
2024-11-15 17:57
Severity ?
EPSS score ?
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039460 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101037 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco IOS and IOS XE |
Version: Cisco IOS and IOS XE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:28:16.718Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", }, { name: "1039460", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039460", }, { name: "101037", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101037", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2017-12237", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:32:46.130874Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-12237", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:57:00.594Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS and IOS XE", vendor: "n/a", versions: [ { status: "affected", version: "Cisco IOS and IOS XE", }, ], }, ], datePublic: "2017-09-28T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-29T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", }, { name: "1039460", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039460", }, { name: "101037", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101037", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12237", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS and IOS XE", version: { version_data: [ { version_value: "Cisco IOS and IOS XE", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ike", }, { name: "1039460", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039460", }, { name: "101037", refsource: "BID", url: "http://www.securityfocus.com/bid/101037", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12237", datePublished: "2017-09-28T07:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-11-15T17:57:00.594Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12232
Vulnerability from cvelistv5
Published
2017-09-28 07:00
Modified
2024-11-15 17:58
Severity ?
EPSS score ?
Summary
A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039452 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101044 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:28:16.692Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101044", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2017-12232", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:34:20.447301Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-12232", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:58:04.978Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "n/a", versions: [ { status: "affected", version: "Cisco IOS", }, ], }, ], datePublic: "2017-09-28T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-29T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101044", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12232", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "Cisco IOS", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", refsource: "BID", url: "http://www.securityfocus.com/bid/101044", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12232", datePublished: "2017-09-28T07:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-11-15T17:58:04.978Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }