Vulnerabilites related to cisco - c9500-32c
Vulnerability from fkie_nvd
Published
2021-09-23 03:15
Modified
2024-11-21 05:44
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.
Impacted products
Vendor Product Version
cisco ios 12.2\(6\)i1
cisco ios 15.1\(3\)svr1
cisco ios 15.1\(3\)svr2
cisco ios 15.1\(3\)svr3
cisco ios 15.1\(3\)svs
cisco ios 15.1\(3\)svs1
cisco ios 15.1\(3\)svt1
cisco ios 15.1\(3\)svt2
cisco ios 15.1\(3\)svu1
cisco ios 15.2\(1\)sy2
cisco ios 15.2\(1\)sy3
cisco ios 15.2\(1\)sy4
cisco ios 15.2\(1\)sy5
cisco ios 15.2\(1\)sy6
cisco ios 15.2\(1\)sy7
cisco ios 15.2\(1\)sy8
cisco ios 15.2\(4\)e
cisco ios 15.2\(4\)e1
cisco ios 15.2\(4\)e2
cisco ios 15.2\(4\)e3
cisco ios 15.2\(4\)e4
cisco ios 15.2\(4\)e5
cisco ios 15.2\(4\)e5a
cisco ios 15.2\(4\)e6
cisco ios 15.2\(4\)e7
cisco ios 15.2\(4\)e8
cisco ios 15.2\(4\)e9
cisco ios 15.2\(4\)e10
cisco ios 15.2\(4\)e10a
cisco ios 15.2\(4\)e10b
cisco ios 15.2\(4\)ea
cisco ios 15.2\(4\)ea1
cisco ios 15.2\(4\)ea2
cisco ios 15.2\(4\)ea3
cisco ios 15.2\(4\)ea4
cisco ios 15.2\(4\)ea5
cisco ios 15.2\(4\)ea6
cisco ios 15.2\(4\)ea7
cisco ios 15.2\(4\)ea8
cisco ios 15.2\(4\)ea9
cisco ios 15.2\(4\)ea9a
cisco ios 15.2\(4\)ec1
cisco ios 15.2\(4\)ec2
cisco ios 15.2\(4m\)e1
cisco ios 15.2\(4m\)e2
cisco ios 15.2\(4m\)e3
cisco ios 15.2\(4n\)e2
cisco ios 15.2\(4o\)e2
cisco ios 15.2\(4o\)e3
cisco ios 15.2\(4p\)e1
cisco ios 15.2\(4q\)e1
cisco ios 15.2\(4s\)e1
cisco ios 15.2\(5\)e
cisco ios 15.2\(5\)e1
cisco ios 15.2\(5\)e2
cisco ios 15.2\(5\)e2b
cisco ios 15.2\(5\)e2c
cisco ios 15.2\(5\)ea
cisco ios 15.2\(5\)ex
cisco ios 15.2\(5a\)e
cisco ios 15.2\(5a\)e1
cisco ios 15.2\(5b\)e
cisco ios 15.2\(5c\)e
cisco ios 15.2\(6\)e
cisco ios 15.2\(6\)e0a
cisco ios 15.2\(6\)e0c
cisco ios 15.2\(6\)e1
cisco ios 15.2\(6\)e1a
cisco ios 15.2\(6\)e1s
cisco ios 15.2\(6\)e2
cisco ios 15.2\(6\)e2a
cisco ios 15.2\(6\)e2b
cisco ios 15.2\(6\)e3
cisco ios 15.2\(6\)eb
cisco ios 15.2\(7\)e
cisco ios 15.2\(7\)e0a
cisco ios 15.2\(7\)e0b
cisco ios 15.2\(7\)e0s
cisco ios 15.2\(7\)e1
cisco ios 15.2\(7\)e1a
cisco ios 15.2\(7\)e2
cisco ios 15.2\(7\)e2a
cisco ios 15.2\(7\)e2b
cisco ios 15.2\(7\)e3
cisco ios 15.2\(7\)e3a
cisco ios 15.2\(7\)e3k
cisco ios 15.2\(7\)e4
cisco ios 15.2\(7\)e5
cisco ios 15.2\(7\)e99
cisco ios 15.2\(7a\)e0b
cisco ios 15.2\(7b\)e0b
cisco ios 15.2\(8\)e
cisco ios 15.2\(8\)e1
cisco ios 15.2\(234k\)e
cisco ios 15.3\(0\)sy
cisco ios 15.3\(1\)sy
cisco ios 15.3\(1\)sy1
cisco ios 15.3\(1\)sy2
cisco ios 15.3\(3\)jc6
cisco ios 15.3\(3\)jc8
cisco ios 15.3\(3\)jc9
cisco ios 15.3\(3\)jc14
cisco ios 15.3\(3\)jca7
cisco ios 15.3\(3\)jca8
cisco ios 15.3\(3\)jca9
cisco ios 15.3\(3\)jd3
cisco ios 15.3\(3\)jd4
cisco ios 15.3\(3\)jd5
cisco ios 15.3\(3\)jd6
cisco ios 15.3\(3\)jd7
cisco ios 15.3\(3\)jd8
cisco ios 15.3\(3\)jd9
cisco ios 15.3\(3\)jd11
cisco ios 15.3\(3\)jd12
cisco ios 15.3\(3\)jd13
cisco ios 15.3\(3\)jd14
cisco ios 15.3\(3\)jd16
cisco ios 15.3\(3\)jd17
cisco ios 15.3\(3\)jda7
cisco ios 15.3\(3\)jda8
cisco ios 15.3\(3\)jda9
cisco ios 15.3\(3\)jda11
cisco ios 15.3\(3\)jda12
cisco ios 15.3\(3\)jda13
cisco ios 15.3\(3\)jda14
cisco ios 15.3\(3\)jda16
cisco ios 15.3\(3\)jda17
cisco ios 15.3\(3\)je
cisco ios 15.3\(3\)jf
cisco ios 15.3\(3\)jf1
cisco ios 15.3\(3\)jf2
cisco ios 15.3\(3\)jf4
cisco ios 15.3\(3\)jf5
cisco ios 15.3\(3\)jf6
cisco ios 15.3\(3\)jf7
cisco ios 15.3\(3\)jf8
cisco ios 15.3\(3\)jf9
cisco ios 15.3\(3\)jf10
cisco ios 15.3\(3\)jf11
cisco ios 15.3\(3\)jf12
cisco ios 15.3\(3\)jf12i
cisco ios 15.3\(3\)jf14
cisco ios 15.3\(3\)jf14i
cisco ios 15.3\(3\)jf15
cisco ios 15.3\(3\)jg
cisco ios 15.3\(3\)jg1
cisco ios 15.3\(3\)jh
cisco ios 15.3\(3\)jh1
cisco ios 15.3\(3\)ji1
cisco ios 15.3\(3\)ji3
cisco ios 15.3\(3\)ji4
cisco ios 15.3\(3\)ji5
cisco ios 15.3\(3\)ji6
cisco ios 15.3\(3\)jj
cisco ios 15.3\(3\)jj1
cisco ios 15.3\(3\)jk
cisco ios 15.3\(3\)jk1
cisco ios 15.3\(3\)jk1t
cisco ios 15.3\(3\)jk2
cisco ios 15.3\(3\)jk2a
cisco ios 15.3\(3\)jk3
cisco ios 15.3\(3\)jk4
cisco ios 15.3\(3\)jk5
cisco ios 15.3\(3\)jk6
cisco ios 15.3\(3\)jk100
cisco ios 15.3\(3\)jn13
cisco ios 15.3\(3\)jn14
cisco ios 15.3\(3\)jn15
cisco ios 15.3\(3\)jpc5
cisco ios 15.3\(3\)jpi1
cisco ios 15.3\(3\)jpi1t
cisco ios 15.3\(3\)jpi4
cisco ios 15.3\(3\)jpi5
cisco ios 15.3\(3\)jpi5s
cisco ios 15.3\(3\)jpi6a
cisco ios 15.3\(3\)jpi7
cisco ios 15.3\(3\)jpi8
cisco ios 15.3\(3\)jpj2
cisco ios 15.3\(3\)jpj2t
cisco ios 15.3\(3\)jpj3
cisco ios 15.3\(3\)jpj3a
cisco ios 15.3\(3\)jpj4
cisco ios 15.3\(3\)jpj5
cisco ios 15.3\(3\)jpj6
cisco ios 15.3\(3\)jpj7
cisco ios 15.3\(3\)jpk
cisco ios 15.3\(3\)jpk1
cisco ios 15.3\(3\)jpk2
cisco ios 15.4\(1\)cg
cisco ios 15.4\(1\)cg1
cisco ios 15.4\(1\)s
cisco ios 15.4\(1\)s1
cisco ios 15.4\(1\)s2
cisco ios 15.4\(1\)s3
cisco ios 15.4\(1\)s4
cisco ios 15.4\(1\)sy
cisco ios 15.4\(1\)sy1
cisco ios 15.4\(1\)sy2
cisco ios 15.4\(1\)sy3
cisco ios 15.4\(1\)sy4
cisco ios 15.4\(1\)t
cisco ios 15.4\(1\)t1
cisco ios 15.4\(1\)t2
cisco ios 15.4\(1\)t3
cisco ios 15.4\(1\)t4
cisco ios 15.4\(2\)cg
cisco ios 15.4\(2\)s
cisco ios 15.4\(2\)s1
cisco ios 15.4\(2\)s2
cisco ios 15.4\(2\)s3
cisco ios 15.4\(2\)s4
cisco ios 15.4\(2\)sn
cisco ios 15.4\(2\)sn1
cisco ios 15.4\(2\)t
cisco ios 15.4\(2\)t1
cisco ios 15.4\(2\)t2
cisco ios 15.4\(2\)t3
cisco ios 15.4\(2\)t4
cisco ios 15.4\(3\)m
cisco ios 15.4\(3\)m1
cisco ios 15.4\(3\)m2
cisco ios 15.4\(3\)m3
cisco ios 15.4\(3\)m4
cisco ios 15.4\(3\)m5
cisco ios 15.4\(3\)m6
cisco ios 15.4\(3\)m6a
cisco ios 15.4\(3\)m7
cisco ios 15.4\(3\)m7a
cisco ios 15.4\(3\)m8
cisco ios 15.4\(3\)m9
cisco ios 15.4\(3\)m10
cisco ios 15.4\(3\)s
cisco ios 15.4\(3\)s0d
cisco ios 15.4\(3\)s0e
cisco ios 15.4\(3\)s0f
cisco ios 15.4\(3\)s1
cisco ios 15.4\(3\)s2
cisco ios 15.4\(3\)s3
cisco ios 15.4\(3\)s4
cisco ios 15.4\(3\)s5
cisco ios 15.4\(3\)s6
cisco ios 15.4\(3\)s6a
cisco ios 15.4\(3\)s7
cisco ios 15.4\(3\)s8
cisco ios 15.4\(3\)s9
cisco ios 15.4\(3\)s10
cisco ios 15.4\(3\)sn1
cisco ios 15.4\(3\)sn1a
cisco ios 15.5\(1\)s
cisco ios 15.5\(1\)s1
cisco ios 15.5\(1\)s2
cisco ios 15.5\(1\)s3
cisco ios 15.5\(1\)s4
cisco ios 15.5\(1\)sn
cisco ios 15.5\(1\)sn1
cisco ios 15.5\(1\)sy
cisco ios 15.5\(1\)sy1
cisco ios 15.5\(1\)sy2
cisco ios 15.5\(1\)sy3
cisco ios 15.5\(1\)sy4
cisco ios 15.5\(1\)sy5
cisco ios 15.5\(1\)sy6
cisco ios 15.5\(1\)sy7
cisco ios 15.5\(1\)sy8
cisco ios 15.5\(1\)t
cisco ios 15.5\(1\)t1
cisco ios 15.5\(1\)t2
cisco ios 15.5\(1\)t3
cisco ios 15.5\(1\)t4
cisco ios 15.5\(2\)s
cisco ios 15.5\(2\)s1
cisco ios 15.5\(2\)s2
cisco ios 15.5\(2\)s3
cisco ios 15.5\(2\)s4
cisco ios 15.5\(2\)sn
cisco ios 15.5\(2\)t
cisco ios 15.5\(2\)t1
cisco ios 15.5\(2\)t2
cisco ios 15.5\(2\)t3
cisco ios 15.5\(2\)t4
cisco ios 15.5\(2\)xb
cisco ios 15.5\(3\)m
cisco ios 15.5\(3\)m0a
cisco ios 15.5\(3\)m1
cisco ios 15.5\(3\)m2
cisco ios 15.5\(3\)m2a
cisco ios 15.5\(3\)m3
cisco ios 15.5\(3\)m4
cisco ios 15.5\(3\)m4a
cisco ios 15.5\(3\)m4b
cisco ios 15.5\(3\)m4c
cisco ios 15.5\(3\)m5
cisco ios 15.5\(3\)m6
cisco ios 15.5\(3\)m6a
cisco ios 15.5\(3\)m7
cisco ios 15.5\(3\)m8
cisco ios 15.5\(3\)m9
cisco ios 15.5\(3\)m10
cisco ios 15.5\(3\)m11
cisco ios 15.5\(3\)m11a
cisco ios 15.5\(3\)s
cisco ios 15.5\(3\)s0a
cisco ios 15.5\(3\)s1
cisco ios 15.5\(3\)s1a
cisco ios 15.5\(3\)s2
cisco ios 15.5\(3\)s3
cisco ios 15.5\(3\)s4
cisco ios 15.5\(3\)s5
cisco ios 15.5\(3\)s6
cisco ios 15.5\(3\)s6a
cisco ios 15.5\(3\)s6b
cisco ios 15.5\(3\)s7
cisco ios 15.5\(3\)s8
cisco ios 15.5\(3\)s9
cisco ios 15.5\(3\)s9a
cisco ios 15.5\(3\)s10
cisco ios 15.5\(3\)s10a
cisco ios 15.5\(3\)s10b
cisco ios 15.5\(3\)sn
cisco ios 15.5\(3\)sn0a
cisco ios 15.6\(1\)s
cisco ios 15.6\(1\)s1
cisco ios 15.6\(1\)s2
cisco ios 15.6\(1\)s3
cisco ios 15.6\(1\)s4
cisco ios 15.6\(1\)sn
cisco ios 15.6\(1\)sn1
cisco ios 15.6\(1\)sn2
cisco ios 15.6\(1\)sn3
cisco ios 15.6\(1\)t
cisco ios 15.6\(1\)t0a
cisco ios 15.6\(1\)t1
cisco ios 15.6\(1\)t2
cisco ios 15.6\(1\)t3
cisco ios 15.6\(2\)s
cisco ios 15.6\(2\)s1
cisco ios 15.6\(2\)s2
cisco ios 15.6\(2\)s3
cisco ios 15.6\(2\)s4
cisco ios 15.6\(2\)sn
cisco ios 15.6\(2\)sp
cisco ios 15.6\(2\)sp1
cisco ios 15.6\(2\)sp2
cisco ios 15.6\(2\)sp3
cisco ios 15.6\(2\)sp4
cisco ios 15.6\(2\)sp5
cisco ios 15.6\(2\)sp6
cisco ios 15.6\(2\)sp7
cisco ios 15.6\(2\)sp8
cisco ios 15.6\(2\)sp8a
cisco ios 15.6\(2\)sp9
cisco ios 15.6\(2\)t
cisco ios 15.6\(2\)t0a
cisco ios 15.6\(2\)t1
cisco ios 15.6\(2\)t2
cisco ios 15.6\(2\)t3
cisco ios 15.6\(3\)m
cisco ios 15.6\(3\)m0a
cisco ios 15.6\(3\)m1
cisco ios 15.6\(3\)m1a
cisco ios 15.6\(3\)m1b
cisco ios 15.6\(3\)m2
cisco ios 15.6\(3\)m2a
cisco ios 15.6\(3\)m3
cisco ios 15.6\(3\)m3a
cisco ios 15.6\(3\)m4
cisco ios 15.6\(3\)m5
cisco ios 15.6\(3\)m6
cisco ios 15.6\(3\)m6a
cisco ios 15.6\(3\)m6b
cisco ios 15.6\(3\)m7
cisco ios 15.6\(3\)m8
cisco ios 15.6\(3\)m9
cisco ios 15.6\(3\)sn
cisco ios 15.6\(4\)sn
cisco ios 15.6\(5\)sn
cisco ios 15.6\(7\)sn
cisco ios 15.6\(7\)sn1
cisco ios 15.6\(7\)sn2
cisco ios 15.7\(3\)m
cisco ios 15.7\(3\)m0a
cisco ios 15.7\(3\)m1
cisco ios 15.7\(3\)m2
cisco ios 15.7\(3\)m3
cisco ios 15.7\(3\)m4
cisco ios 15.7\(3\)m4a
cisco ios 15.7\(3\)m4b
cisco ios 15.7\(3\)m5
cisco ios 15.7\(3\)m6
cisco ios 15.7\(3\)m7
cisco ios 15.7\(3\)m8
cisco ios 15.8\(3\)m
cisco ios 15.8\(3\)m0a
cisco ios 15.8\(3\)m0b
cisco ios 15.8\(3\)m1
cisco ios 15.8\(3\)m1a
cisco ios 15.8\(3\)m2
cisco ios 15.8\(3\)m2a
cisco ios 15.8\(3\)m3
cisco ios 15.8\(3\)m3a
cisco ios 15.8\(3\)m3b
cisco ios 15.8\(3\)m4
cisco ios 15.8\(3\)m5
cisco ios 15.8\(3\)m6
cisco ios 15.9\(3\)m
cisco ios 15.9\(3\)m0a
cisco ios 15.9\(3\)m1
cisco ios 15.9\(3\)m2
cisco ios 15.9\(3\)m2a
cisco ios 15.9\(3\)m3
cisco ios 15.9\(3\)m3a
cisco ios 15.9\(3\)m3b
cisco ios_xe *
cisco ios_xe 3.8.0e
cisco ios_xe 3.8.1e
cisco ios_xe 3.8.2e
cisco ios_xe 3.8.3e
cisco ios_xe 3.8.4e
cisco ios_xe 3.8.5ae
cisco ios_xe 3.8.5e
cisco ios_xe 3.8.6e
cisco ios_xe 3.8.7e
cisco ios_xe 3.8.8e
cisco ios_xe 3.8.9e
cisco ios_xe 3.8.10e
cisco ios_xe 3.9.0e
cisco ios_xe 3.9.1e
cisco ios_xe 3.9.2be
cisco ios_xe 3.9.2e
cisco ios_xe 3.10.0ce
cisco ios_xe 3.10.0e
cisco ios_xe 3.10.1ae
cisco ios_xe 3.10.1e
cisco ios_xe 3.10.1se
cisco ios_xe 3.10.2e
cisco ios_xe 3.10.3e
cisco ios_xe 3.11.0e
cisco ios_xe 3.11.0s
cisco ios_xe 3.11.1ae
cisco ios_xe 3.11.1e
cisco ios_xe 3.11.1s
cisco ios_xe 3.11.2ae
cisco ios_xe 3.11.2e
cisco ios_xe 3.11.2s
cisco ios_xe 3.11.3ae
cisco ios_xe 3.11.3e
cisco ios_xe 3.11.3s
cisco ios_xe 3.11.4e
cisco ios_xe 3.11.4s
cisco ios_xe 3.11.5e
cisco ios_xe 3.11.99ze
cisco ios_xe 3.12.0as
cisco ios_xe 3.12.0s
cisco ios_xe 3.12.1s
cisco ios_xe 3.12.2s
cisco ios_xe 3.12.3s
cisco ios_xe 3.12.4s
cisco ios_xe 3.13.0as
cisco ios_xe 3.13.0s
cisco ios_xe 3.13.1s
cisco ios_xe 3.13.2as
cisco ios_xe 3.13.2s
cisco ios_xe 3.13.3s
cisco ios_xe 3.13.4s
cisco ios_xe 3.13.5as
cisco ios_xe 3.13.5s
cisco ios_xe 3.13.6as
cisco ios_xe 3.13.6bs
cisco ios_xe 3.13.6s
cisco ios_xe 3.13.7as
cisco ios_xe 3.13.7s
cisco ios_xe 3.13.8s
cisco ios_xe 3.13.9s
cisco ios_xe 3.13.10s
cisco ios_xe 3.14.0s
cisco ios_xe 3.14.1s
cisco ios_xe 3.14.2s
cisco ios_xe 3.14.3s
cisco ios_xe 3.14.4s
cisco ios_xe 3.15.0s
cisco ios_xe 3.15.1cs
cisco ios_xe 3.15.1s
cisco ios_xe 3.15.1xbs
cisco ios_xe 3.15.2s
cisco ios_xe 3.15.2xbs
cisco ios_xe 3.15.3s
cisco ios_xe 3.15.4s
cisco ios_xe 3.16.0as
cisco ios_xe 3.16.0bs
cisco ios_xe 3.16.0cs
cisco ios_xe 3.16.0s
cisco ios_xe 3.16.1as
cisco ios_xe 3.16.1s
cisco ios_xe 3.16.2as
cisco ios_xe 3.16.2bs
cisco ios_xe 3.16.2s
cisco ios_xe 3.16.3as
cisco ios_xe 3.16.3s
cisco ios_xe 3.16.4as
cisco ios_xe 3.16.4bs
cisco ios_xe 3.16.4cs
cisco ios_xe 3.16.4ds
cisco ios_xe 3.16.4es
cisco ios_xe 3.16.4gs
cisco ios_xe 3.16.4s
cisco ios_xe 3.16.5as
cisco ios_xe 3.16.5bs
cisco ios_xe 3.16.5s
cisco ios_xe 3.16.6bs
cisco ios_xe 3.16.6s
cisco ios_xe 3.16.7as
cisco ios_xe 3.16.7bs
cisco ios_xe 3.16.7s
cisco ios_xe 3.16.8s
cisco ios_xe 3.16.9s
cisco ios_xe 3.16.10as
cisco ios_xe 3.16.10bs
cisco ios_xe 3.16.10s
cisco ios_xe 3.17.0s
cisco ios_xe 3.17.1as
cisco ios_xe 3.17.1s
cisco ios_xe 3.17.2s
cisco ios_xe 3.17.3s
cisco ios_xe 3.17.4s
cisco ios_xe 3.18.0as
cisco ios_xe 3.18.0s
cisco ios_xe 3.18.0sp
cisco ios_xe 3.18.1asp
cisco ios_xe 3.18.1bsp
cisco ios_xe 3.18.1csp
cisco ios_xe 3.18.1gsp
cisco ios_xe 3.18.1hsp
cisco ios_xe 3.18.1isp
cisco ios_xe 3.18.1s
cisco ios_xe 3.18.1sp
cisco ios_xe 3.18.2asp
cisco ios_xe 3.18.2s
cisco ios_xe 3.18.2sp
cisco ios_xe 3.18.3asp
cisco ios_xe 3.18.3bsp
cisco ios_xe 3.18.3s
cisco ios_xe 3.18.3sp
cisco ios_xe 3.18.4s
cisco ios_xe 3.18.4sp
cisco ios_xe 3.18.5sp
cisco ios_xe 3.18.6sp
cisco ios_xe 3.18.7sp
cisco ios_xe 3.18.8asp
cisco ios_xe 3.18.8sp
cisco ios_xe 3.18.9sp
cisco ios_xe 16.1.1
cisco ios_xe 16.1.2
cisco ios_xe 16.1.3
cisco ios_xe 16.2.1
cisco ios_xe 16.2.2
cisco ios_xe 16.3.1
cisco ios_xe 16.3.1a
cisco ios_xe 16.3.2
cisco ios_xe 16.3.3
cisco ios_xe 16.3.4
cisco ios_xe 16.3.5
cisco ios_xe 16.3.5b
cisco ios_xe 16.3.6
cisco ios_xe 16.3.7
cisco ios_xe 16.3.8
cisco ios_xe 16.3.9
cisco ios_xe 16.3.10
cisco ios_xe 16.3.11
cisco ios_xe 16.4.1
cisco ios_xe 16.4.2
cisco ios_xe 16.4.3
cisco ios_xe 16.5.1
cisco ios_xe 16.5.1a
cisco ios_xe 16.5.1b
cisco ios_xe 16.5.2
cisco ios_xe 16.5.3
cisco ios_xe 16.6.1
cisco ios_xe 16.6.2
cisco ios_xe 16.6.3
cisco ios_xe 16.6.4
cisco ios_xe 16.6.4a
cisco ios_xe 16.6.4s
cisco ios_xe 16.6.5
cisco ios_xe 16.6.5a
cisco ios_xe 16.6.5b
cisco ios_xe 16.6.6
cisco ios_xe 16.6.7
cisco ios_xe 16.6.7a
cisco ios_xe 16.6.8
cisco ios_xe 16.6.9
cisco ios_xe 16.7.1
cisco ios_xe 16.7.1a
cisco ios_xe 16.7.1b
cisco ios_xe 16.7.2
cisco ios_xe 16.7.3
cisco ios_xe 16.7.4
cisco ios_xe 16.8.1
cisco ios_xe 16.8.1a
cisco ios_xe 16.8.1b
cisco ios_xe 16.8.1c
cisco ios_xe 16.8.1d
cisco ios_xe 16.8.1e
cisco ios_xe 16.8.1s
cisco ios_xe 16.8.2
cisco ios_xe 16.8.3
cisco ios_xe 16.9.1
cisco ios_xe 16.9.1a
cisco ios_xe 16.9.1b
cisco ios_xe 16.9.1c
cisco ios_xe 16.9.1d
cisco ios_xe 16.9.1s
cisco ios_xe 16.9.2
cisco ios_xe 16.9.2a
cisco ios_xe 16.9.2s
cisco ios_xe 16.9.3
cisco ios_xe 16.9.3a
cisco ios_xe 16.9.3h
cisco ios_xe 16.9.3s
cisco ios_xe 16.9.4
cisco ios_xe 16.9.4c
cisco ios_xe 16.9.5
cisco ios_xe 16.9.5f
cisco ios_xe 16.9.6
cisco ios_xe 16.9.7
cisco ios_xe 16.10.1
cisco ios_xe 16.10.1a
cisco ios_xe 16.10.1b
cisco ios_xe 16.10.1c
cisco ios_xe 16.10.1d
cisco ios_xe 16.10.1e
cisco ios_xe 16.10.1f
cisco ios_xe 16.10.1g
cisco ios_xe 16.10.1s
cisco ios_xe 16.10.2
cisco ios_xe 16.10.3
cisco ios_xe 16.11.1
cisco ios_xe 16.11.1a
cisco ios_xe 16.11.1b
cisco ios_xe 16.11.1c
cisco ios_xe 16.11.1s
cisco ios_xe 16.11.2
cisco ios_xe 16.12.1
cisco ios_xe 16.12.1a
cisco ios_xe 16.12.1c
cisco ios_xe 16.12.1s
cisco ios_xe 16.12.1t
cisco ios_xe 16.12.1w
cisco ios_xe 16.12.1x
cisco ios_xe 16.12.1y
cisco ios_xe 16.12.1z
cisco ios_xe 16.12.1z1
cisco ios_xe 16.12.1z2
cisco ios_xe 16.12.1za
cisco ios_xe 16.12.2
cisco ios_xe 16.12.2a
cisco ios_xe 16.12.2s
cisco ios_xe 16.12.2t
cisco ios_xe 16.12.3
cisco ios_xe 16.12.3a
cisco ios_xe 16.12.3s
cisco ios_xe 16.12.4
cisco ios_xe 16.12.4a
cisco ios_xe 16.12.5
cisco ios_xe 16.12.5a
cisco ios_xe 16.12.5b
cisco ios_xe 17.1.1
cisco ios_xe 17.1.1a
cisco ios_xe 17.1.1s
cisco ios_xe 17.1.1t
cisco ios_xe 17.1.2
cisco ios_xe 17.1.3
cisco ios_xe 17.2.1
cisco ios_xe 17.2.1a
cisco ios_xe 17.2.1r
cisco ios_xe 17.2.1v
cisco ios_xe 17.2.2
cisco ios_xe 17.2.3
cisco ios_xe 17.3.1
cisco ios_xe 17.3.1a
cisco ios_xe 17.3.1w
cisco ios_xe 17.3.1x
cisco ios_xe 17.3.1z
cisco ios_xe 17.3.2
cisco ios_xe 17.3.2a
cisco ios_xe 17.3.3
cisco ios_xe 17.3.3a
cisco ios_xe 17.4.1
cisco ios_xe 17.4.1a
cisco ios_xe 17.4.1b
cisco ios_xe 17.4.1c
cisco 1000_integrated_services_router -
cisco 1100-4g\/6g_integrated_services_router -
cisco 1100-4p_integrated_services_router -
cisco 1100-8p_integrated_services_router -
cisco 1100_integrated_services_router -
cisco 1101-4p_integrated_services_router -
cisco 1101_integrated_services_router -
cisco 1109-2p_integrated_services_router -
cisco 1109-4p_integrated_services_router -
cisco 1109_integrated_services_router -
cisco 1111x-8p_integrated_services_router -
cisco 1111x_integrated_services_router -
cisco 111x_integrated_services_router -
cisco 1120_integrated_services_router -
cisco 1160_integrated_services_router -
cisco 4000_integrated_services_router -
cisco 4221_integrated_services_router -
cisco 4321_integrated_services_router -
cisco 4331_integrated_services_router -
cisco 4351_integrated_services_router -
cisco 4431_integrated_services_router -
cisco 4451-x_integrated_services_router -
cisco 4451_integrated_services_router -
cisco 4461_integrated_services_router -
cisco 8800_12-slot -
cisco 8800_18-slot -
cisco 8800_4-slot -
cisco 8800_8-slot -
cisco 8804 -
cisco 8808 -
cisco 8812 -
cisco 8818 -
cisco asr_1000 -
cisco asr_1000-esp100 -
cisco asr_1000-x -
cisco asr_1000_series_route_processor_\(rp2\) -
cisco asr_1000_series_route_processor_\(rp3\) -
cisco asr_1001 -
cisco asr_1001-hx -
cisco asr_1001-hx_r -
cisco asr_1001-x -
cisco asr_1001-x_r -
cisco asr_1002 -
cisco asr_1002-hx -
cisco asr_1002-hx_r -
cisco asr_1002-x -
cisco asr_1002-x_r -
cisco asr_1002_fixed_router -
cisco asr_1004 -
cisco asr_1006 -
cisco asr_1006-x -
cisco asr_1009-x -
cisco asr_1013 -
cisco asr_1023 -
cisco c8200-1n-4t -
cisco c8200l-1n-4t -
cisco c9500-12q -
cisco c9500-16x -
cisco c9500-24q -
cisco c9500-24y4c -
cisco c9500-32c -
cisco c9500-32qc -
cisco c9500-40x -
cisco c9500-48y4c -
cisco catalyst_3650 -
cisco catalyst_3650-12x48fd-e -
cisco catalyst_3650-12x48fd-l -
cisco catalyst_3650-12x48fd-s -
cisco catalyst_3650-12x48uq -
cisco catalyst_3650-12x48uq-e -
cisco catalyst_3650-12x48uq-l -
cisco catalyst_3650-12x48uq-s -
cisco catalyst_3650-12x48ur -
cisco catalyst_3650-12x48ur-e -
cisco catalyst_3650-12x48ur-l -
cisco catalyst_3650-12x48ur-s -
cisco catalyst_3650-12x48uz -
cisco catalyst_3650-12x48uz-e -
cisco catalyst_3650-12x48uz-l -
cisco catalyst_3650-12x48uz-s -
cisco catalyst_3650-24pd -
cisco catalyst_3650-24pd-e -
cisco catalyst_3650-24pd-l -
cisco catalyst_3650-24pd-s -
cisco catalyst_3650-24pdm -
cisco catalyst_3650-24pdm-e -
cisco catalyst_3650-24pdm-l -
cisco catalyst_3650-24pdm-s -
cisco catalyst_3650-24ps-e -
cisco catalyst_3650-24ps-l -
cisco catalyst_3650-24ps-s -
cisco catalyst_3650-24td-e -
cisco catalyst_3650-24td-l -
cisco catalyst_3650-24td-s -
cisco catalyst_3650-24ts-e -
cisco catalyst_3650-24ts-l -
cisco catalyst_3650-24ts-s -
cisco catalyst_3650-48fd-e -
cisco catalyst_3650-48fd-l -
cisco catalyst_3650-48fd-s -
cisco catalyst_3650-48fq -
cisco catalyst_3650-48fq-e -
cisco catalyst_3650-48fq-l -
cisco catalyst_3650-48fq-s -
cisco catalyst_3650-48fqm -
cisco catalyst_3650-48fqm-e -
cisco catalyst_3650-48fqm-l -
cisco catalyst_3650-48fqm-s -
cisco catalyst_3650-48fs-e -
cisco catalyst_3650-48fs-l -
cisco catalyst_3650-48fs-s -
cisco catalyst_3650-48pd-e -
cisco catalyst_3650-48pd-l -
cisco catalyst_3650-48pd-s -
cisco catalyst_3650-48pq-e -
cisco catalyst_3650-48pq-l -
cisco catalyst_3650-48pq-s -
cisco catalyst_3650-48ps-e -
cisco catalyst_3650-48ps-l -
cisco catalyst_3650-48ps-s -
cisco catalyst_3650-48td-e -
cisco catalyst_3650-48td-l -
cisco catalyst_3650-48td-s -
cisco catalyst_3650-48tq-e -
cisco catalyst_3650-48tq-l -
cisco catalyst_3650-48tq-s -
cisco catalyst_3650-48ts-e -
cisco catalyst_3650-48ts-l -
cisco catalyst_3650-48ts-s -
cisco catalyst_3650-8x24pd-e -
cisco catalyst_3650-8x24pd-l -
cisco catalyst_3650-8x24pd-s -
cisco catalyst_3650-8x24uq -
cisco catalyst_3650-8x24uq-e -
cisco catalyst_3650-8x24uq-l -
cisco catalyst_3650-8x24uq-s -
cisco catalyst_3850 -
cisco catalyst_3850-12s-e -
cisco catalyst_3850-12s-s -
cisco catalyst_3850-12x48u -
cisco catalyst_3850-12xs-e -
cisco catalyst_3850-12xs-s -
cisco catalyst_3850-16xs-e -
cisco catalyst_3850-16xs-s -
cisco catalyst_3850-24p-e -
cisco catalyst_3850-24p-l -
cisco catalyst_3850-24p-s -
cisco catalyst_3850-24pw-s -
cisco catalyst_3850-24s-e -
cisco catalyst_3850-24s-s -
cisco catalyst_3850-24t-e -
cisco catalyst_3850-24t-l -
cisco catalyst_3850-24t-s -
cisco catalyst_3850-24u -
cisco catalyst_3850-24u-e -
cisco catalyst_3850-24u-l -
cisco catalyst_3850-24u-s -
cisco catalyst_3850-24xs -
cisco catalyst_3850-24xs-e -
cisco catalyst_3850-24xs-s -
cisco catalyst_3850-24xu -
cisco catalyst_3850-24xu-e -
cisco catalyst_3850-24xu-l -
cisco catalyst_3850-24xu-s -
cisco catalyst_3850-32xs-e -
cisco catalyst_3850-32xs-s -
cisco catalyst_3850-48f-e -
cisco catalyst_3850-48f-l -
cisco catalyst_3850-48f-s -
cisco catalyst_3850-48p-e -
cisco catalyst_3850-48p-l -
cisco catalyst_3850-48p-s -
cisco catalyst_3850-48pw-s -
cisco catalyst_3850-48t-e -
cisco catalyst_3850-48t-l -
cisco catalyst_3850-48t-s -
cisco catalyst_3850-48u -
cisco catalyst_3850-48u-e -
cisco catalyst_3850-48u-l -
cisco catalyst_3850-48u-s -
cisco catalyst_3850-48xs -
cisco catalyst_3850-48xs-e -
cisco catalyst_3850-48xs-f-e -
cisco catalyst_3850-48xs-f-s -
cisco catalyst_3850-48xs-s -
cisco catalyst_3850-nm-2-40g -
cisco catalyst_3850-nm-8-10g -
cisco catalyst_8300-1n1s-4t2x -
cisco catalyst_8300-1n1s-6t -
cisco catalyst_8300-2n2s-4t2x -
cisco catalyst_8300-2n2s-6t -
cisco catalyst_8500 -
cisco catalyst_8500l -
cisco catalyst_8510csr -
cisco catalyst_8510msr -
cisco catalyst_8540csr -
cisco catalyst_8540msr -
cisco catalyst_9200 -
cisco catalyst_9300 -
cisco catalyst_9300-24p-a -
cisco catalyst_9300-24p-e -
cisco catalyst_9300-24s-a -
cisco catalyst_9300-24s-e -
cisco catalyst_9300-24t-a -
cisco catalyst_9300-24t-e -
cisco catalyst_9300-24u-a -
cisco catalyst_9300-24u-e -
cisco catalyst_9300-24ux-a -
cisco catalyst_9300-24ux-e -
cisco catalyst_9300-48p-a -
cisco catalyst_9300-48p-e -
cisco catalyst_9300-48s-a -
cisco catalyst_9300-48s-e -
cisco catalyst_9300-48t-a -
cisco catalyst_9300-48t-e -
cisco catalyst_9300-48u-a -
cisco catalyst_9300-48u-e -
cisco catalyst_9300-48un-a -
cisco catalyst_9300-48un-e -
cisco catalyst_9300-48uxm-a -
cisco catalyst_9300-48uxm-e -
cisco catalyst_9300l -
cisco catalyst_9300l-24p-4g-a -
cisco catalyst_9300l-24p-4g-e -
cisco catalyst_9300l-24p-4x-a -
cisco catalyst_9300l-24p-4x-e -
cisco catalyst_9300l-24t-4g-a -
cisco catalyst_9300l-24t-4g-e -
cisco catalyst_9300l-24t-4x-a -
cisco catalyst_9300l-24t-4x-e -
cisco catalyst_9300l-48p-4g-a -
cisco catalyst_9300l-48p-4g-e -
cisco catalyst_9300l-48p-4x-a -
cisco catalyst_9300l-48p-4x-e -
cisco catalyst_9300l-48t-4g-a -
cisco catalyst_9300l-48t-4g-e -
cisco catalyst_9300l-48t-4x-a -
cisco catalyst_9300l-48t-4x-e -
cisco catalyst_9300l_stack -
cisco catalyst_9400 -
cisco catalyst_9400_supervisor_engine-1 -
cisco catalyst_9407r -
cisco catalyst_9410r -
cisco catalyst_9500 -
cisco catalyst_9600 -
cisco catalyst_9600_supervisor_engine-1 -
cisco catalyst_9800 -
cisco catalyst_9800-40 -
cisco catalyst_9800-40_wireless_controller -
cisco catalyst_9800-80 -
cisco catalyst_9800-80_wireless_controller -
cisco catalyst_9800-cl -
cisco catalyst_9800-l -
cisco catalyst_9800-l-c -
cisco catalyst_9800-l-f -
cisco catalyst_9800_embedded_wireless_controller -
cisco catalyst_cg418-e -
cisco catalyst_cg522-e -
cisco catalyst_ess9300 -
cisco catalyst_ie3200_rugged_switch -
cisco catalyst_ie3300_rugged_switch -
cisco catalyst_ie3400_heavy_duty_switch -
cisco catalyst_ie3400_rugged_switch -
cisco cbr-8 -
cisco csr_1000v -
cisco esr6300 -
cisco ess-3300-24t-con-a -
cisco ess-3300-24t-con-e -
cisco ess-3300-24t-ncp-a -
cisco ess-3300-24t-ncp-e -
cisco ess-3300-con-a -
cisco ess-3300-con-e -
cisco ess-3300-ncp-a -
cisco ess-3300-ncp-e -
cisco isrv -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEAFD220-48D7-46EE-8537-A69C5F8D0F2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr1:*:*:*:*:*:*:*",
                     matchCriteriaId: "806D2FF1-EADA-44C8-94BD-6BC18D138150",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr2:*:*:*:*:*:*:*",
                     matchCriteriaId: "643D7544-34DA-46D9-831F-421ED00F3579",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6354447-07DF-4913-82D9-BF249663499F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EC35AA-4BD3-4FBB-878D-3313D37D9AAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DAC36DC-F4C5-4C4C-9C27-20FD45AA4A85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt1:*:*:*:*:*:*:*",
                     matchCriteriaId: "66BD52DF-E396-415D-B46E-A8814579A01F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt2:*:*:*:*:*:*:*",
                     matchCriteriaId: "72A7CF9A-E1A7-4C1B-9015-5BC577805D9C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svu1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C9711B4-23FF-4C41-86F5-94D5E941453B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*",
                     matchCriteriaId: "9678A6F2-0624-4A8A-9991-9DADCDDB2687",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F6D655-D3A3-4BEE-9DEF-19ADD41D1663",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AC0B809-72AD-413F-BE84-73FE2DB33950",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F2834B6-AA9D-4FDC-A228-CED66C799849",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3426024-7199-4B7B-90CB-CE83FD2E0878",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF163F6F-1A6D-4AA9-AAC2-52249BB28421",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD250CC8-B26A-424E-A737-97F2A7E7C4CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "80114F8D-320D-41FF-ADD3-729E250A8CD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
                     matchCriteriaId: "879C4495-3B26-4370-8708-16F5002E37CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
                     matchCriteriaId: "6F5A55B3-49E4-4C48-B942-4816504BAA30",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5BDAB63-EA0E-486D-B146-7E0060F70066",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
                     matchCriteriaId: "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB704746-C27B-4C6B-948C-B8C0A3F40782",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
                     matchCriteriaId: "F354F8F6-70D3-43EE-BF08-DFB87E83E847",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
                     matchCriteriaId: "62F908B0-7ECE-40F8-8549-29BD1A070606",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
                     matchCriteriaId: "378E67DD-779C-4852-BF29-38C2DFFB1BBB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*",
                     matchCriteriaId: "9033ACC7-1CCC-44E7-8275-73499C0E6E87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10b:*:*:*:*:*:*:*",
                     matchCriteriaId: "2436CB44-A933-4885-8BD2-E2AAEE7CC1AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
                     matchCriteriaId: "BBF92BEC-AA46-46DF-8C1E-956F3E506E69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C226FE9-61A0-4873-B277-1B8ADB397B32",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD5BD905-75C3-47AE-8D19-6225BD808B37",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
                     matchCriteriaId: "56DE452A-6852-4879-9187-8A152E6E260E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7785E177-C04E-4170-9C35-B4259D14EA85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CAE727E-E552-4222-8FF0-6146A813BDEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7850295-C728-4448-ABA7-D01397DBBE5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C104A47-53EE-47FC-BAE5-21925BEE98E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
                     matchCriteriaId: "65589A68-58A4-4BD4-8A26-C629AE610953",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8A64C8F-6380-47CA-8116-E3438B953F84",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F65F813B-C080-4028-8E1E-A81827917DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ABBCE48-B9D1-4EFB-BF64-CF30F5294EB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D54D10E-D94E-4731-9988-4EC1786FF4E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4DC02AA6-E046-4EC9-9FFB-8B2C76FBE027",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A2BB34B-D902-4064-BADC-56B5379E92CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*",
                     matchCriteriaId: "55D0A0A2-DB62-4C92-9877-CF8CA01B1A10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2316E962-6C56-4F45-9575-274506B9D4C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "42D3DFE3-7576-4D56-ABD2-425C28B56960",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "A39AFD5E-8FCA-4EC6-9472-FD208CB2A555",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "F112DE64-0042-4FB9-945D-3107468193E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E027FB12-862F-413E-AA2B-4BBD90AE3650",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD28874B-148A-4299-9AA1-67A550B25F8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
                     matchCriteriaId: "45B80CBC-961F-4EE8-A998-C0A827151EDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7131776-5DEB-4B96-8483-B81B538E24FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE991877-18E0-4374-A441-C2316085CCA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A2EB46D-16E0-4C31-8634-C33D70B5381A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "757EB1A1-4764-4108-9AB1-F33CF9CEE574",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "7803B445-FE22-4D4B-9F3A-68EFE528195E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5B78669-3B28-4F1D-993D-85282A7D0E96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "7551128E-9E23-4C42-A681-6BE64D284C93",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DEE2C71-C401-43D1-86DC-725FE5FDF87E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "1758F264-96F9-4EE9-9CA9-AD5407885547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB2842F6-4CD5-457C-AC75-241A5AB9534B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5ABE0470-E94A-4CAF-865D-73E2607A0DC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9CCD7E3-C62B-4151-96FF-1175D4896E95",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "110B699D-169E-4932-A480-6EBB90CAE94B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
                     matchCriteriaId: "A4C12918-E5BB-465E-9DA4-06B7351DD805",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0C4E1F4-AD64-418C-A308-85501E0F3EA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
                     matchCriteriaId: "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB8C3BBA-4829-4006-B7EB-F552D86922C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2b:*:*:*:*:*:*:*",
                     matchCriteriaId: "29FE4D84-423F-4A5E-9B06-D5231BF1E03E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
                     matchCriteriaId: "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "6935EBC4-3881-46F4-B608-8E6C9EF8E37C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
                     matchCriteriaId: "345C9300-CAC2-4427-A6B4-8DBC72573E00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
                     matchCriteriaId: "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e99:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8BB9177-AC8E-4B16-97C1-8F349FD853D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
                     matchCriteriaId: "1374E243-4EC2-4A81-991C-B5705135CAD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ECA6101-94BA-4209-8243-A56AF02963EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFF00927-80B0-4BE3-BF7C-E663A5E7763A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9795E31D-A642-4100-A980-CD49C291AB7F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.2\\(234k\\)e:*:*:*:*:*:*:*",
                     matchCriteriaId: "93681DCF-D5ED-4909-B41F-C7CB975DE282",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(0\\)sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "1724DF49-B5A4-4EA6-8733-1672455BB3BF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "249D78EB-A125-4731-A41B-62F8302D7246",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E599088-5071-469B-980F-4BA3026856C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*",
                     matchCriteriaId: "21F58CEE-636B-460E-91D1-330965FA7FE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3C779C9-3B83-4B26-8942-B8475FB3B5D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*",
                     matchCriteriaId: "02ACA99D-5784-4F5F-AB83-F55DF8774E94",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFFB9F99-8751-442B-9419-C2AB522D2ADC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E33FD88-8183-40EF-97A1-2766A4BBFBE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca7:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6135D11-F4C2-4B6C-BC63-1132499D64A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca8:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B43CA9C-977B-4C99-A520-0BCDA5D2A700",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca9:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFDCD3CA-FAA4-4BCA-883B-B871B8748C3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9B59D8B-E71A-4671-BA0B-00E56498E280",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*",
                     matchCriteriaId: "956C0089-E5AE-4289-B6D7-A8AB3C39AAA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*",
                     matchCriteriaId: "333468BC-41F0-46ED-9561-D7D2CE6AC267",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
                     matchCriteriaId: "09DBAA17-61D7-4EE4-A70D-A7200DF36C58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF17EADC-5812-47FD-A243-287837CEC1E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*",
                     matchCriteriaId: "5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE8CF99C-B097-4964-B07C-FBB28EB37681",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*",
                     matchCriteriaId: "79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd12:*:*:*:*:*:*:*",
                     matchCriteriaId: "CBA4B81F-7FCA-4666-8602-F6C77A4673E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2403659-B7AD-40CE-AF88-FE2BEF0929E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D1F53B1-E9FA-4480-8314-C531073B25CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*",
                     matchCriteriaId: "498030A3-0AFF-4D74-98D6-74C9447E5B79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDCBDB71-59D7-481E-84FF-8772930F857B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda7:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C5906E4-31B7-45B6-B7D4-493B64741D52",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda8:*:*:*:*:*:*:*",
                     matchCriteriaId: "09807F0F-E487-447B-8A79-96CB90858891",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda9:*:*:*:*:*:*:*",
                     matchCriteriaId: "01A21ED6-B633-4B59-BD32-128D0E2B3563",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda11:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA7AF17D-2E1E-47D7-9356-4185A5F09BDD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda12:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FBF7AB3-6BA0-4ED8-9496-2CA4C28F9C8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda13:*:*:*:*:*:*:*",
                     matchCriteriaId: "09664703-4AF6-4213-AB74-9294DE80E648",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda14:*:*:*:*:*:*:*",
                     matchCriteriaId: "638B3FE5-39B1-47E7-B975-A2A88C68B573",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda16:*:*:*:*:*:*:*",
                     matchCriteriaId: "04D5820C-2E74-4C66-932C-00FF3D064F09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda17:*:*:*:*:*:*:*",
                     matchCriteriaId: "65F67B44-4215-48BC-A4DA-279178C4A6A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*",
                     matchCriteriaId: "2955A319-04AC-4D0C-80B7-0C90503908C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0EF13B6-A743-41D1-BB31-F17C3586C8AF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*",
                     matchCriteriaId: "37875B18-434B-4218-BAAF-2B593E188180",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*",
                     matchCriteriaId: "26BAC234-D00C-4407-A1FE-E45A14D1BDAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*",
                     matchCriteriaId: "C42E2869-F179-49B7-A4E8-0F4E8EA953CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A58711A-F8C9-4F25-97D7-AE8AE64F3912",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE3ECC04-345F-4DAE-98F7-04E082BAEC3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A919122-DE62-4032-80DF-F77C1D80B387",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf11:*:*:*:*:*:*:*",
                     matchCriteriaId: "68958043-1212-42AF-A205-DB731ED55114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12:*:*:*:*:*:*:*",
                     matchCriteriaId: "84AE6EB6-EF3F-4DE2-ABEC-71F9010BFF0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12i:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD6F56B5-BE84-434D-AEC8-EB0764A832FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14:*:*:*:*:*:*:*",
                     matchCriteriaId: "786741B1-2502-4F2F-A943-C50720A73D60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14i:*:*:*:*:*:*:*",
                     matchCriteriaId: "02693A73-85AE-4AFE-81B2-11A85251CBD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf15:*:*:*:*:*:*:*",
                     matchCriteriaId: "83EFE0BC-2487-458C-B8AB-33600B9EB986",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*",
                     matchCriteriaId: "746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8BB02DEB-81D4-4A05-BDD5-3B8BC7184159",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*",
                     matchCriteriaId: "B18C3383-28B0-435E-AF08-9739DADAE4E2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*",
                     matchCriteriaId: "08C9CA39-3515-4226-8453-0B5FC62546D1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*",
                     matchCriteriaId: "19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1658FFCF-7433-4AFB-9D59-BD6CC14A4D28",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2CA6116-2C6B-431B-BA88-63B180A00DA0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2377350-7B69-4C49-889A-D63A3E4C1002",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji6:*:*:*:*:*:*:*",
                     matchCriteriaId: "2913C352-E21F-4ECE-8A13-BA21CC00D02E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AD90F4A-2A86-4A98-A157-D93C382717A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*",
                     matchCriteriaId: "1739E9AD-154D-40C2-A761-F7133BC06C3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA700809-C25D-49F8-B930-7459F8AE9DCE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*",
                     matchCriteriaId: "2AEB7B3E-4E91-477F-BD62-9A28578CCA80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2:*:*:*:*:*:*:*",
                     matchCriteriaId: "58C5D255-C0FE-47E6-A920-3539306F9845",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C8DF3B4-A424-4B70-9116-28E2C4DFB776",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*",
                     matchCriteriaId: "4677B840-6636-4D8C-9E1C-47FEB8F3116A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk4:*:*:*:*:*:*:*",
                     matchCriteriaId: "917D5477-E47E-4A01-979A-C9A0993BE34B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk5:*:*:*:*:*:*:*",
                     matchCriteriaId: "09EC7701-3B46-4CFE-9EE5-2EA393D5A6D6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk6:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E18F8C6-E592-4507-8B93-E9AEA5C12CC1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BF0C320-9055-4E71-808A-BF2B8E00B443",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn13:*:*:*:*:*:*:*",
                     matchCriteriaId: "49B4A0C4-B0CF-4040-9EB0-1529BCAD0DF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn14:*:*:*:*:*:*:*",
                     matchCriteriaId: "4071E320-789E-4E1D-982B-C265F4228FEA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn15:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EC38DE9-5D5D-452A-AC42-C1D24418FDB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*",
                     matchCriteriaId: "83B45095-526D-4BC5-A16B-6B5741F07FD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3A2E770-2D7A-4A09-AE89-B58F01FDE1B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1t:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6546067-A0AD-4BCB-8519-1DF018EBF804",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3AE13E73-F2E2-4F8D-B236-940C74335E3C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi5:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E08CCB1-054E-4ABB-8A68-5DC5D8464ECB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi5s:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AFA615E-E4DE-4D9B-B666-ADEF30B33059",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi6a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E790F111-F2C4-4898-BC24-D09C213F62DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi7:*:*:*:*:*:*:*",
                     matchCriteriaId: "92A0E2C0-519E-4DFA-897E-DF5DE59434A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi8:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8143E1F-A22C-4222-8EDF-82B615ADB082",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3BF63D2-734D-41F4-8FE0-7F07F482AA6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2t:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD4E1437-2511-40ED-848A-FFE4542D8B6E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3:*:*:*:*:*:*:*",
                     matchCriteriaId: "568E1EE8-78E7-4E24-88D1-9D42DE500F8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "37F71B84-9188-4333-95B1-0801F03BC496",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A42E49E0-08A9-49DF-B67D-537618A8881A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj5:*:*:*:*:*:*:*",
                     matchCriteriaId: "806D68A3-6E80-4184-A5D7-FBA718B66BA6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj6:*:*:*:*:*:*:*",
                     matchCriteriaId: "55BEDA52-B21D-4693-8E70-88350FDCACD8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj7:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E2365E7-F80F-430D-8F23-04191DE26DDE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D6F2D03-4959-4AF3-ABEC-77751C40A2DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk1:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD5AE65B-2974-47D5-9023-AA1FB2031DF8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk2:*:*:*:*:*:*:*",
                     matchCriteriaId: "35B2299C-0303-4E0B-B194-7404F8C7FF96",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*",
                     matchCriteriaId: "D962FBA3-CE59-401B-9451-45001775BA66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C13F2837-174B-4437-BF3F-CB6BFBF8F64D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "237D305E-016D-4E84-827C-44D04E3E0999",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E993A32E-D2AF-4519-B4C9-7F576649D20F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7260A66D-D477-440E-9A87-C05F9BD9E67C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*",
                     matchCriteriaId: "31059ED1-4D82-43D7-8EF7-042125289CF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B813F19-1B37-48F4-99EC-05E0CAA861FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "4220D3B1-BD05-4169-91BA-B1AA45084C46",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*",
                     matchCriteriaId: "84BAF351-4C7F-44F8-812E-9C402CBBB5FF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0595F3D8-8D99-4C82-9EC1-1187C52A6740",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*",
                     matchCriteriaId: "662ACAD0-7E80-4CB5-8409-03E72A3C59D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*",
                     matchCriteriaId: "A43EE852-5F22-4387-8332-A12FF3306210",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C1EE552E-226C-46DE-9861-CB148AD8FB44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAF02C8E-9BB2-4DC2-8BF1-932835191F09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5AC88EB-7A67-4CDE-9C69-94734966E677",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "4151B2B1-B17F-4F1D-A211-34C7DB84E442",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*",
                     matchCriteriaId: "37B550C9-B2E4-44EE-8E0B-54D150C69A0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBBA614-74E7-43C7-8D33-ADF4BD79D477",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7A852A3-7CAC-4D35-A583-556D17A0F7E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBF5D54D-4403-4C5E-AA65-9FD8661E283B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C89048E-2A5F-4818-92DB-812BB8FEDC90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)sn1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AA83229-767A-40EA-AE03-53DA0DD40B26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "74E1226B-46CF-4C82-911A-86C818A75DFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
                     matchCriteriaId: "100DA24F-464E-4273-83DF-6428D0ED6641",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
                     matchCriteriaId: "063C0C47-25EB-4AA4-9332-8E43CD60FF39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*",
                     matchCriteriaId: "02866AED-A1B4-4D89-A11F-27089EF935BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C85BAAF-819B-40E7-9099-04AA8D9AB114",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED684DB4-527A-4268-B197-4719B0178429",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*",
                     matchCriteriaId: "88F41406-0F55-4D74-A4F6-4ABD5A803907",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*",
                     matchCriteriaId: "7082C083-7517-4CD4-BF95-CC7AF08D4053",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*",
                     matchCriteriaId: "370EF3DC-151F-4724-A026-3AD8ED6D801C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B8FB86F-2A89-413B-BED7-97E3D392804E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*",
                     matchCriteriaId: "005EAD76-34BE-4E3F-8840-23F613661FE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*",
                     matchCriteriaId: "2595B3E3-7FD4-4EFF-98A2-89156A657A0E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB998A1F-BAEA-4B8F-BE49-1C282ED3952E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7a:*:*:*:*:*:*:*",
                     matchCriteriaId: "A55379B7-2787-4BE6-8960-204C074F4CD1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AABDAB3-6329-48CF-BB49-DA2046AB9048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m9:*:*:*:*:*:*:*",
                     matchCriteriaId: "C96E41FF-DD4B-4D55-8C96-248C9A15226B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m10:*:*:*:*:*:*:*",
                     matchCriteriaId: "64F7ACB5-4FE5-4B07-8B4D-28DF8D655199",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0d:*:*:*:*:*:*:*",
                     matchCriteriaId: "29F1BC11-BD27-4465-B92E-B01248B2EAAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A2DB2F4-DA30-4250-834D-B60D74B7B1F8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0f:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5323B67-7A30-44B6-B3FB-0148444F1725",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4408CD8-DC1D-4102-924B-E9E28FC5CECF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2A39749-3A95-41B6-850B-4D388E6242B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*",
                     matchCriteriaId: "67B663F9-DBF4-4EEE-836D-C83BF99A682A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*",
                     matchCriteriaId: "55E780F3-D378-4201-AC69-79C356EE9CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*",
                     matchCriteriaId: "28FE5158-FA37-476B-8289-11733BB9AFF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*",
                     matchCriteriaId: "24AE7F08-FB39-4E35-81AD-0186F2A539D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*",
                     matchCriteriaId: "447FAF3B-8E93-4A2C-A8B1-1A2F7D958754",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*",
                     matchCriteriaId: "08E2628F-456D-4471-A914-D92157725CB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCA37E61-7EA5-45F3-87F6-432B591A79BB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s9:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AE143DA-B2AA-47C3-BA8D-F0C02AFF36BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s10:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C1F539B-8422-43AD-8BFB-E57622035B9D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F0C961B-833E-4F45-AAD0-DB8CDBC3A988",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "D604EC27-EC42-435C-93E4-2DCB62AEA3D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "9613EE90-A90A-4817-A5A1-F78A9F3BA571",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*",
                     matchCriteriaId: "87A96A92-02E7-440C-9E46-0FBE8CE75E44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F1AEF3-08BD-4CC0-A36A-D26D550853E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8DD9FF45-C8C2-42E2-B329-48C037A10521",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*",
                     matchCriteriaId: "36CBB93A-A8C8-477E-B530-B0058C3D15B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "075BBA36-281F-4164-A1ED-04A2B3589B00",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sn1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFB675E0-5497-4307-9B1C-4CBFAEE612FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*",
                     matchCriteriaId: "6465E3DA-90F0-4DD6-82B1-C9DF9FAEBDD2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*",
                     matchCriteriaId: "346BD6D0-AAF2-4C9A-8DD3-8C710302DCA1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A5B7053-7F9C-432C-B6F1-DAC00B0C9619",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D029D52-65E5-4129-AB47-E873F53799CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
                     matchCriteriaId: "31605A68-9398-4239-A137-DD0516BD2660",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*",
                     matchCriteriaId: "727E596A-295D-4D70-810A-436FC6A4415D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*",
                     matchCriteriaId: "368210A0-CC15-4FB9-8334-4ED475523C2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D37EF429-EE6B-4A72-9D76-4FC1E6E19E01",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*",
                     matchCriteriaId: "9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0340EC20-7099-4F13-8DE6-84475B2A52CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6994F100-864F-4512-9141-F7D1050F9DD4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC0CC364-FF3A-4FB3-8004-6628400BC7DB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*",
                     matchCriteriaId: "67A1BC08-28AF-4583-BE21-0D85CA2D7B6F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A259566-AA04-4DE8-900D-865384E56C8E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6CF70F3C-FAC8-4691-AF95-1B5B828A9D41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*",
                     matchCriteriaId: "AF08E7CE-DE01-43B2-A9F0-1CE657E79260",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC500D08-0DE1-4AA8-AE97-0CF17A706430",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CFF6E14-D29F-41F3-BD25-A1DB0A464592",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A4E00DF-60FD-48F2-A69A-D709A5657F6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F5D3761-16C8-413A-89AD-C076B9B92FF1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F690BEC9-FAE9-4C02-9993-34BF14FA99EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*",
                     matchCriteriaId: "B0B8565B-3EE6-48DC-AE92-9F16AFFC509C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)xb:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D604189-E382-47B3-B9D3-A6D2EA3B2C80",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*",
                     matchCriteriaId: "716EC9AA-0569-4FA7-A244-1A14FA15C5AD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "39166A66-859D-43A7-9947-3F3C32FBFAAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*",
                     matchCriteriaId: "097D1950-6159-45A2-8653-D3F90044D0C8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F421AC3C-B0BC-4177-ACDB-87792C1636EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA965B88-3464-4320-B9C4-594C49C9C0F6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*",
                     matchCriteriaId: "09CD336D-1110-4B0C-B8D4-7C96293CBADE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*",
                     matchCriteriaId: "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4b:*:*:*:*:*:*:*",
                     matchCriteriaId: "90950C85-D631-4F60-AB3E-3ED1D74D56B9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4c:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD79CA0D-7D90-4955-969A-C25873B0B9D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7809674-4738-463E-B522-FC6C419E2A09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*",
                     matchCriteriaId: "FFD51F00-C219-439F-918E-9AF20A6E053A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*",
                     matchCriteriaId: "57BCB671-7ED0-43D5-894F-8B3DBF44E68E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4802BC7-F326-4F6E-9C74-04032FF35FEE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DEDE3BCF-B518-47B0-BD3B-0B75515771E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A5C9BF5-0C29-4B50-9A86-29F0ECD44F1D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1B0621A-D7A2-415B-91ED-674F2FB4227B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m11:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D9D7FDD-8CE6-4E83-A186-734BC5546E35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m11a:*:*:*:*:*:*:*",
                     matchCriteriaId: "271D901A-3196-4653-A04E-07A6BC13B44D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB52603C-CED4-4330-BB53-DDDFEA83882A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F40A87C1-5EDB-4B50-84CF-729F5037E870",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*",
                     matchCriteriaId: "42C9B84C-F9DC-4F9E-82F2-04004D539C36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E246B9E-F93F-4BB2-9BA4-438FCC4A711B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE884ADE-FD51-4F10-89A8-D871E7407C83",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC22B2CD-5154-4055-A6A7-4C31B84B032B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*",
                     matchCriteriaId: "10082A46-7AD3-4533-9A15-267953D9E642",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ED8D1FE-5880-484E-810B-B1CDC2C9F7CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ADD1575-BB35-40CE-8452-3D34E25995B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*",
                     matchCriteriaId: "67FE59A3-5BA1-4C68-8959-A5B0CA61CDB4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6B02867-F082-4A57-9E2E-12B0F4C77526",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8389200-0585-456E-8D0B-D725266ADBBC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
                     matchCriteriaId: "EFEF03FA-FBF2-477F-A5E2-67F47610897A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10a:*:*:*:*:*:*:*",
                     matchCriteriaId: "0969524D-EB41-47F0-8370-2E38ED7493BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10b:*:*:*:*:*:*:*",
                     matchCriteriaId: "91D97C79-48C6-4A3E-8C10-AC04BFDF2951",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "C84498B4-7002-44D1-B2B7-B43F3081D258",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E10003D7-8501-4A8C-AED1-A9F9B79D0666",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F61B07A-7933-476F-951A-AD0019D2443D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*",
                     matchCriteriaId: "41939712-5075-4924-ABF2-467430B37197",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E7CBC8C7-E3B2-4659-9B47-C0F16817F46A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*",
                     matchCriteriaId: "945363EE-FE7A-44ED-A4A0-942A1F9B2702",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1CEA598-B4E5-44E6-AA1A-79DC4FE3B62E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn1:*:*:*:*:*:*:*",
                     matchCriteriaId: "2481A9F2-2C99-4A78-B8B4-0D073A6CFED5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn2:*:*:*:*:*:*:*",
                     matchCriteriaId: "667CB7FD-280B-42D6-9E45-EA04A1DC7701",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn3:*:*:*:*:*:*:*",
                     matchCriteriaId: "65DD79B6-A44A-447F-A69D-C7C4193F5C1C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "679DCA8C-F64B-4716-BCC9-9C461A89CB29",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF662E36-0831-4892-850F-844B0E0B54DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E71F49D-E405-4AB4-9188-DA7B338DFD7B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*",
                     matchCriteriaId: "204B0A52-F6AB-406B-B46D-E92F2D7D87F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*",
                     matchCriteriaId: "700D0D31-138B-4F9A-8C76-3AF8B9D2C59C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*",
                     matchCriteriaId: "B843CEE5-4D53-414D-95C7-4BA515818E87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*",
                     matchCriteriaId: "72480900-6E08-425F-965D-143B348E374A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EBA0926-E790-4B1C-A549-5B7D2F040E5A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "12D439A6-E8A8-4389-A7C8-2F4BCB7C3854",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E903D9F-530D-4597-ABA9-4C1CFB79814B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5060BAEA-DF8F-4B85-84F5-1410FD45C733",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB56857D-029C-4DA8-B439-F1B89EA32074",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F91AC2D-86F7-4618-A31B-DE081D4C21BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D25B94F9-F10F-47CE-8340-CE56E7ED31E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C32C536-640C-468D-872F-442697DB9EE6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp7:*:*:*:*:*:*:*",
                     matchCriteriaId: "38DE4F33-A677-4848-BB33-10C4A4655735",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF0A4820-F737-4A3A-8A08-E2C3EE6F6E66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8a:*:*:*:*:*:*:*",
                     matchCriteriaId: "83758252-FF68-432F-8670-AABE1DD0C425",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp9:*:*:*:*:*:*:*",
                     matchCriteriaId: "0894FC09-880C-44D5-B67D-81C92D96D790",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
                     matchCriteriaId: "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BBF8B70-DFBE-4F6E-83F0-171F03E97606",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA55D660-66C6-4278-8C27-25DB2712CC1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
                     matchCriteriaId: "5609B342-D98E-4850-A0FE-810699A80A1F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
                     matchCriteriaId: "8320F23D-F6BE-405B-B645-1CEB984E8267",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C7C5C705-6A8C-4834-9D24-CFE26A232C15",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "691BA27E-77AB-4A30-916D-3BB916B05298",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC270E40-CABA-44B4-B4DD-E9C47A97770B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC1DB8C1-7F7D-4562-A317-87E925CAD524",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A1887D9-E339-4DC6-BE24-A5FF15438B2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8AB2645F-C3BF-458F-9D07-6D66E1953730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*",
                     matchCriteriaId: "686FD45C-7722-4D98-A6D7-C36CAC56A4AA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*",
                     matchCriteriaId: "871E33AC-B469-47BA-9317-DC9E3E9BF5C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4091CAC-BFAA-404C-A827-4DA9EADDF621",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*",
                     matchCriteriaId: "369A99E0-3451-41D1-8C56-5352EA689950",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*",
                     matchCriteriaId: "33D4A7FA-E4E0-49C2-97FD-A547A1612F75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA0B918F-A28C-4B5A-A566-6E588B4F6696",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*",
                     matchCriteriaId: "436114F2-D906-4469-99C4-10B75253B3D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "466F2336-03D9-4842-BC3D-861749756B9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(4\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "494F7651-927A-418D-B01A-1C30BFE28560",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(5\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9ACFB65-C99B-4402-A8E5-914533FF3F2F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(7\\)sn:*:*:*:*:*:*:*",
                     matchCriteriaId: "F805324A-1593-4B48-B597-CF870D35944B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(7\\)sn1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C78D1111-D91D-4E43-BC47-86EB37AACF75",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.6\\(7\\)sn2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B949D73E-0ED4-40CA-801E-F0BEE22157B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C8A00BF-4522-467B-A96E-5C33623DCA2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2A434E7-B27C-4663-BE83-39A650D22D26",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*",
                     matchCriteriaId: "47C106CF-CBD3-4630-8E77-EDB1643F97E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*",
                     matchCriteriaId: "A1DB7943-5CE1-44F6-B093-5EA65BF71A59",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*",
                     matchCriteriaId: "64404B00-4956-47B8-ACDB-88E365E97212",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FE6A696-5CBC-4552-A54E-55C21BC74D7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*",
                     matchCriteriaId: "41237041-1D82-4C6C-BF48-ECEDF9DB08C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB72CA3-088E-4EFE-BE1C-190C64101851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA584AC4-96AB-4026-84DF-F44F3B97F7E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*",
                     matchCriteriaId: "22EB41FD-4DE2-4753-A18C-C877B81B51D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*",
                     matchCriteriaId: "158EDE62-04C9-471B-B243-309D49583E67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8609F10-2B43-4BDC-AAF1-80D589910EF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A58C01B-459E-432F-A49F-68EC45EE6E14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*",
                     matchCriteriaId: "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*",
                     matchCriteriaId: "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*",
                     matchCriteriaId: "198FF520-7631-49D9-B8A8-2E64F6237CC0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "94E067E8-552B-4691-9F6A-C5E8766287BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "405CC56E-574F-4983-B492-C8811FAF06E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1829074-66F9-4B3B-A084-B88D838CFC44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*",
                     matchCriteriaId: "6715A135-61A7-4E56-948D-8A8D5F7C98C7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*",
                     matchCriteriaId: "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2CC4602-D1F5-4843-991A-2903C8336251",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*",
                     matchCriteriaId: "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*",
                     matchCriteriaId: "0807458A-2453-4575-AE19-0DE15E04B88C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*",
                     matchCriteriaId: "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*",
                     matchCriteriaId: "B8313597-49A9-4918-B8D5-8E53C5C9AFAB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C6DA27-2445-4850-B0EF-82EE8C01C0B5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F73E7874-A063-4AE5-9F0A-53D590B7B99B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
                     matchCriteriaId: "013DD522-1561-4468-A350-C872B78FC291",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
                     matchCriteriaId: "6907E1FE-760E-4557-A472-1A1F0052B82B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
                     matchCriteriaId: "62291CDD-A775-44B4-85F3-CE1D494F55FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
                     matchCriteriaId: "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
                     matchCriteriaId: "90005E78-413A-47D7-82B3-A3011E6B118D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
                     matchCriteriaId: "D764D126-4604-43DD-9A66-BDD32565D893",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
                     matchCriteriaId: "06067D8B-79BD-4982-909F-7C08BE5660C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
                     matchCriteriaId: "672B77C7-0E6B-496D-9ACC-6AD965319B35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5604A84-8240-45B6-9027-B03AA549CD5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
                     matchCriteriaId: "895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
                     matchCriteriaId: "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
                     matchCriteriaId: "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
                     matchCriteriaId: "A98F2654-46F3-4C63-A2C2-48B372C655B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
                     matchCriteriaId: "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
                     matchCriteriaId: "17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
                     matchCriteriaId: "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
                     matchCriteriaId: "20286676-70FF-471C-9612-74E5F0ECB8E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
                     matchCriteriaId: "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DAC081C-9A22-4CBC-A9D0-DD9995801791",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
                     matchCriteriaId: "27252883-091A-471D-87FC-E07EADBC6FFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "F43F819E-3072-430F-8C52-B43FF28D4687",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.2ae:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BC3D979-02B2-4EEC-A6C2-A44C9FC694D9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
                     matchCriteriaId: "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F79BC92-0869-447C-AF34-3FBF42375D1A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "09A930B7-7B9B-426E-A296-9F29F4A03F5B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*",
                     matchCriteriaId: "4615A652-96A3-4809-94C0-7B7BF607B519",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "309952D7-B220-4678-A16D-AA5FF005F782",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A31B2A2-E88A-49AA-B187-3EA91CB8842A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.11.99ze:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0E8150B-629E-4B06-9B1F-168F06DCA1C6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
                     matchCriteriaId: "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "278ACF0A-949B-486D-8F6C-ADC2AF25FC17",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "37A30BA4-D760-4321-AAC8-04093AAAEA3E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "42616EA2-DDCF-4B57-BF2A-37968C82DDC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*",
                     matchCriteriaId: "246251E8-7D4E-4CD4-8D4F-BF360780FA36",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "09F35F75-75E8-4A20-94C4-5908E404C8CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C01C1D8-A191-45B7-A6C5-EE225F05A49E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
                     matchCriteriaId: "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F6E9386-30B4-4E86-9676-E7E005274048",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E70C455-E41C-4B17-847A-5F4281139252",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
                     matchCriteriaId: "64A07329-3A7D-4483-AE69-4786FEB23D92",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
                     matchCriteriaId: "F84E4463-DB0F-4B06-B403-B3606B386F02",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*",
                     matchCriteriaId: "E08D377F-EBEC-4234-8628-2CFD04E43CB0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
                     matchCriteriaId: "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAE50185-23ED-4640-9037-E45810793C85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*",
                     matchCriteriaId: "96637FB9-B552-417B-8C7F-4F4524F69690",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
                     matchCriteriaId: "5DA6851D-6DC1-403F-A511-EE996FE832F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7C97617-6574-4EFD-8408-A9E21A56E1AC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
                     matchCriteriaId: "FB188B71-4CF0-49EA-BA00-10FEDF994D70",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "E61E0102-B9B6-41F4-9041-0A5F144D849A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A076E1F-3457-410A-8AB6-64416ECB20A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "2972E680-5A19-4858-9B35-0B959ED319A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BF22C29-84DF-44CA-B574-FE04AB39E344",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "F1BFE916-916F-4936-A331-21A0E8193920",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2C7C0BA-D618-4B65-B42C-43393167EEE0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C5484A4-D116-4B79-8369-47979E20AACA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*",
                     matchCriteriaId: "97410577-A005-49B6-981C-535B3484E72F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
                     matchCriteriaId: "3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
                     matchCriteriaId: "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
                     matchCriteriaId: "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
                     matchCriteriaId: "BA0B441A-3A09-4A58-8A40-D463003A50BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
                     matchCriteriaId: "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "970FD986-6D0E-441C-9BF3-C66A25763A7A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "1826C997-6D5D-480E-A12E-3048B6C61216",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D136C95-F837-49AD-82B3-81C25F68D0EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
                     matchCriteriaId: "C35B3F96-B342-4AFC-A511-7A735B961ECD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E203E52-0A3A-4910-863D-05FEF537C9B8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
                     matchCriteriaId: "DED2D791-4142-4B9E-8401-6B63357536B0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B6442B5-A87E-493B-98D5-F954B5A001BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*",
                     matchCriteriaId: "8794DA1D-9EE8-4139-B8E9-061A73CFD5F5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*",
                     matchCriteriaId: "51EAC484-1C4F-4CA8-B8E1-6EE0E9497A4A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0BC5E30-71D2-4C17-A1BA-0850A9BC7D50",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
                     matchCriteriaId: "844E7CEC-5CB6-47AE-95F7-75693347C08E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
                     matchCriteriaId: "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
                     matchCriteriaId: "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
                     matchCriteriaId: "169D71B3-1CCE-4526-8D91-048212EEDF08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
                     matchCriteriaId: "27F66514-B9C4-422E-B68E-406608302E03",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
                     matchCriteriaId: "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABC524BA-544C-49B9-A9D6-800D25556532",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.10as:*:*:*:*:*:*:*",
                     matchCriteriaId: "02A07FC8-5649-4A64-8B94-507524FE4551",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.10bs:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2E619BC-F1A2-45A7-BC12-E716BAC81376",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
                     matchCriteriaId: "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "876767C7-0196-4226-92B1-DDE851B53655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "0141D67B-632F-48ED-8837-4CC799616C57",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE444B39-D025-471B-835E-88671212ACAA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE390091-D382-4436-BBB4-D4C33E4F6714",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
                     matchCriteriaId: "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
                     matchCriteriaId: "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
                     matchCriteriaId: "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE3170E3-0BCC-4C5F-8E6C-5E91E8C4E7A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*",
                     matchCriteriaId: "3CCDB353-DD15-4C91-AD2A-73649C012E08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D7DAAE1-BB3F-4FBA-A6ED-3BABC9196C1C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "014224BF-926E-470C-A133-84036D8AD533",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
                     matchCriteriaId: "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
                     matchCriteriaId: "B58E818D-03BB-4FE4-946B-B967E9764DA3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "4063CCF8-19BE-4411-B71B-147BB146700B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "186ADB50-A4D4-4B32-884D-3195E7770346",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "63D05DBA-D3F0-492B-9976-54A7E46F315E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
                     matchCriteriaId: "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.8sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "78224D59-5C86-4090-9645-170B6583C7E0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB2D4A7B-E0B7-4D65-B242-75934490D703",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "0ED5527C-A638-4E20-9928-099E32E17743",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "43052998-0A27-4E83-A884-A94701A3F4CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "89526731-B712-43D3-B451-D7FC503D2D65",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "302933FE-4B6A-48A3-97F0-4B943251B717",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "296636F1-9242-429B-8472-90352C056106",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "77993343-0394-413F-ABF9-C1215E9AD800",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "283971DD-DD58-4A76-AC2A-F316534ED416",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "A8F324A5-4830-482E-A684-AB3B6594CEAE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8120196-8648-49D0-8262-CD4C9C90C37A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
                     matchCriteriaId: "0699DD6E-BA74-4814-93AB-300329C9D032",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2E2D781-2684-45F1-AC52-636572A0DCA8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF2B4C78-5C31-4F3D-9639-305E15576E79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
                     matchCriteriaId: "13CB889F-B064-4CAC-99AC-903745ACA566",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "77E8AF15-AB46-4EAB-8872-8C55E8601599",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "957318BE-55D4-4585-AA52-C813301D01C3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE7B2557-821D-4E05-B5C3-67192573D97D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
                     matchCriteriaId: "187F699A-AF2F-42B0-B855-27413140C384",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "65020120-491D-46CD-8C73-974B6F4C11E6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F35C623-6043-43A6-BBAA-478E185480CF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B688E46-5BAD-4DEC-8B13-B184B141B169",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F13F583-F645-4DF0-A075-B4F19D71D128",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "01B53828-C520-4845-9C14-6C7D50EAA3A8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5311FBE-12BF-41AC-B8C6-D86007834863",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
                     matchCriteriaId: "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FBD681F-7969-42BE-A47E-7C287755DCB5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "98255E6F-3056-487D-9157-403836EFB9D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
                     matchCriteriaId: "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
                     matchCriteriaId: "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
                     matchCriteriaId: "96852D16-AF50-4C70-B125-D2349E6765D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
                     matchCriteriaId: "A15B882A-BA60-4932-A55E-F4A798B30EEB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C9C585C-A6EC-4385-B915-046C110BF95F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "119A964D-ABC8-424D-8097-85B832A833BD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "0375BF9E-D04B-4E5B-9051-536806ECA44E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
                     matchCriteriaId: "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
                     matchCriteriaId: "012A6CF7-9104-4882-9C95-E6D4458AB778",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "F29CEE37-4044-4A3C-9685-C9C021FD346A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "5292764A-7D1C-4E04-86EF-809CB68EDD25",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
                     matchCriteriaId: "F84AE35F-D016-4B8F-8FE2-C2ACB200DFED",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "41D55481-C80E-4400-9C3D-9F6B1F7F13CE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4BF9829-F80E-4837-A420-39B291C4E17B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
                     matchCriteriaId: "D07F9539-CFBE-46F7-9F5E-93A68169797D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5AB80E7-0714-44ED-9671-12C877B36A1E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
                     matchCriteriaId: "10182B94-6831-461E-B0FC-9476EAB6EBEF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "961F8312-31B9-44E7-8858-EF8E2134F447",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
                     matchCriteriaId: "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
                     matchCriteriaId: "04081A51-E08F-4114-9276-584E836181D3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
                     matchCriteriaId: "62A46516-CEB7-48D4-879B-341963A1FA31",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6EF98FA-6DF9-4935-9639-143E08462BC4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "314C7763-A64D-4023-9F3F-9A821AE4151F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
                     matchCriteriaId: "5820D71D-FC93-45AA-BC58-A26A1A39C936",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC1C85DD-69CC-4AA8-B219-651D57FC3506",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "B53E377A-0296-4D7A-B97C-576B0026543D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "C98DED36-D4B5-48D6-964E-EEEE97936700",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD98C9E8-3EA6-4160-970D-37C389576516",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "9027A528-2588-4C06-810B-5BB313FE4323",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
                     matchCriteriaId: "7745ED34-D59D-49CC-B174-96BCA03B3374",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
                     matchCriteriaId: "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
                     matchCriteriaId: "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
                     matchCriteriaId: "93B96E01-3777-4C33-9225-577B469A6CE5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*",
                     matchCriteriaId: "65FC3CC1-CF4F-4A2D-A500-04395AFE8B47",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
                     matchCriteriaId: "D18B32E3-6B33-4E3D-879A-82E2F0BFC906",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
                     matchCriteriaId: "46E37204-FC9A-4397-AFA4-9CAC7A116D55",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*",
                     matchCriteriaId: "027200FC-8AD4-47E4-A404-490AE4F997EC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
                     matchCriteriaId: "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5750264-2990-4942-85F4-DB9746C5CA2B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
                     matchCriteriaId: "B9173AD6-6658-4267-AAA7-D50D0B657528",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
                     matchCriteriaId: "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "8FCB9440-F470-45D1-AAFA-01FB5D76B600",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F66ECFE-B631-47AE-995F-024A4E586A85",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
                     matchCriteriaId: "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E306B09C-CB48-4067-B60C-5F738555EEAC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD446C51-E713-4E46-8328-0A0477D140D2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
                     matchCriteriaId: "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "89369318-2E83-489F-B872-5F2E247BBF8F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B4D4659-A304-459F-8AB3-ED6D84B44C0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "B51FA707-8DB1-4596-9122-D4BFEF17F400",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
                     matchCriteriaId: "211CC9B2-6108-4C50-AB31-DC527C43053E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "128F95D7-E49F-4B36-8F47-823C0298449E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "E21B3881-37E9-4C00-9336-12C9C28D1B61",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
                     matchCriteriaId: "E54599DB-A85E-4EEA-9985-2CBF90E28A08",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
                     matchCriteriaId: "4046C325-7EDB-4C95-AA98-541BEC8F9E0F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B270A04-9961-4E99-806B-441CD674AFBD",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
                     matchCriteriaId: "1360069D-0358-4746-8C3F-44C2A40988D7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5DD2403-113B-4100-8BD4-90E1927E6648",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*",
                     matchCriteriaId: "A35FFA44-9A59-4C20-9D86-C40B68BD5F77",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "5A6B707B-4543-41F1-83DF-49A93BF56FB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
                     matchCriteriaId: "DC8F611B-D347-4A21-90E6-56CF4D8A35A3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*",
                     matchCriteriaId: "298C82F9-79A6-4DB7-8432-8B3A6DA39620",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4B4318C0-0FD0-46B3-8E23-94EC53A34A20",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16FC6220-78E1-44A6-A596-6368D3EF7CC4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCAEDE0A-E6F9-4727-8DC2-F47579220BE0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp2\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C02F9303-F9DF-4166-AB4B-8C26B9FAD109",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp3\\):-:*:*:*:*:*:*:*",
                     matchCriteriaId: "372CB4D6-BB22-4521-9C18-C0A663717168",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0EAE214D-8DD8-4DA3-872A-609E7CE6E606",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCF17101-9EF9-47BB-B966-0FA9B71AEEFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2F0C218-B0FF-4BEC-B76F-1F4BAA6D0960",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B37D793-0EE3-49CA-98B2-3E1F3D561A9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F5F6FA-9499-4232-A80A-494CE287A87A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58918BAA-7070-4901-B1C8-344E8A4DBEE9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08B9D533-FCF5-4B35-A0D2-2EA1E4A907AE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C809A939-105E-471E-A150-859015641989",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2C657B7-172E-4E85-8027-4B5563F2CE14",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B42926F-0841-4D40-BABE-852893C6020F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "381144D6-7CDE-46E6-ADE7-76372740F283",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7814FA61-CAF1-46DE-9D84-CEBE6480EA03",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EE4F60E-DF3D-4839-8731-7CF16DA8FF26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8EA5EEE3-A084-46B4-84C0-ADFD69800649",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "592F67D5-344B-49AF-A277-1089A40AC2FD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7434059A-25B8-4FAC-A756-6E571348B76E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB2A5355-BF40-437C-8683-A7A81DEE362C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "43F4B90E-3499-45D4-864D-18505E2149F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "858FEECF-CC69-4E68-8E8A-674643021964",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BE5FCCFF-E491-474F-9B86-AB51D8244582",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA8464F8-D6D2-4165-ADE8-B40F7D8556C2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "61007628-A81B-43E0-86DE-1F7DDAD9F1A7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "91B9F022-4C3D-493E-9418-E9CDDAFEC9B1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B39F250E-6A89-4537-BD31-1FB81734A9A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB4E3B69-DDE8-4EA2-8E63-D6EEF41083B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8904EAF5-25E7-4A6B-8117-1859F913B83B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A369CD35-1242-4556-A83D-BD69CC149CFA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "784A1499-1F33-493D-B433-EB2550C03C19",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59A990D6-B748-4AFD-B924-1D19680BD3DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CECFC88D-5480-46E4-BF74-E11A514A8BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E54D16A8-0407-41E3-9599-9A6F57E1AA75",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DF3818CC-8653-4A9E-A57B-950A15914D6B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7EDC790B-B42D-45DB-ACF5-A789F76C2BC4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2A6BC84-91F2-437D-9D2E-F8B3F5966767",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F331F13-5D05-4213-B442-D48D8E22287B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6E312F4-90DA-40E4-BCD1-92F41BEEEECF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CA32EA3F-946D-430D-B00F-939D828DD72C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D239A09C-34D2-4418-B538-03A1080B8479",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C84561E-DD99-4433-9EF2-083F7C300123",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B29871BE-CA7D-4108-B46A-CBD539C9A2B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "39CD9189-6524-4157-B90E-FF6A81DE3599",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CF1B702-643A-4AF2-B0AD-3C540CF85F2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "96269625-CB31-4850-872B-B2C1321B13B6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "426B68A6-3A41-43DB-846F-AEFBA62E221B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BDE086A-3FE5-46E3-BD66-23D0AE5089BE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA53775A-D3ED-4D34-8338-A384DBEB94E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE7D4522-D6BB-467F-AF5D-4D753A89D524",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C96215F-A300-4B4E-9D3A-C32E484BFC5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C680534-C663-40B0-A4AA-7F292EE60FE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BAF4F233-7B47-46ED-BDC5-A589BCFC0B39",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4A528EC0-4650-4787-BE52-A588E7E38A31",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "53898E96-03D6-43A2-AE05-46C62464BD26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "465917E5-8BF0-4BBB-85A0-DE8F516880C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9FA66D9-E465-406E-A95C-608A1BE34D74",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1456B204-A2A5-4790-A684-7F50D692EC9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD715BDD-7C74-4785-BEDF-75918F6FB37A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CD10664-94D0-48C0-92EF-E8EA66841245",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "071A47F9-FF35-4F2C-BF5D-897CAC8BC08A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E988448-36C9-47E0-9356-DA400EB824E3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9D067EF9-00DB-4979-B12E-55749059A083",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9FA300A-44B1-44EE-8111-C1296EB0B638",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8598A543-B30B-4BD4-9974-F432FFFDCDD7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "48DEBBAD-D28D-4784-BBD8-9FAD1710A919",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A5FC516-6B48-4D77-B26D-FA097AC91D1A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A7437E4-5C09-436C-AFBC-F6B6747A4339",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECBC0277-4990-4DE7-AD80-20E8A6F561D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6E7DAF69-662B-4999-A6AD-AA528B53EAF7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D28306B1-3DDE-4444-9784-522B3D2163EE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9257D187-1F2D-40F4-8C87-78978DB56C3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4AF8261-74E0-4F53-B82C-A7BA7559D7CB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25AE251E-E99F-4546-85B0-C57834B040B7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C62FFCB9-4253-459B-9298-C252DA9177DB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "991CBDFB-6836-4D1F-80A9-14EBCE3F855F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B4C0250-DA0D-4CEE-99F4-C211163C6653",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8D453BF6-AB9F-4D47-B4DF-C25C67358FFE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "005F5347-A5E6-4954-ACAB-E4DF29119724",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5C2A8413-DF92-4690-8BC1-A21001BDF76B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "882B8D8F-E154-45C3-BB47-5353167C9776",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A54B4EB4-EB41-4522-B7AB-C30F96099EA3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EAD7BE51-0BA6-4750-B274-A6E33D32B484",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44C3EF8E-DF88-46DC-8E06-B009F346D1D2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7E87F823-D924-4718-AD81-248A6C619531",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCAC93E0-F982-4E37-866E-43B7BC5AC82E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1FC866C9-BB98-4320-9FFA-F0960C560DA6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3AD7495-3DA2-4596-9620-CD36D7C561AC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E492F3F8-4188-41E4-9A84-5E30C4AC3378",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "718F2FDC-9EA4-4C4C-8821-B15E56AF8101",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC5CB558-BD42-4615-BC31-41CCF25DE5C9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E45BCCD0-65BB-431F-B448-221C1595CD92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F33BA722-0680-4074-8D03-41657F8CDCC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "295C46B4-5E9F-4DD8-861B-00BA43923306",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "431570C7-74A1-4F7E-8FD0-690AEF0F823B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5D22E15-E1E8-4115-A55F-5743CA9C5947",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F840171D-CA1C-4E25-BD41-6B871C47BB84",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7B240B20-CF48-4A72-9653-9D04D59C1391",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74CCD143-3D6E-4880-B275-ECF5B04238C6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D3784F-C572-4A6F-83B9-BCF64D339BC9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E09C466B-CE87-4A57-B40B-88C94BAAF36B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D58FF034-8E07-4518-A858-5F16F22217E5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "376AD386-373D-4B24-966F-D11F76C9020F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2280CAA3-03F6-4168-8E50-A6B7132A3B0E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E0C1174-C789-4547-9899-F7FCD0905F92",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EC366801-655A-403B-ACD9-3BB43802A3C5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF5463D0-A8D3-43EC-8CFF-F659A8C84436",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "05D4D7E4-B195-46D8-8A6B-6AA4B8357618",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "39600E51-4A21-4E5B-9FF9-E7C00AE86646",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E4D5A8-7E4A-44C5-81DC-84712781206D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B13D6D50-D0FA-4527-BED3-52560DDD5253",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "965BF315-D833-4711-97FC-512151113367",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04072C0F-78A2-4D10-87B2-52DC2537BA89",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD5C080E-D5C4-47B2-A46C-4EB3051C5221",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41CEBEE0-DA67-4EE5-9BCF-263843053A8F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FD262F58-C47F-439E-A9FF-D1C60120D306",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "35490BDE-DF21-495E-9F8A-7631FCB32A1F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0972076B-5C87-44B3-90EC-4C200B89318A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "74AED057-2458-4DE0-8D51-ABD766D07F68",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19538C03-5FB8-4401-8B21-489C629D7E7D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B26D7061-F471-4DF0-A892-ED132958B84A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "033ED443-80E7-4012-9825-07AAC0D44B96",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD3F3CC6-A349-47B1-B282-B6458683C191",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB24EF21-1C10-48A7-BC68-FFC842A28D12",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ED0625A2-BF14-4552-83D8-AEE0A04EA023",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "21AFDC0D-7629-424E-827B-C8A8767324C3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A263CFF2-A659-405B-90EA-51E49B25C6D3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CEFBD449-217D-4569-99F7-D56B853A3E07",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7ED668FC-D1A5-4175-A234-23760BA6E788",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D650C48-9241-42F7-87A9-20733329489A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ED16A65-9AFF-4825-95D1-162FBA0F566D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "82D345E7-8208-41AC-B11A-4425D29E98A1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E386D461-F1C1-4970-B056-D6119E74D449",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "99F3A466-F665-4132-ABC4-2DFC0A7E2B55",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B3395168-FF2E-4CB6-AABE-5E36DEB241CA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "226F985C-4669-4D0A-9DB4-CB1465B37B02",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B736A43-6F4E-40A9-84E4-D9E251489234",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E99CA124-7D86-463B-A31E-A7836B7493E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E014B028-8DD9-428C-B705-8F428F145932",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A6C44229-A842-49B2-AD3E-79C83DB63EBE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5306E847-C718-4C83-9C97-8AB498DC4A88",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "18287CEF-B574-4498-A256-567CA6E6CA7C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E9AAA2C-495E-4FD1-9050-264FDC25254B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5713043E-2535-4540-B3EF-41FAC40BECE9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "67701D77-8B03-446A-AE22-4B8CCCD6F029",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "831A2390-7170-4FC0-A95E-3DAB1791017D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F788CBC4-782F-4A43-AC80-4AEF1C43A22D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "493989DC-8F1B-45C9-AD11-38B97B958C9C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "737F22AB-C5A9-4A18-BA3D-38A222491397",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E5DCFD5-2B46-4D06-9E4C-B2325F440F02",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D5508320-8318-41A8-8026-4A61907C1CD7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AAD337D8-8C72-4025-A8C3-E63598DE7BDB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "176ACF88-6112-4179-8492-50C50577B300",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C19A801D-02D7-40B0-88E8-FE7BA8630E60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EA59279-3504-417D-9E86-E5886EE198BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E283C34-43AE-49A5-A72B-32DEA185ABD3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB3AF13-5324-42CD-8EDB-6F730BF46214",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "78706517-83F4-4D44-A6EC-B78ADCEABAC0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "25CE5302-0BA9-4155-A68B-3CD735F64A9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "405B9D5D-09E9-48D9-A164-04A6DCE41482",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_ess9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9A80AB4A-A121-4777-BD99-62D658A3DE22",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "86879AC0-890E-42F4-9561-6851F38FE0AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "19017B10-F630-42CD-ACD2-E817FEF0E7F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "04A41A34-58D2-4DBC-ABC9-20A62BC8A838",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:cbr-8:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB77D0EC-A448-4D97-8EB0-EA4956549A52",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BF8B0B49-2C99-410B-B011-5B821C5992FB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "44D19136-4ECB-437F-BA8A-E2FE35A39BF9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ess-3300-24t-con-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D4C98B90-69B3-4BDF-A569-4C102498BFAD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ess-3300-24t-con-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7646B0A1-FDF5-4A60-A451-E84CE355302E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ess-3300-24t-ncp-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FA889066-14A8-4D88-9EFF-582FE1E65108",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ess-3300-24t-ncp-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2A0C09AE-CD2A-486A-82D4-2F26AA6B6B95",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ess-3300-con-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEF81CC0-AEED-42DE-B423-8F4E118680BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ess-3300-con-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EDAAFDF1-7A3C-475F-AE82-B3194939D401",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ess-3300-ncp-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9566FC8C-0357-4780-976F-8A68E6A7D24A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ess-3300-ncp-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07503D21-965B-49F0-B8F2-B5ECD656F277",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:isrv:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA48CFE9-2791-40D2-9F33-763C97F7D988",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad en el soporte de Intercambio de Claves de Internet Versión 2 (IKEv2) para la funcionalidad AutoReconnect de Cisco IOS Software y Cisco IOS XE Software podría permitir a un atacante remoto autenticado agotar las direcciones IP libres del pool local asignado. Esta vulnerabilidad ocurre porque el código no libera la dirección IP asignada en determinadas condiciones de fallo. Un atacante podría explotar esta vulnerabilidad al intentar conectarse al dispositivo con un cliente que no sea AnyConnect. Una explotación con éxito podría permitir al atacante agotar las direcciones IP del pool local asignado, que impide a usuarios iniciar sesión y conlleva a una condición de denegación de servicio (DoS)",
      },
   ],
   id: "CVE-2021-1620",
   lastModified: "2024-11-21T05:44:45.400",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "LOW",
            cvssData: {
               accessComplexity: "MEDIUM",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 3.5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:M/Au:S/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 6.8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.7,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.1,
            impactScore: 4,
            source: "psirt@cisco.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.7,
               baseSeverity: "HIGH",
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.1,
            impactScore: 4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-09-23T03:15:13.030",
   references: [
      {
         source: "psirt@cisco.com",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr",
      },
   ],
   sourceIdentifier: "psirt@cisco.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-563",
            },
         ],
         source: "psirt@cisco.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-772",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2019-05-13 19:29
Modified
2024-11-21 04:37
Summary
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
Impacted products
Vendor Product Version
cisco asa_5500_firmware *
cisco asa_5506-x -
cisco asa_5506h-x -
cisco asa_5506w-x -
cisco asa_5508-x -
cisco asa_5516-x -
cisco firepower_2100_firmware *
cisco firepower_2110 -
cisco firepower_2120 -
cisco firepower_2130 -
cisco firepower_2140 -
cisco firepower_4000_firmware *
cisco firepower_4110 -
cisco firepower_4120 -
cisco firepower_4140 -
cisco firepower_4150 -
cisco firepower_9000_firmware *
cisco firepower_9300 -
cisco ons_15454_mstp_firmware *
cisco ons_15454_mstp -
cisco analog_voice_network_interface_modules_firmware *
cisco nim-2bri-nt\/te -
cisco nim-2fox -
cisco nim-2fxs -
cisco nim-2fxs\/4fxo -
cisco nim-2fxs\/4fxop -
cisco nim-2fxsp -
cisco nim-4bri-nt\/te -
cisco nim-4e\/m -
cisco nim-4fxo -
cisco nim-4fxs -
cisco nim-4fxsp -
cisco integrated_services_router_t1\/e1_voice_and_wan_network_interface_modules_firmware *
cisco nim-1ce1t1-pri -
cisco nim-1mft-t1\/e1 -
cisco nim-2ce1t1-pri -
cisco nim-2mft-t1\/e1 -
cisco nim-4mft-t1\/e1 -
cisco nim-8ce1t1-pri -
cisco nim-8mft-t1\/e1 -
cisco supervisor_a\+_firmware *
cisco n9k-sup-a\+ -
cisco supervisor_b\+_firmware *
cisco n9k-sup-b\+ -
cisco 15454-m-wse-k9_firmware *
cisco 15454-m-wse-k9 -
cisco ios_xe *
cisco cbr-8_converged_broadband_router -
cisco ios_xe *
cisco ios_xe *
cisco ios_xe *
cisco ios_xe *
cisco nim-1ge-cu-sfp -
cisco nim-2ge-cu-sfp -
cisco sm-x-pvdm-1000 -
cisco sm-x-pvdm-2000 -
cisco sm-x-pvdm-3000 -
cisco sm-x-pvdm-500 -
cisco ios *
cisco ios *
cisco ios *
cisco ios *
cisco 1120_connected_grid_router -
cisco 1240_connected_grid_router -
cisco industrial_security_appliances_3000_firmware *
cisco industrial_security_appliances_3000 -
cisco integrated_services_router_4200_firmware *
cisco 4221_integrated_services_router -
cisco integrated_services_router_4300_firmware *
cisco 4321_integrated_services_router -
cisco 4331_integrated_services_router -
cisco 4351_integrated_services_router -
cisco integrated_services_router_4400_firmware *
cisco 4431_integrated_services_router -
cisco 44461_integrated_services_router -
cisco 4451-x_integrated_services_router -
cisco ios *
cisco ios *
cisco ios *
cisco 809_industrial_integrated_services_routers -
cisco 829_industrial_integrated_services_routers -
cisco asr_1000_series_firmware *
cisco asr_1000-esp100 -
cisco asr_1000_series -
cisco asr1000-2t\+20x1ge -
cisco asr1000-6tge -
cisco asr1000-esp200 -
cisco asr1000-mip100 -
cisco asr1000-rp3 -
cisco asr_1001_firmware 16.0.0
cisco asr_1001-hx -
cisco asr_1001-x -
cisco asr_1002-hx -
cisco ios_xe *
cisco a900-rsp2a-128 -
cisco a900-rsp2a-64 -
cisco a900-rsp3c-200 -
cisco a900-rsp3c-400\/w -
cisco asr-920-10sz-pd -
cisco asr-920-12cz-a -
cisco asr-920-12cz-d -
cisco asr-920-12sz-a -
cisco asr-920-12sz-d -
cisco asr-920-12sz-im-cc -
cisco asr-920-24sz-m -
cisco asr-920-24tz-im -
cisco asr-920-24tz-m -
cisco asr-920-4sz-a -
cisco asr-920-4sz-d -
cisco c9300-24p -
cisco c9300-24t -
cisco c9300-24u -
cisco c9300-24ux -
cisco c9300-48p -
cisco c9300-48t -
cisco c9300-48u -
cisco c9300-48un -
cisco c9300-48uxm -
cisco catalyst_9600_supervisor_engine-1 -
cisco cbr-ccap-lc-40g-r -
cisco cbr-lc-8d31-16u31 -
cisco ios_xr 7.0.1
cisco a99-16x100ge-x-se -
cisco a99-32x100ge-cm -
cisco a99-32x100ge-tr -
cisco a99-rp3-se -
cisco a99-rp3-tr -
cisco a9k-16x100ge-cm -
cisco a9k-16x100ge-tr -
cisco a9k-rsp5-se -
cisco a9k-rsp5-tr -
cisco network_convergence_system_1002 -
cisco ios_xe *
cisco c6800-16p10g-xl -
cisco c6800-32p10g-xl -
cisco c6800-8p10g-xl -
cisco c6800-8p40g-xl -
cisco c6800-sup6t-xl -
cisco c6816-x-le -
cisco c6824-x-le-40g -
cisco c6832-x-le -
cisco c6840-x-le-40g -
cisco ios_xe *
cisco ios_xe *
cisco c9500-12q -
cisco c9500-16x -
cisco c9500-24q -
cisco c9500-24y4c -
cisco c9500-32c -
cisco c9500-32qc -
cisco c9500-40x -
cisco c9500-48y4c -
cisco catalyst_9800-40_wireless_controller_firmware -
cisco catalyst_9800-40_wireless_controller -
cisco catalyst_9800-80_wireless_controller_firmware -
cisco catalyst_9800-80_wireless_controller -
cisco ic3000-k9_firmware *
cisco ic3000-k9 -
cisco nx-os *
cisco ds-x9334-k9 -
cisco ncs2k-mr-mxp-k9_firmware *
cisco ncs2k-mr-mxp-k9 -
cisco ios_xr 7.1.1
cisco nc55-24h12f-se -
cisco nc55-36x100g-a-se -
cisco nc55-36x100g-s -
cisco nc55-5504-fc -
cisco nc55-5516-fc -
cisco nc55-6x200-dwdm-s -
cisco nc55-mod-a-s -
cisco ncs-5501 -
cisco ncs-5501-se -
cisco ncs-5502 -
cisco ncs-5502-se -
cisco ncs-55a1-24h -
cisco ncs-55a1-36h-s -
cisco ncs-55a1-36h-se -
cisco ncs-55a2-mod-hd-s -
cisco ncs-55a2-mod-hx-s -
cisco ncs-55a2-mod-s -
cisco ncs-55a2-mod-se-h-s -
cisco ncs-55a2-mod-se-s -
cisco network_convergence_system_5001 -
cisco network_convergence_system_5002 -
cisco nx-os *
cisco n3k-c31108pc-v -
cisco n3k-c31108tc-v -
cisco n3k-c3132c-z -
cisco n3k-c3264c-e -
cisco n9k-c92300yc -
cisco n9k-c93108tc-ex -
cisco n9k-c93108tc-fx -
cisco n9k-c93180lc-ex -
cisco n9k-c93180yc-ex -
cisco n9k-c93180yc-fx -
cisco n9k-c93240yc-fx2 -
cisco n9k-c9348gc-fxp -
cisco nx-os *
cisco ds-x9648-1536k9 -
cisco n3k-c3264c-e -
cisco n77-m312cq-26l -
cisco n77-m348xp-23l -
cisco n77-sup3e -
cisco n7k-m324fq-25l -
cisco n7k-m348xp-25l -
cisco sm-x-1t3\/e3_firmware -
cisco sm-x-1t3\/e3 -
cisco encs_5100_firmware -
cisco encs_5100 -
cisco encs_5400_firmware -
cisco encs_5400 -



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "524E28A1-ABD9-416B-804C-EFFD7F822DE5",
                     versionEndExcluding: "1.1.15",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "763B801D-CA1E-4C56-8B06-3373EA307C7E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "30AC6907-3091-409F-967D-64A82A0C5A8C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D11AF728-8EB0-45EB-A7DD-F2D52B3BB7B8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "92AE506A-E710-465B-B795-470FDE0E0ECA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1E07AF10-FFB2-4AC7-BBE7-199C3EFED81F",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "32B7016C-C909-4F30-A80E-E30E9C2FB607",
                     versionEndExcluding: "2.6.1.134",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "52D96810-5F79-4A83-B8CA-D015790FCF72",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16FE2945-4975-4003-AE48-7E134E167A7F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "976901BF-C52C-4F81-956A-711AF8A60140",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B8DB36E-D0AC-4FFC-8FDB-C5520689013A",
                     versionEndExcluding: "1.0.18",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "38AE6DC0-2B03-4D36-9856-42530312CC46",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3DB2822B-B752-4CD9-A178-934957E306B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "65378F3A-777C-4AE2-87FB-1E7402F9EA1B",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E924AE61-94D5-4A68-A586-CA7119487F67",
                     versionEndExcluding: "1.0.18",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "07DAFDDA-718B-4B69-A524-B0CEB80FE960",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "4F8A7F11-B920-4C5B-B3CA-D29740FFE891",
                     versionEndExcluding: "11.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BEBE1DDE-6C69-45EC-A666-D9596E8721DA",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*",
                     matchCriteriaId: "00BCB49E-E2D2-4374-8D48-A287FC538F4A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "637D7CA3-89CD-418A-BF87-0935A7805173",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CBE2B16-B9AD-4ED2-AE18-7087C478FEEC",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D94B415B-08E2-4845-BD11-7EBCD08215E0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "784ECC2E-F4AC-4430-9F33-9B1DBD89692F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8A34FAE4-7B2A-47BF-AB0A-5FAF8E8920CE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3FADBF85-52F4-468C-A44C-5107484757EA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90E418C4-F91B-4E0D-B1DC-2B099D991F80",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E22A4B07-04DF-4AF2-B2A9-E4430C4F3A64",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DFDCD640-E1BB-48F8-BEB4-85AAF7099FA2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "893147FC-1AD0-441C-B031-6C432ED2FFD8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE30FCF9-DFF6-419C-8DCA-0B695E3FADE7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*",
                     matchCriteriaId: "239EC4DE-5E2C-44D7-9C32-BFCD854670AC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2956624-92FC-43D7-A038-15071A90E0B4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "988125C4-DB88-438F-8F6D-0992424081A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD9B34B9-78EC-49AE-B342-F2BAD63CD50C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5D258F96-93A5-455E-9542-2C95B3D31455",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B443FC34-767F-45B4-8516-A1A8B6C8D917",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08C3403A-3943-4A69-A536-3FA6DEDFF21B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7259F6BC-BA31-47E4-BFA6-647068A946CD",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
                     matchCriteriaId: "3F825D9C-25C6-4F76-A7EE-F61A548A0CE1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "360B9A25-5272-487A-AF1A-CE2FDFD6F23C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*",
                     matchCriteriaId: "77C59A0F-F256-42C3-A3E1-71F02614F55A",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3ADE8708-95D4-4D30-85ED-BE870410F3B6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7F99FC1A-2738-468B-BD01-4F715A1B7809",
                     versionEndExcluding: "11.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "90242967-37AB-4124-87DE-D826A3895BE7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB99D062-EE0C-4695-AA4D-2DCE3E2B15AF",
                     versionEndExcluding: "16.12.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D6CCBE67-E509-43EC-9AFB-8A9B6A115126",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "39C9F8C2-9E34-4027-9112-42AEC0B84F7C",
                     versionEndExcluding: "16.3.9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "76843179-3569-4556-9F4C-6543B8A8E1DE",
                     versionEndExcluding: "16.6.7",
                     versionStartIncluding: "16.4.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B526102-9DDC-4E23-B582-DEF7EA35E42C",
                     versionEndExcluding: "16.9.4",
                     versionStartIncluding: "16.7.0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "F50DDAE4-2C87-4B8B-9BCB-2FD32A6976D6",
                     versionEndExcluding: "16.12.1",
                     versionStartIncluding: "16.10.0",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C56A1D02-3061-40C5-AD87-0BEA869838F4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F98C767-8E9F-4B01-A09E-359A496B2B3A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0FCAA286-6B36-4EB7-9AE5-CA082D125E78",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F6B1C2CF-0EF1-428F-8FB8-D45E4C6CB340",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "450EA21E-68E0-4617-85A9-9C39B96E12ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "17B65497-2EAC-4B9E-9D05-58A0B6D1F399",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "35726753-BAA4-479F-AF9C-F4D012881F83",
                     versionEndExcluding: "15.6\\(3\\)m7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "7A3FBAE1-F786-4799-AF70-6E7B5DC19BB9",
                     versionEndIncluding: "15.7\\(3\\)m5",
                     versionStartIncluding: "15.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "72240B45-0D8E-4EA6-8208-068BF6EF8B30",
                     versionEndExcluding: "15.8\\(3\\)m3",
                     versionStartIncluding: "15.8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "B7F56D01-F647-452D-A564-4198A893BC70",
                     versionEndExcluding: "15.9\\(3\\)m",
                     versionStartIncluding: "15.9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6835F8AD-B55D-4B57-B3B5-0095E309B2B3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "83AA5C75-B959-4167-906C-BE9C84C7E676",
                     versionEndExcluding: "1.0.05",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6FBBA8E7-14B2-4869-8ED4-72F120E547FC",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "CB084F19-E475-41FA-A72F-23D4D6913523",
                     versionEndExcluding: "1.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C49E8AE0-745B-459C-AAD9-D41690D48DDE",
                     versionEndExcluding: "1.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC5D8FF8-60F8-4F89-A488-F815D0FB00E1",
                     versionEndExcluding: "1.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C3D17D-DD95-49CA-918A-A0F5289B0C3D",
                     versionEndExcluding: "15.6\\(3\\)m6b",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "DA254534-247F-47BA-B146-0E3B7E9F9269",
                     versionEndIncluding: "15.7\\(3\\)m4b",
                     versionStartIncluding: "15.7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0F05F3A-A38F-4922-AE54-BE1BC64C4B7C",
                     versionEndExcluding: "15.8\\(3\\)m2a",
                     versionStartIncluding: "15.8",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C996F3B-0333-4B9A-B3E7-F50E64B0AAB3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F0D05CC9-8D04-4DE0-A854-375192B4D46C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "64C3BBBB-4349-4D2B-9944-84BE03407650",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "76B7C13F-46C5-460A-A6C9-3837A28A0CE2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "77D24BB4-6357-4BFC-A4CB-B33ECDEB3BEE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1B1F849A-05BA-4CA2-96AA-F8DFD5E725A5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB060D83-2924-4D1D-9FEE-F8087FA8976D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8CF4D0E5-FF09-4919-B603-B42DB535386C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C36989-4353-4B81-8B0F-FC6322C1C179",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "A267A86B-144D-46C3-9F63-95606106A5B1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "C807F789-3038-42C3-B5EB-6CD628EBF718",
                     versionEndExcluding: "16.2.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DED2353D-A508-4764-975F-57F9DACD91FA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9EBA765C-B6F0-4D4D-8933-06E655084AF4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC6F34E1-7DE4-459B-AF41-D973201ADC49",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8DAC3AF-FEFC-4B14-A7BE-7008E65FD012",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7FCA2DB2-AE09-4A99-90C9-60AE0CD9A035",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "11B83BED-5A49-4CF0-9827-AA291D01F60E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2C1E8937-51D9-43E6-876E-5D39AD3D32C4",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2CA7AE63-99B9-4F28-8670-639A9B31E494",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E858B4AB-49B1-4F1C-8722-6E6911194924",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "577D1BF2-5180-4301-941C-3C0ADDD23AA6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9FE70CCD-6062-45D8-8566-7C9E237E030F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EA3A897-ED4E-417F-BA6C-C1A825A210F6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "375F9E12-A61B-4FD3-AE07-D4E686EB112A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D724F932-4548-429D-8CAA-E82C3435A194",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0BCC94C3-9EEF-4600-BE82-8AEDEB0F1446",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "16088337-C057-4271-B5C7-74FE1573B0F0",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A69B8AFD-17F5-4809-BDB9-3337BA52BC58",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6A628A7B-FE58-4881-B705-C3BCBED6F201",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0A9C769E-ED9C-4F06-928D-CC7FFBA54EC7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5B19A31-99E3-4141-9FE8-7A5FD16FAE5C",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DB1DFCD7-F14A-4530-8E36-55FE0EE1E7C7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "84C89BB9-D62D-4E36-8BFD-D583F383120D",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "88262B7E-8C2F-49FE-9F58-8A1C78285A93",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C6109DBC-5489-4FF9-B940-E174126488AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5EA59279-3504-417D-9E86-E5886EE198BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C44B33A5-DB73-4A3B-AA5B-97B8493AD28B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "CAB82552-DD9D-45C9-8296-B4C8D510FFA1",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "82AF763B-9299-4EDC-B42D-B83736839CA1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C4EA89F6-14B5-4EC7-BAEB-E783FF1982AB",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E5BF29D2-7C65-4724-B6AE-249BB22725CE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D55DC09B-CF82-4461-8886-BE90451BFF9E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F393681D-7EC1-46D5-BAFB-786528E259B9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ABE8CE5B-09CF-4138-9495-7223FFA64443",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15AEC57E-7851-4C8D-AB02-A932C3929F26",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B14DB778-9B07-4AFF-8BF3-4631B23501BD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "326F9936-57E7-4E8F-9C51-093788454A3A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "884F1D0A-8A6F-45E4-9AC7-A8603AB8AE4E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7D54F012-3136-4CA8-B119-FD7446EC96C6",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0514874D-C8F0-496E-9B04-FA699B339EEE",
                     versionEndExcluding: "15.5\\(1\\)sy4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F508C81E-D31B-44BA-82C8-FEDA00324B8B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "05A9E0CA-BB70-4F74-BAD6-BE80669D1699",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4CAE1989-0E75-414E-BCB3-E0057F1492E7",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B1A1BA05-615E-4304-992D-6EEA176D852F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D883A807-6909-4087-892B-1E505521EA7A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "DE2D76C8-552A-44C2-9C30-0CF31F6BC719",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "649A1287-A03D-48B8-ADFA-26F175366C91",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8776111D-894D-4EEB-8ADD-A9AC26AE30D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "975D2EC3-3499-48FD-87F2-4BAD1CDB0E4C",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "27ACCA11-D39B-468E-9C3C-BBF110ED3581",
                     versionEndExcluding: "16.9.4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "5BB36C23-9303-4E3D-8C4A-B2E2150CF3FE",
                     versionEndExcluding: "16.12.1",
                     versionStartIncluding: "16.10",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B37D793-0EE3-49CA-98B2-3E1F3D561A9F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "03F5F6FA-9499-4232-A80A-494CE287A87A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "58918BAA-7070-4901-B1C8-344E8A4DBEE9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "08B9D533-FCF5-4B35-A0D2-2EA1E4A907AE",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C809A939-105E-471E-A150-859015641989",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B2C657B7-172E-4E85-8027-4B5563F2CE14",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "0B42926F-0841-4D40-BABE-852893C6020F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "381144D6-7CDE-46E6-ADE7-76372740F283",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "902D1451-9E2E-4BC3-8B61-D87C142F4485",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E283C34-43AE-49A5-A72B-32DEA185ABD3",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "59CD23DF-9B9D-459F-A3BF-F2D53FBDAF71",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADB3AF13-5324-42CD-8EDB-6F730BF46214",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "13174CD9-8564-4041-93EC-8E8D7F4F3443",
                     versionEndExcluding: "1.0.2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B443B2C3-E3C1-4ADF-BF9B-164D00318B08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053",
                     versionEndExcluding: "8.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "ECE54217-EF6D-4191-9267-113041B14A08",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "6DE58C19-66CD-45DD-BF5C-C333A30AA096",
                     versionEndExcluding: "11.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6EFF3999-1FF6-42C0-BE62-3FA227297264",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "966F7DF8-1F20-4A74-B633-8B5AEE63C193",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "46EA0E17-C399-4DA0-A550-F5469CC82F3F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "41C4BF85-7077-463B-8E52-F67949849123",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F9102353-A21A-41C2-AA0B-9B00F66B693E",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1536A363-E423-42DD-928B-FC6E91264371",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AB4F5CA4-BBD2-4DC9-8F99-9CC1B2A90BF2",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A2442B13-F163-4219-AED9-7FA4CCD1A8D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7617BA24-6474-49CF-B78D-0056D3F8385B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C3DCE7D6-0E78-4CF3-BF7A-6A4945ADD4F1",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "344675F6-9045-492D-9577-E0CE333AD6E9",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "BC7F2221-B5BE-408C-BA84-9776469EE2D5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D8D61548-61B4-4B53-8574-9DB92B00A627",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "4FF08FAF-67DD-4361-947A-40D5938DB8BA",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "1CE2AD36-5D52-4489-AAC1-A7AC1B3D2581",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "A95FEA95-703B-44E0-A7CA-9E38B2EB1980",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "2D37BF94-9D5F-4A88-8115-3A88FF144845",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "C33F0D81-1314-440B-9FC2-56D76CA4CD79",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E50806D-115D-4903-A5B2-62654FFDD9F5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "15AE071E-0CEF-4305-A92D-9F4C324BD4ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3E007368-04AF-49C7-892F-ED2BB1E4EA61",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9DBEF775-EC98-4391-BAD2-61870A7DEE88",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "68A586A3-0291-4BA3-9211-6EE0BBB7F39C",
                     versionEndExcluding: "9.3\\(2\\)",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "5AEB8547-3FA8-42F5-8106-57B0F994BEC5",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4D2069C-23A2-4113-B674-024D36E40BDD",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "572F9105-9B6C-4460-8B49-14812AC3DC28",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "FE8EFEE8-FC8D-480C-917E-24C3B8D56E29",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "7482F9FB-CA6A-4CA2-B6FB-FD0DCDF603ED",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6487A95B-0D04-4ABA-B491-8A935694AFD3",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F2E84307-41BC-4F85-BC9A-FF02178765F8",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "55A31452-5B60-4273-BA38-8FA684DED953",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "3C3FCA39-927B-4C89-A58B-E6859ED8176A",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7B464B3-DE25-4980-ABC3-10D7C79C12E6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "214472EB-424C-48B7-8EF3-7B679A5042BF",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
                     matchCriteriaId: "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053",
                     versionEndExcluding: "8.4.1",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "57E3CF0C-5AD0-4A30-9335-4945CBC04A60",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AFA9BC1-3386-4AAE-A1B6-D81761D3EA9B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "8E6AC35C-29B2-42C7-862D-D9AC3461D8D6",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "F33AB95C-62FC-48EC-84AB-5EFA5C061F3B",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "B6BF05BA-E0CC-45D6-963F-27F0BD7B3C4F",
                     vulnerable: false,
                  },
                  {
                     criteria: "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "D409BDF3-9F35-4D94-9DF0-7B58A519A005",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B12A01-8EF8-4DDE-9A40-51A9BC7D42AC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "696AFE49-10E1-4C56-93D3-F4118B3E01AB",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "AD6741CC-EEA4-4DC8-A21B-DB84B861316B",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "678F3A32-372A-441E-8115-95181FBAF628",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF426F3E-4474-43C7-84F5-EF61957E5004",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*",
                     matchCriteriaId: "01AE8153-6C23-46AB-BEAA-A6F27FDFEED7",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.",
      },
      {
         lang: "es",
         value: "Una vulnerabilidad en la lógica que maneja el control de acceso de uno de los componentes de hardware en la implementación Secure Boot de propiedad de Cisco, podría permitir que un atacante local autenticado escriba una imagen de firmware modificada en el componente. Esta vulnerabilidad afecta a varios productos de Cisco que admiten la funcionalidad de Secure Boot basada en hardware. La vulnerabilidad se genera por una comprobación incorrecta en el área de código que administra las actualizaciones en las instalaciones de Field Programmable Gate Array (FPGA) parte de la implementación del hardware Secure Boot. Un atacante con privilegios elevados y acceso al sistema operativo subyacente que se ejecuta en el dispositivo afectado podría explotar esta vulnerabilidad al escribir una imagen de firmware modificada en el FPGA. Una explotación exitosa podría hacer que el dispositivo se vuelva inutilizable (y requiera un reemplazo de hardware) o permitir la manipulación del proceso de comprobación de Secure Boot, que en algunas circunstancias puede permitir al atacante instalar y arrancar una imagen de software malicioso. Un atacante deberá cumplir todas las condiciones siguientes para intentar explotar esta vulnerabilidad: Tener acceso administrativo privilegiado al dispositivo. Poder acceder al sistema operativo subyacente que se ejecuta en el dispositivo; Esto se puede lograr mediante el uso de un mecanismo documentado de soporte o mediante la explotación de otra vulnerabilidad que proporcionaría a un atacante con dicho acceso. Desarrollar o tener acceso a un exploit específico de la plataforma. Un atacante que busque explotar esta vulnerabilidad en múltiples plataformas afectadas necesitará investigar cada una de esas plataformas y después desarrollar una vulnerabilidad específica de la plataforma. Si bien el proceso de investigación se podría realizar en diferentes plataformas, es poco probable que una vulnerabilidad desarrollada para una plataforma de hardware determinada opere en una plataforma de hardware diferente.",
      },
   ],
   id: "CVE-2019-1649",
   lastModified: "2024-11-21T04:37:00.627",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "LOCAL",
               authentication: "NONE",
               availabilityImpact: "COMPLETE",
               baseScore: 7.2,
               confidentialityImpact: "COMPLETE",
               integrityImpact: "COMPLETE",
               vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
               version: "2.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 10,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "psirt@cisco.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "LOCAL",
               availabilityImpact: "HIGH",
               baseScore: 6.7,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 0.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2019-05-13T19:29:01.520",
   references: [
      {
         source: "psirt@cisco.com",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/108350",
      },
      {
         source: "psirt@cisco.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot",
      },
      {
         source: "psirt@cisco.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/400865",
      },
      {
         source: "psirt@cisco.com",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://www.securityfocus.com/bid/108350",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.kb.cert.org/vuls/id/400865",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Third Party Advisory",
            "US Government Resource",
         ],
         url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
      },
   ],
   sourceIdentifier: "psirt@cisco.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-284",
            },
         ],
         source: "psirt@cisco.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-667",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2019-1649
Vulnerability from cvelistv5
Published
2019-05-13 19:10
Modified
2024-11-20 17:23
Summary
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
Impacted products
Vendor Product Version
Cisco Cisco Routers Version: unspecified   < 16.12.1
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T18:20:28.350Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20190513 Cisco Secure Boot Hardware Tampering Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot",
               },
               {
                  name: "VU#400865",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_CERT-VN",
                     "x_transferred",
                  ],
                  url: "https://www.kb.cert.org/vuls/id/400865",
               },
               {
                  name: "108350",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/108350",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2019-1649",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-20T16:55:08.575056Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-20T17:23:01.830Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Cisco Routers",
               vendor: "Cisco",
               versions: [
                  {
                     lessThan: "16.12.1",
                     status: "affected",
                     version: "unspecified",
                     versionType: "custom",
                  },
               ],
            },
         ],
         datePublic: "2019-05-13T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-284",
                     description: "CWE-284",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-03-26T02:22:29",
            orgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
            shortName: "cisco",
         },
         references: [
            {
               name: "20190513 Cisco Secure Boot Hardware Tampering Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot",
            },
            {
               name: "VU#400865",
               tags: [
                  "third-party-advisory",
                  "x_refsource_CERT-VN",
               ],
               url: "https://www.kb.cert.org/vuls/id/400865",
            },
            {
               name: "108350",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/108350",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
            },
         ],
         source: {
            advisory: "cisco-sa-20190513-secureboot",
            defect: [
               [
                  "CSCvn77141",
                  "CSCvn77142",
                  "CSCvn77143",
                  "CSCvn77147",
                  "CSCvn77150",
                  "CSCvn77151",
                  "CSCvn77152",
                  "CSCvn77153",
                  "CSCvn77154",
                  "CSCvn77155",
                  "CSCvn77156",
                  "CSCvn77158",
                  "CSCvn77159",
                  "CSCvn77160",
                  "CSCvn77162",
                  "CSCvn77166",
                  "CSCvn77167",
                  "CSCvn77168",
                  "CSCvn77169",
                  "CSCvn77170",
                  "CSCvn77171",
                  "CSCvn77172",
                  "CSCvn77175",
                  "CSCvn77178",
                  "CSCvn77180",
                  "CSCvn77181",
                  "CSCvn77182",
                  "CSCvn77183",
                  "CSCvn77184",
                  "CSCvn77185",
                  "CSCvn77191",
                  "CSCvn77201",
                  "CSCvn77202",
                  "CSCvn77205",
                  "CSCvn77207",
                  "CSCvn77209",
                  "CSCvn77212",
                  "CSCvn77219",
                  "CSCvn77220",
                  "CSCvn77222",
                  "CSCvn77245",
                  "CSCvn77246",
                  "CSCvn77248",
                  "CSCvn77249",
                  "CSCvn89137",
                  "CSCvn89138",
                  "CSCvn89140",
                  "CSCvn89143",
                  "CSCvn89144",
                  "CSCvn89145",
                  "CSCvn89146",
                  "CSCvn89150",
                  "CSCvp42792",
               ],
            ],
            discovery: "INTERNAL",
         },
         title: "Cisco Secure Boot Hardware Tampering Vulnerability",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@cisco.com",
               DATE_PUBLIC: "2019-05-13T17:30:00-0700",
               ID: "CVE-2019-1649",
               STATE: "PUBLIC",
               TITLE: "Cisco Secure Boot Hardware Tampering Vulnerability",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Cisco Routers",
                                 version: {
                                    version_data: [
                                       {
                                          affected: "<",
                                          version_affected: "<",
                                          version_value: "16.12.1",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Cisco",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019.",
               },
            ],
            impact: {
               cvss: {
                  baseScore: "6.7",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-284",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20190513 Cisco Secure Boot Hardware Tampering Vulnerability",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot",
                  },
                  {
                     name: "VU#400865",
                     refsource: "CERT-VN",
                     url: "https://www.kb.cert.org/vuls/id/400865",
                  },
                  {
                     name: "108350",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/108350",
                  },
                  {
                     name: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
                     refsource: "MISC",
                     url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03",
                  },
               ],
            },
            source: {
               advisory: "cisco-sa-20190513-secureboot",
               defect: [
                  [
                     "CSCvn77141",
                     "CSCvn77142",
                     "CSCvn77143",
                     "CSCvn77147",
                     "CSCvn77150",
                     "CSCvn77151",
                     "CSCvn77152",
                     "CSCvn77153",
                     "CSCvn77154",
                     "CSCvn77155",
                     "CSCvn77156",
                     "CSCvn77158",
                     "CSCvn77159",
                     "CSCvn77160",
                     "CSCvn77162",
                     "CSCvn77166",
                     "CSCvn77167",
                     "CSCvn77168",
                     "CSCvn77169",
                     "CSCvn77170",
                     "CSCvn77171",
                     "CSCvn77172",
                     "CSCvn77175",
                     "CSCvn77178",
                     "CSCvn77180",
                     "CSCvn77181",
                     "CSCvn77182",
                     "CSCvn77183",
                     "CSCvn77184",
                     "CSCvn77185",
                     "CSCvn77191",
                     "CSCvn77201",
                     "CSCvn77202",
                     "CSCvn77205",
                     "CSCvn77207",
                     "CSCvn77209",
                     "CSCvn77212",
                     "CSCvn77219",
                     "CSCvn77220",
                     "CSCvn77222",
                     "CSCvn77245",
                     "CSCvn77246",
                     "CSCvn77248",
                     "CSCvn77249",
                     "CSCvn89137",
                     "CSCvn89138",
                     "CSCvn89140",
                     "CSCvn89143",
                     "CSCvn89144",
                     "CSCvn89145",
                     "CSCvn89146",
                     "CSCvn89150",
                     "CSCvp42792",
                  ],
               ],
               discovery: "INTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
      assignerShortName: "cisco",
      cveId: "CVE-2019-1649",
      datePublished: "2019-05-13T19:10:14.147871Z",
      dateReserved: "2018-12-06T00:00:00",
      dateUpdated: "2024-11-20T17:23:01.830Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2021-1620
Vulnerability from cvelistv5
Published
2021-09-23 02:31
Modified
2024-11-07 21:51
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.
Impacted products
Vendor Product Version
Cisco Cisco IOS Version: n/a
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T16:18:10.394Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_CISCO",
                     "x_transferred",
                  ],
                  url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2021-1620",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-11-07T21:40:25.956619Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-11-07T21:51:30.491Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               product: "Cisco IOS",
               vendor: "Cisco",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2021-09-22T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.",
            },
         ],
         exploits: [
            {
               lang: "en",
               value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-563",
                     description: "CWE-563",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-09-23T02:31:01",
            orgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
            shortName: "cisco",
         },
         references: [
            {
               name: "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
               tags: [
                  "vendor-advisory",
                  "x_refsource_CISCO",
               ],
               url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr",
            },
         ],
         source: {
            advisory: "cisco-sa-ikev2-ebFrwMPr",
            defect: [
               [
                  "CSCvw25564",
               ],
            ],
            discovery: "INTERNAL",
         },
         title: "Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "psirt@cisco.com",
               DATE_PUBLIC: "2021-09-22T16:00:00",
               ID: "CVE-2021-1620",
               STATE: "PUBLIC",
               TITLE: "Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "Cisco IOS",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Cisco",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.",
                  },
               ],
            },
            exploit: [
               {
                  lang: "en",
                  value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
               },
            ],
            impact: {
               cvss: {
                  baseScore: "7.7",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-563",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability",
                     refsource: "CISCO",
                     url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr",
                  },
               ],
            },
            source: {
               advisory: "cisco-sa-ikev2-ebFrwMPr",
               defect: [
                  [
                     "CSCvw25564",
                  ],
               ],
               discovery: "INTERNAL",
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633",
      assignerShortName: "cisco",
      cveId: "CVE-2021-1620",
      datePublished: "2021-09-23T02:31:01.213819Z",
      dateReserved: "2020-11-13T00:00:00",
      dateUpdated: "2024-11-07T21:51:30.491Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}