Vulnerabilites related to cisco - c9500-40x
Vulnerability from fkie_nvd
Published
2021-09-23 03:15
Modified
2024-11-21 05:44
Severity ?
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*", matchCriteriaId: "BEAFD220-48D7-46EE-8537-A69C5F8D0F2D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr1:*:*:*:*:*:*:*", matchCriteriaId: "806D2FF1-EADA-44C8-94BD-6BC18D138150", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr2:*:*:*:*:*:*:*", matchCriteriaId: "643D7544-34DA-46D9-831F-421ED00F3579", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svr3:*:*:*:*:*:*:*", matchCriteriaId: "F6354447-07DF-4913-82D9-BF249663499F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs:*:*:*:*:*:*:*", matchCriteriaId: "46EC35AA-4BD3-4FBB-878D-3313D37D9AAB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svs1:*:*:*:*:*:*:*", matchCriteriaId: "5DAC36DC-F4C5-4C4C-9C27-20FD45AA4A85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt1:*:*:*:*:*:*:*", matchCriteriaId: "66BD52DF-E396-415D-B46E-A8814579A01F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svt2:*:*:*:*:*:*:*", matchCriteriaId: "72A7CF9A-E1A7-4C1B-9015-5BC577805D9C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.1\\(3\\)svu1:*:*:*:*:*:*:*", matchCriteriaId: "6C9711B4-23FF-4C41-86F5-94D5E941453B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*", matchCriteriaId: "9678A6F2-0624-4A8A-9991-9DADCDDB2687", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*", matchCriteriaId: "D9F6D655-D3A3-4BEE-9DEF-19ADD41D1663", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy4:*:*:*:*:*:*:*", matchCriteriaId: "8AC0B809-72AD-413F-BE84-73FE2DB33950", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy5:*:*:*:*:*:*:*", matchCriteriaId: "5F2834B6-AA9D-4FDC-A228-CED66C799849", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy6:*:*:*:*:*:*:*", matchCriteriaId: "B3426024-7199-4B7B-90CB-CE83FD2E0878", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy7:*:*:*:*:*:*:*", matchCriteriaId: "BF163F6F-1A6D-4AA9-AAC2-52249BB28421", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy8:*:*:*:*:*:*:*", matchCriteriaId: "CD250CC8-B26A-424E-A737-97F2A7E7C4CD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", matchCriteriaId: "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "80114F8D-320D-41FF-ADD3-729E250A8CD4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", matchCriteriaId: "879C4495-3B26-4370-8708-16F5002E37CE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", matchCriteriaId: "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*", matchCriteriaId: "6F5A55B3-49E4-4C48-B942-4816504BAA30", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*", matchCriteriaId: "B5BDAB63-EA0E-486D-B146-7E0060F70066", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*", matchCriteriaId: "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*", matchCriteriaId: "EB704746-C27B-4C6B-948C-B8C0A3F40782", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*", matchCriteriaId: "F354F8F6-70D3-43EE-BF08-DFB87E83E847", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*", matchCriteriaId: "62F908B0-7ECE-40F8-8549-29BD1A070606", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*", matchCriteriaId: "378E67DD-779C-4852-BF29-38C2DFFB1BBB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*", matchCriteriaId: "9033ACC7-1CCC-44E7-8275-73499C0E6E87", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10b:*:*:*:*:*:*:*", matchCriteriaId: "2436CB44-A933-4885-8BD2-E2AAEE7CC1AA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*", matchCriteriaId: "BBF92BEC-AA46-46DF-8C1E-956F3E506E69", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*", matchCriteriaId: "8C226FE9-61A0-4873-B277-1B8ADB397B32", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*", matchCriteriaId: "2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*", matchCriteriaId: "FD5BD905-75C3-47AE-8D19-6225BD808B37", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*", matchCriteriaId: "56DE452A-6852-4879-9187-8A152E6E260E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*", matchCriteriaId: "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*", matchCriteriaId: "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*", matchCriteriaId: "7785E177-C04E-4170-9C35-B4259D14EA85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*", matchCriteriaId: "8CAE727E-E552-4222-8FF0-6146A813BDEE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*", matchCriteriaId: "C7850295-C728-4448-ABA7-D01397DBBE5A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*", matchCriteriaId: "7C104A47-53EE-47FC-BAE5-21925BEE98E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", matchCriteriaId: "65589A68-58A4-4BD4-8A26-C629AE610953", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", matchCriteriaId: "C8A64C8F-6380-47CA-8116-E3438B953F84", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "F65F813B-C080-4028-8E1E-A81827917DD4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*", matchCriteriaId: "6ABBCE48-B9D1-4EFB-BF64-CF30F5294EB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "9D54D10E-D94E-4731-9988-4EC1786FF4E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*", matchCriteriaId: "4DC02AA6-E046-4EC9-9FFB-8B2C76FBE027", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*", matchCriteriaId: "4A2BB34B-D902-4064-BADC-56B5379E92CB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "55D0A0A2-DB62-4C92-9877-CF8CA01B1A10", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "2316E962-6C56-4F45-9575-274506B9D4C6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "42D3DFE3-7576-4D56-ABD2-425C28B56960", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "A39AFD5E-8FCA-4EC6-9472-FD208CB2A555", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", matchCriteriaId: "F112DE64-0042-4FB9-945D-3107468193E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "E027FB12-862F-413E-AA2B-4BBD90AE3650", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", matchCriteriaId: "DD28874B-148A-4299-9AA1-67A550B25F8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", matchCriteriaId: "45B80CBC-961F-4EE8-A998-C0A827151EDE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", matchCriteriaId: "E7131776-5DEB-4B96-8483-B81B538E24FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*", matchCriteriaId: "BE991877-18E0-4374-A441-C2316085CCA6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*", matchCriteriaId: "7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*", matchCriteriaId: "3A2EB46D-16E0-4C31-8634-C33D70B5381A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "757EB1A1-4764-4108-9AB1-F33CF9CEE574", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*", matchCriteriaId: "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*", matchCriteriaId: "7803B445-FE22-4D4B-9F3A-68EFE528195E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", matchCriteriaId: "199DCF1B-8A1E-47CC-87A6-64E6F21D8886", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", matchCriteriaId: "C5B78669-3B28-4F1D-993D-85282A7D0E96", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", matchCriteriaId: "DD05109E-1183-419D-96A1-9CD5EA5ECC3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "D3C73A3A-4B84-476F-AC3C-81DCB527E29A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*", matchCriteriaId: "7551128E-9E23-4C42-A681-6BE64D284C93", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*", matchCriteriaId: "0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*", matchCriteriaId: "5DEE2C71-C401-43D1-86DC-725FE5FDF87E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*", matchCriteriaId: "1758F264-96F9-4EE9-9CA9-AD5407885547", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*", matchCriteriaId: "FB2842F6-4CD5-457C-AC75-241A5AB9534B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "5ABE0470-E94A-4CAF-865D-73E2607A0DC1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*", matchCriteriaId: "A9CCD7E3-C62B-4151-96FF-1175D4896E95", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", matchCriteriaId: "6437E689-A049-4D48-AB7A-49CA7EBDE8B6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*", matchCriteriaId: "110B699D-169E-4932-A480-6EBB90CAE94B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*", matchCriteriaId: "A4C12918-E5BB-465E-9DA4-06B7351DD805", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*", matchCriteriaId: "4862C453-8BD7-4D53-B2D6-CE3E44A4915A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "D0C4E1F4-AD64-418C-A308-85501E0F3EA2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*", matchCriteriaId: "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*", matchCriteriaId: "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*", matchCriteriaId: "AB8C3BBA-4829-4006-B7EB-F552D86922C8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2b:*:*:*:*:*:*:*", matchCriteriaId: "29FE4D84-423F-4A5E-9B06-D5231BF1E03E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*", matchCriteriaId: "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3a:*:*:*:*:*:*:*", matchCriteriaId: "6935EBC4-3881-46F4-B608-8E6C9EF8E37C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*", matchCriteriaId: "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*", matchCriteriaId: "345C9300-CAC2-4427-A6B4-8DBC72573E00", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*", matchCriteriaId: "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7\\)e99:*:*:*:*:*:*:*", matchCriteriaId: "D8BB9177-AC8E-4B16-97C1-8F349FD853D7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*", matchCriteriaId: "1374E243-4EC2-4A81-991C-B5705135CAD2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*", matchCriteriaId: "6ECA6101-94BA-4209-8243-A56AF02963EA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*", matchCriteriaId: "FFF00927-80B0-4BE3-BF7C-E663A5E7763A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*", matchCriteriaId: "9795E31D-A642-4100-A980-CD49C291AB7F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.2\\(234k\\)e:*:*:*:*:*:*:*", matchCriteriaId: "93681DCF-D5ED-4909-B41F-C7CB975DE282", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(0\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "1724DF49-B5A4-4EA6-8733-1672455BB3BF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "249D78EB-A125-4731-A41B-62F8302D7246", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy1:*:*:*:*:*:*:*", matchCriteriaId: "7E599088-5071-469B-980F-4BA3026856C2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*", matchCriteriaId: "21F58CEE-636B-460E-91D1-330965FA7FE9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*", matchCriteriaId: "A3C779C9-3B83-4B26-8942-B8475FB3B5D1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*", matchCriteriaId: "02ACA99D-5784-4F5F-AB83-F55DF8774E94", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*", matchCriteriaId: "DFFB9F99-8751-442B-9419-C2AB522D2ADC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*", matchCriteriaId: "5E33FD88-8183-40EF-97A1-2766A4BBFBE5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca7:*:*:*:*:*:*:*", matchCriteriaId: "A6135D11-F4C2-4B6C-BC63-1132499D64A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca8:*:*:*:*:*:*:*", matchCriteriaId: "3B43CA9C-977B-4C99-A520-0BCDA5D2A700", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jca9:*:*:*:*:*:*:*", matchCriteriaId: "DFDCD3CA-FAA4-4BCA-883B-B871B8748C3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*", matchCriteriaId: "D9B59D8B-E71A-4671-BA0B-00E56498E280", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*", matchCriteriaId: "956C0089-E5AE-4289-B6D7-A8AB3C39AAA8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*", matchCriteriaId: "333468BC-41F0-46ED-9561-D7D2CE6AC267", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*", matchCriteriaId: "09DBAA17-61D7-4EE4-A70D-A7200DF36C58", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*", matchCriteriaId: "DF17EADC-5812-47FD-A243-287837CEC1E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*", matchCriteriaId: "5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*", matchCriteriaId: "BE8CF99C-B097-4964-B07C-FBB28EB37681", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*", matchCriteriaId: "79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd12:*:*:*:*:*:*:*", matchCriteriaId: "CBA4B81F-7FCA-4666-8602-F6C77A4673E8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*", matchCriteriaId: "E2403659-B7AD-40CE-AF88-FE2BEF0929E4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*", matchCriteriaId: "7D1F53B1-E9FA-4480-8314-C531073B25CF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*", matchCriteriaId: "498030A3-0AFF-4D74-98D6-74C9447E5B79", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*", matchCriteriaId: "BDCBDB71-59D7-481E-84FF-8772930F857B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda7:*:*:*:*:*:*:*", matchCriteriaId: "1C5906E4-31B7-45B6-B7D4-493B64741D52", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda8:*:*:*:*:*:*:*", matchCriteriaId: "09807F0F-E487-447B-8A79-96CB90858891", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda9:*:*:*:*:*:*:*", matchCriteriaId: "01A21ED6-B633-4B59-BD32-128D0E2B3563", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda11:*:*:*:*:*:*:*", matchCriteriaId: "CA7AF17D-2E1E-47D7-9356-4185A5F09BDD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda12:*:*:*:*:*:*:*", matchCriteriaId: "9FBF7AB3-6BA0-4ED8-9496-2CA4C28F9C8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda13:*:*:*:*:*:*:*", matchCriteriaId: "09664703-4AF6-4213-AB74-9294DE80E648", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda14:*:*:*:*:*:*:*", matchCriteriaId: "638B3FE5-39B1-47E7-B975-A2A88C68B573", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda16:*:*:*:*:*:*:*", matchCriteriaId: "04D5820C-2E74-4C66-932C-00FF3D064F09", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jda17:*:*:*:*:*:*:*", matchCriteriaId: "65F67B44-4215-48BC-A4DA-279178C4A6A9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*", matchCriteriaId: "2955A319-04AC-4D0C-80B7-0C90503908C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*", matchCriteriaId: "B0EF13B6-A743-41D1-BB31-F17C3586C8AF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*", matchCriteriaId: "0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*", matchCriteriaId: "37875B18-434B-4218-BAAF-2B593E188180", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*", matchCriteriaId: "26BAC234-D00C-4407-A1FE-E45A14D1BDAB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*", matchCriteriaId: "C42E2869-F179-49B7-A4E8-0F4E8EA953CB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*", matchCriteriaId: "7A58711A-F8C9-4F25-97D7-AE8AE64F3912", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*", matchCriteriaId: "BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*", matchCriteriaId: "DE3ECC04-345F-4DAE-98F7-04E082BAEC3B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*", matchCriteriaId: "6A919122-DE62-4032-80DF-F77C1D80B387", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*", matchCriteriaId: "9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf11:*:*:*:*:*:*:*", matchCriteriaId: "68958043-1212-42AF-A205-DB731ED55114", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12:*:*:*:*:*:*:*", matchCriteriaId: "84AE6EB6-EF3F-4DE2-ABEC-71F9010BFF0C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf12i:*:*:*:*:*:*:*", matchCriteriaId: "DD6F56B5-BE84-434D-AEC8-EB0764A832FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14:*:*:*:*:*:*:*", matchCriteriaId: "786741B1-2502-4F2F-A943-C50720A73D60", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf14i:*:*:*:*:*:*:*", matchCriteriaId: "02693A73-85AE-4AFE-81B2-11A85251CBD3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf15:*:*:*:*:*:*:*", matchCriteriaId: "83EFE0BC-2487-458C-B8AB-33600B9EB986", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*", matchCriteriaId: "746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*", matchCriteriaId: "8BB02DEB-81D4-4A05-BDD5-3B8BC7184159", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*", matchCriteriaId: "B18C3383-28B0-435E-AF08-9739DADAE4E2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*", matchCriteriaId: "08C9CA39-3515-4226-8453-0B5FC62546D1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*", matchCriteriaId: "19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*", matchCriteriaId: "1658FFCF-7433-4AFB-9D59-BD6CC14A4D28", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*", matchCriteriaId: "D2CA6116-2C6B-431B-BA88-63B180A00DA0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*", matchCriteriaId: "C2377350-7B69-4C49-889A-D63A3E4C1002", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji6:*:*:*:*:*:*:*", matchCriteriaId: "2913C352-E21F-4ECE-8A13-BA21CC00D02E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*", matchCriteriaId: "8AD90F4A-2A86-4A98-A157-D93C382717A7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*", matchCriteriaId: "B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*", matchCriteriaId: "1739E9AD-154D-40C2-A761-F7133BC06C3D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1:*:*:*:*:*:*:*", matchCriteriaId: "FA700809-C25D-49F8-B930-7459F8AE9DCE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*", matchCriteriaId: "2AEB7B3E-4E91-477F-BD62-9A28578CCA80", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2:*:*:*:*:*:*:*", matchCriteriaId: "58C5D255-C0FE-47E6-A920-3539306F9845", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*", matchCriteriaId: "7C8DF3B4-A424-4B70-9116-28E2C4DFB776", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*", matchCriteriaId: "4677B840-6636-4D8C-9E1C-47FEB8F3116A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk4:*:*:*:*:*:*:*", matchCriteriaId: "917D5477-E47E-4A01-979A-C9A0993BE34B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk5:*:*:*:*:*:*:*", matchCriteriaId: "09EC7701-3B46-4CFE-9EE5-2EA393D5A6D6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk6:*:*:*:*:*:*:*", matchCriteriaId: "4E18F8C6-E592-4507-8B93-E9AEA5C12CC1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk100:*:*:*:*:*:*:*", matchCriteriaId: "3BF0C320-9055-4E71-808A-BF2B8E00B443", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn13:*:*:*:*:*:*:*", matchCriteriaId: "49B4A0C4-B0CF-4040-9EB0-1529BCAD0DF9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn14:*:*:*:*:*:*:*", matchCriteriaId: "4071E320-789E-4E1D-982B-C265F4228FEA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn15:*:*:*:*:*:*:*", matchCriteriaId: "8EC38DE9-5D5D-452A-AC42-C1D24418FDB4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*", matchCriteriaId: "83B45095-526D-4BC5-A16B-6B5741F07FD8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1:*:*:*:*:*:*:*", matchCriteriaId: "C3A2E770-2D7A-4A09-AE89-B58F01FDE1B6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi1t:*:*:*:*:*:*:*", matchCriteriaId: "B6546067-A0AD-4BCB-8519-1DF018EBF804", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi4:*:*:*:*:*:*:*", matchCriteriaId: "3AE13E73-F2E2-4F8D-B236-940C74335E3C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi5:*:*:*:*:*:*:*", matchCriteriaId: "5E08CCB1-054E-4ABB-8A68-5DC5D8464ECB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi5s:*:*:*:*:*:*:*", matchCriteriaId: "7AFA615E-E4DE-4D9B-B666-ADEF30B33059", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi6a:*:*:*:*:*:*:*", matchCriteriaId: "E790F111-F2C4-4898-BC24-D09C213F62DF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi7:*:*:*:*:*:*:*", matchCriteriaId: "92A0E2C0-519E-4DFA-897E-DF5DE59434A0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi8:*:*:*:*:*:*:*", matchCriteriaId: "C8143E1F-A22C-4222-8EDF-82B615ADB082", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2:*:*:*:*:*:*:*", matchCriteriaId: "D3BF63D2-734D-41F4-8FE0-7F07F482AA6A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj2t:*:*:*:*:*:*:*", matchCriteriaId: "BD4E1437-2511-40ED-848A-FFE4542D8B6E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3:*:*:*:*:*:*:*", matchCriteriaId: "568E1EE8-78E7-4E24-88D1-9D42DE500F8E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj3a:*:*:*:*:*:*:*", matchCriteriaId: "37F71B84-9188-4333-95B1-0801F03BC496", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj4:*:*:*:*:*:*:*", matchCriteriaId: "A42E49E0-08A9-49DF-B67D-537618A8881A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj5:*:*:*:*:*:*:*", matchCriteriaId: "806D68A3-6E80-4184-A5D7-FBA718B66BA6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj6:*:*:*:*:*:*:*", matchCriteriaId: "55BEDA52-B21D-4693-8E70-88350FDCACD8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj7:*:*:*:*:*:*:*", matchCriteriaId: "3E2365E7-F80F-430D-8F23-04191DE26DDE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk:*:*:*:*:*:*:*", matchCriteriaId: "9D6F2D03-4959-4AF3-ABEC-77751C40A2DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk1:*:*:*:*:*:*:*", matchCriteriaId: "BD5AE65B-2974-47D5-9023-AA1FB2031DF8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpk2:*:*:*:*:*:*:*", matchCriteriaId: "35B2299C-0303-4E0B-B194-7404F8C7FF96", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*", matchCriteriaId: "D962FBA3-CE59-401B-9451-45001775BA66", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*", matchCriteriaId: "C13F2837-174B-4437-BF3F-CB6BFBF8F64D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*", matchCriteriaId: "237D305E-016D-4E84-827C-44D04E3E0999", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "E993A32E-D2AF-4519-B4C9-7F576649D20F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "7260A66D-D477-440E-9A87-C05F9BD9E67C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "31059ED1-4D82-43D7-8EF7-042125289CF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "3B813F19-1B37-48F4-99EC-05E0CAA861FD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "4220D3B1-BD05-4169-91BA-B1AA45084C46", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*", matchCriteriaId: "84BAF351-4C7F-44F8-812E-9C402CBBB5FF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy2:*:*:*:*:*:*:*", matchCriteriaId: "0595F3D8-8D99-4C82-9EC1-1187C52A6740", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy3:*:*:*:*:*:*:*", matchCriteriaId: "662ACAD0-7E80-4CB5-8409-03E72A3C59D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy4:*:*:*:*:*:*:*", matchCriteriaId: "A43EE852-5F22-4387-8332-A12FF3306210", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*", matchCriteriaId: "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "C1EE552E-226C-46DE-9861-CB148AD8FB44", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "CAF02C8E-9BB2-4DC2-8BF1-932835191F09", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "C5AC88EB-7A67-4CDE-9C69-94734966E677", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*", matchCriteriaId: "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*", matchCriteriaId: "4151B2B1-B17F-4F1D-A211-34C7DB84E442", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "37B550C9-B2E4-44EE-8E0B-54D150C69A0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "BEBBA614-74E7-43C7-8D33-ADF4BD79D477", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "A7A852A3-7CAC-4D35-A583-556D17A0F7E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "DBF5D54D-4403-4C5E-AA65-9FD8661E283B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "1C89048E-2A5F-4818-92DB-812BB8FEDC90", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)sn1:*:*:*:*:*:*:*", matchCriteriaId: "9AA83229-767A-40EA-AE03-53DA0DD40B26", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "74E1226B-46CF-4C82-911A-86C818A75DFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "100DA24F-464E-4273-83DF-6428D0ED6641", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "063C0C47-25EB-4AA4-9332-8E43CD60FF39", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "02866AED-A1B4-4D89-A11F-27089EF935BE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "1C85BAAF-819B-40E7-9099-04AA8D9AB114", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*", matchCriteriaId: "ED684DB4-527A-4268-B197-4719B0178429", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*", matchCriteriaId: "88F41406-0F55-4D74-A4F6-4ABD5A803907", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*", matchCriteriaId: "7082C083-7517-4CD4-BF95-CC7AF08D4053", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*", matchCriteriaId: "370EF3DC-151F-4724-A026-3AD8ED6D801C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*", matchCriteriaId: "2B8FB86F-2A89-413B-BED7-97E3D392804E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*", matchCriteriaId: "005EAD76-34BE-4E3F-8840-23F613661FE8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*", matchCriteriaId: "2595B3E3-7FD4-4EFF-98A2-89156A657A0E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*", matchCriteriaId: "FB998A1F-BAEA-4B8F-BE49-1C282ED3952E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7a:*:*:*:*:*:*:*", matchCriteriaId: "A55379B7-2787-4BE6-8960-204C074F4CD1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m8:*:*:*:*:*:*:*", matchCriteriaId: "8AABDAB3-6329-48CF-BB49-DA2046AB9048", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m9:*:*:*:*:*:*:*", matchCriteriaId: "C96E41FF-DD4B-4D55-8C96-248C9A15226B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)m10:*:*:*:*:*:*:*", matchCriteriaId: "64F7ACB5-4FE5-4B07-8B4D-28DF8D655199", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*", matchCriteriaId: "C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0d:*:*:*:*:*:*:*", matchCriteriaId: "29F1BC11-BD27-4465-B92E-B01248B2EAAA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0e:*:*:*:*:*:*:*", matchCriteriaId: "5A2DB2F4-DA30-4250-834D-B60D74B7B1F8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s0f:*:*:*:*:*:*:*", matchCriteriaId: "C5323B67-7A30-44B6-B3FB-0148444F1725", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "D4408CD8-DC1D-4102-924B-E9E28FC5CECF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "C2A39749-3A95-41B6-850B-4D388E6242B0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "67B663F9-DBF4-4EEE-836D-C83BF99A682A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "55E780F3-D378-4201-AC69-79C356EE9CE5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*", matchCriteriaId: "28FE5158-FA37-476B-8289-11733BB9AFF3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "24AE7F08-FB39-4E35-81AD-0186F2A539D7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*", matchCriteriaId: "447FAF3B-8E93-4A2C-A8B1-1A2F7D958754", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "08E2628F-456D-4471-A914-D92157725CB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "CCA37E61-7EA5-45F3-87F6-432B591A79BB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s9:*:*:*:*:*:*:*", matchCriteriaId: "4AE143DA-B2AA-47C3-BA8D-F0C02AFF36BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)s10:*:*:*:*:*:*:*", matchCriteriaId: "4C1F539B-8422-43AD-8BFB-E57622035B9D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1:*:*:*:*:*:*:*", matchCriteriaId: "5F0C961B-833E-4F45-AAD0-DB8CDBC3A988", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.4\\(3\\)sn1a:*:*:*:*:*:*:*", matchCriteriaId: "D604EC27-EC42-435C-93E4-2DCB62AEA3D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*", matchCriteriaId: "9613EE90-A90A-4817-A5A1-F78A9F3BA571", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "87A96A92-02E7-440C-9E46-0FBE8CE75E44", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "03F1AEF3-08BD-4CC0-A36A-D26D550853E0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "8DD9FF45-C8C2-42E2-B329-48C037A10521", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "36CBB93A-A8C8-477E-B530-B0058C3D15B7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "075BBA36-281F-4164-A1ED-04A2B3589B00", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sn1:*:*:*:*:*:*:*", matchCriteriaId: "DFB675E0-5497-4307-9B1C-4CBFAEE612FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy:*:*:*:*:*:*:*", matchCriteriaId: "6465E3DA-90F0-4DD6-82B1-C9DF9FAEBDD2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy1:*:*:*:*:*:*:*", matchCriteriaId: "346BD6D0-AAF2-4C9A-8DD3-8C710302DCA1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy2:*:*:*:*:*:*:*", matchCriteriaId: "5A5B7053-7F9C-432C-B6F1-DAC00B0C9619", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy3:*:*:*:*:*:*:*", matchCriteriaId: "0D029D52-65E5-4129-AB47-E873F53799CA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*", matchCriteriaId: "31605A68-9398-4239-A137-DD0516BD2660", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy5:*:*:*:*:*:*:*", matchCriteriaId: "727E596A-295D-4D70-810A-436FC6A4415D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy6:*:*:*:*:*:*:*", matchCriteriaId: "368210A0-CC15-4FB9-8334-4ED475523C2C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy7:*:*:*:*:*:*:*", matchCriteriaId: "D37EF429-EE6B-4A72-9D76-4FC1E6E19E01", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy8:*:*:*:*:*:*:*", matchCriteriaId: "9969CCF7-EAD0-4BEA-BCDB-F22A1E0C7C18", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*", matchCriteriaId: "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "0340EC20-7099-4F13-8DE6-84475B2A52CE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "6994F100-864F-4512-9141-F7D1050F9DD4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "FC0CC364-FF3A-4FB3-8004-6628400BC7DB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(1\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "67A1BC08-28AF-4583-BE21-0D85CA2D7B6F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*", matchCriteriaId: "3A259566-AA04-4DE8-900D-865384E56C8E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "6CF70F3C-FAC8-4691-AF95-1B5B828A9D41", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "AF08E7CE-DE01-43B2-A9F0-1CE657E79260", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "BC500D08-0DE1-4AA8-AE97-0CF17A706430", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "5CFF6E14-D29F-41F3-BD25-A1DB0A464592", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "7A4E00DF-60FD-48F2-A69A-D709A5657F6A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "0F5D3761-16C8-413A-89AD-C076B9B92FF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "F690BEC9-FAE9-4C02-9993-34BF14FA99EA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*", matchCriteriaId: "B0B8565B-3EE6-48DC-AE92-9F16AFFC509C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(2\\)xb:*:*:*:*:*:*:*", matchCriteriaId: "0D604189-E382-47B3-B9D3-A6D2EA3B2C80", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "716EC9AA-0569-4FA7-A244-1A14FA15C5AD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*", matchCriteriaId: "39166A66-859D-43A7-9947-3F3C32FBFAAE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*", matchCriteriaId: "097D1950-6159-45A2-8653-D3F90044D0C8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*", matchCriteriaId: "F421AC3C-B0BC-4177-ACDB-87792C1636EB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2a:*:*:*:*:*:*:*", matchCriteriaId: "EA965B88-3464-4320-B9C4-594C49C9C0F6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*", matchCriteriaId: "09CD336D-1110-4B0C-B8D4-7C96293CBADE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*", matchCriteriaId: "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*", matchCriteriaId: "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4b:*:*:*:*:*:*:*", matchCriteriaId: "90950C85-D631-4F60-AB3E-3ED1D74D56B9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4c:*:*:*:*:*:*:*", matchCriteriaId: "CD79CA0D-7D90-4955-969A-C25873B0B9D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*", matchCriteriaId: "C7809674-4738-463E-B522-FC6C419E2A09", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6:*:*:*:*:*:*:*", matchCriteriaId: "FFD51F00-C219-439F-918E-9AF20A6E053A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m6a:*:*:*:*:*:*:*", matchCriteriaId: "57BCB671-7ED0-43D5-894F-8B3DBF44E68E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m7:*:*:*:*:*:*:*", matchCriteriaId: "D4802BC7-F326-4F6E-9C74-04032FF35FEE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m8:*:*:*:*:*:*:*", matchCriteriaId: "DEDE3BCF-B518-47B0-BD3B-0B75515771E3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m9:*:*:*:*:*:*:*", matchCriteriaId: "1A5C9BF5-0C29-4B50-9A86-29F0ECD44F1D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m10:*:*:*:*:*:*:*", matchCriteriaId: "B1B0621A-D7A2-415B-91ED-674F2FB4227B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m11:*:*:*:*:*:*:*", matchCriteriaId: "3D9D7FDD-8CE6-4E83-A186-734BC5546E35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m11a:*:*:*:*:*:*:*", matchCriteriaId: "271D901A-3196-4653-A04E-07A6BC13B44D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*", matchCriteriaId: "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*", matchCriteriaId: "CB52603C-CED4-4330-BB53-DDDFEA83882A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "F40A87C1-5EDB-4B50-84CF-729F5037E870", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*", matchCriteriaId: "E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "42C9B84C-F9DC-4F9E-82F2-04004D539C36", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "5E246B9E-F93F-4BB2-9BA4-438FCC4A711B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "DE884ADE-FD51-4F10-89A8-D871E7407C83", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*", matchCriteriaId: "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6:*:*:*:*:*:*:*", matchCriteriaId: "AC22B2CD-5154-4055-A6A7-4C31B84B032B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6a:*:*:*:*:*:*:*", matchCriteriaId: "10082A46-7AD3-4533-9A15-267953D9E642", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s6b:*:*:*:*:*:*:*", matchCriteriaId: "7ED8D1FE-5880-484E-810B-B1CDC2C9F7CA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s7:*:*:*:*:*:*:*", matchCriteriaId: "6ADD1575-BB35-40CE-8452-3D34E25995B4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s8:*:*:*:*:*:*:*", matchCriteriaId: "67FE59A3-5BA1-4C68-8959-A5B0CA61CDB4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9:*:*:*:*:*:*:*", matchCriteriaId: "B6B02867-F082-4A57-9E2E-12B0F4C77526", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s9a:*:*:*:*:*:*:*", matchCriteriaId: "E8389200-0585-456E-8D0B-D725266ADBBC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*", matchCriteriaId: "EFEF03FA-FBF2-477F-A5E2-67F47610897A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10a:*:*:*:*:*:*:*", matchCriteriaId: "0969524D-EB41-47F0-8370-2E38ED7493BC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10b:*:*:*:*:*:*:*", matchCriteriaId: "91D97C79-48C6-4A3E-8C10-AC04BFDF2951", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "C84498B4-7002-44D1-B2B7-B43F3081D258", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn0a:*:*:*:*:*:*:*", matchCriteriaId: "E10003D7-8501-4A8C-AED1-A9F9B79D0666", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*", matchCriteriaId: "0F61B07A-7933-476F-951A-AD0019D2443D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "41939712-5075-4924-ABF2-467430B37197", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "E7CBC8C7-E3B2-4659-9B47-C0F16817F46A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "945363EE-FE7A-44ED-A4A0-942A1F9B2702", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "F1CEA598-B4E5-44E6-AA1A-79DC4FE3B62E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn1:*:*:*:*:*:*:*", matchCriteriaId: "2481A9F2-2C99-4A78-B8B4-0D073A6CFED5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn2:*:*:*:*:*:*:*", matchCriteriaId: "667CB7FD-280B-42D6-9E45-EA04A1DC7701", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)sn3:*:*:*:*:*:*:*", matchCriteriaId: "65DD79B6-A44A-447F-A69D-C7C4193F5C1C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*", matchCriteriaId: "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*", matchCriteriaId: "679DCA8C-F64B-4716-BCC9-9C461A89CB29", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "EF662E36-0831-4892-850F-844B0E0B54DA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "1E71F49D-E405-4AB4-9188-DA7B338DFD7B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(1\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "204B0A52-F6AB-406B-B46D-E92F2D7D87F7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*", matchCriteriaId: "700D0D31-138B-4F9A-8C76-3AF8B9D2C59C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*", matchCriteriaId: "B843CEE5-4D53-414D-95C7-4BA515818E87", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*", matchCriteriaId: "1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*", matchCriteriaId: "72480900-6E08-425F-965D-143B348E374A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*", matchCriteriaId: "1EBA0926-E790-4B1C-A549-5B7D2F040E5A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "12D439A6-E8A8-4389-A7C8-2F4BCB7C3854", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*", matchCriteriaId: "4E903D9F-530D-4597-ABA9-4C1CFB79814B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*", matchCriteriaId: "9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*", matchCriteriaId: "5060BAEA-DF8F-4B85-84F5-1410FD45C733", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*", matchCriteriaId: "CB56857D-029C-4DA8-B439-F1B89EA32074", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp4:*:*:*:*:*:*:*", matchCriteriaId: "7F91AC2D-86F7-4618-A31B-DE081D4C21BC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp5:*:*:*:*:*:*:*", matchCriteriaId: "D25B94F9-F10F-47CE-8340-CE56E7ED31E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp6:*:*:*:*:*:*:*", matchCriteriaId: "8C32C536-640C-468D-872F-442697DB9EE6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp7:*:*:*:*:*:*:*", matchCriteriaId: "38DE4F33-A677-4848-BB33-10C4A4655735", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8:*:*:*:*:*:*:*", matchCriteriaId: "BF0A4820-F737-4A3A-8A08-E2C3EE6F6E66", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp8a:*:*:*:*:*:*:*", matchCriteriaId: "83758252-FF68-432F-8670-AABE1DD0C425", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp9:*:*:*:*:*:*:*", matchCriteriaId: "0894FC09-880C-44D5-B67D-81C92D96D790", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*", matchCriteriaId: "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t0a:*:*:*:*:*:*:*", matchCriteriaId: "6DDCF08B-3A61-4B3D-BF35-ABB5F11EA7E3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*", matchCriteriaId: "5BBF8B70-DFBE-4F6E-83F0-171F03E97606", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*", matchCriteriaId: "CA55D660-66C6-4278-8C27-25DB2712CC1A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*", matchCriteriaId: "5609B342-D98E-4850-A0FE-810699A80A1F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "8320F23D-F6BE-405B-B645-1CEB984E8267", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*", matchCriteriaId: "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*", matchCriteriaId: "C7C5C705-6A8C-4834-9D24-CFE26A232C15", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1a:*:*:*:*:*:*:*", matchCriteriaId: "691BA27E-77AB-4A30-916D-3BB916B05298", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*", matchCriteriaId: "CC270E40-CABA-44B4-B4DD-E9C47A97770B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*", matchCriteriaId: "EC1DB8C1-7F7D-4562-A317-87E925CAD524", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*", matchCriteriaId: "1A1887D9-E339-4DC6-BE24-A5FF15438B2F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*", matchCriteriaId: "8AB2645F-C3BF-458F-9D07-6D66E1953730", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3a:*:*:*:*:*:*:*", matchCriteriaId: "1B2303A3-CAF1-4DBA-BB6E-F205C23DCE6D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m4:*:*:*:*:*:*:*", matchCriteriaId: "686FD45C-7722-4D98-A6D7-C36CAC56A4AA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m5:*:*:*:*:*:*:*", matchCriteriaId: "871E33AC-B469-47BA-9317-DC9E3E9BF5C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6:*:*:*:*:*:*:*", matchCriteriaId: "C4091CAC-BFAA-404C-A827-4DA9EADDF621", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6a:*:*:*:*:*:*:*", matchCriteriaId: "E0DA9FCA-4166-4084-96AF-E82CC4A4DB25", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m6b:*:*:*:*:*:*:*", matchCriteriaId: "369A99E0-3451-41D1-8C56-5352EA689950", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m7:*:*:*:*:*:*:*", matchCriteriaId: "33D4A7FA-E4E0-49C2-97FD-A547A1612F75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m8:*:*:*:*:*:*:*", matchCriteriaId: "DA0B918F-A28C-4B5A-A566-6E588B4F6696", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)m9:*:*:*:*:*:*:*", matchCriteriaId: "436114F2-D906-4469-99C4-10B75253B3D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(3\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "466F2336-03D9-4842-BC3D-861749756B9F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(4\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "494F7651-927A-418D-B01A-1C30BFE28560", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(5\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "E9ACFB65-C99B-4402-A8E5-914533FF3F2F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(7\\)sn:*:*:*:*:*:*:*", matchCriteriaId: "F805324A-1593-4B48-B597-CF870D35944B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(7\\)sn1:*:*:*:*:*:*:*", matchCriteriaId: "C78D1111-D91D-4E43-BC47-86EB37AACF75", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.6\\(7\\)sn2:*:*:*:*:*:*:*", matchCriteriaId: "B949D73E-0ED4-40CA-801E-F0BEE22157B6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "9C8A00BF-4522-467B-A96E-5C33623DCA2D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m0a:*:*:*:*:*:*:*", matchCriteriaId: "D2A434E7-B27C-4663-BE83-39A650D22D26", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m1:*:*:*:*:*:*:*", matchCriteriaId: "47C106CF-CBD3-4630-8E77-EDB1643F97E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m2:*:*:*:*:*:*:*", matchCriteriaId: "A1DB7943-5CE1-44F6-B093-5EA65BF71A59", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m3:*:*:*:*:*:*:*", matchCriteriaId: "64404B00-4956-47B8-ACDB-88E365E97212", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4:*:*:*:*:*:*:*", matchCriteriaId: "6FE6A696-5CBC-4552-A54E-55C21BC74D7A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4a:*:*:*:*:*:*:*", matchCriteriaId: "41237041-1D82-4C6C-BF48-ECEDF9DB08C0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m4b:*:*:*:*:*:*:*", matchCriteriaId: "CAB72CA3-088E-4EFE-BE1C-190C64101851", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m5:*:*:*:*:*:*:*", matchCriteriaId: "FA584AC4-96AB-4026-84DF-F44F3B97F7E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m6:*:*:*:*:*:*:*", matchCriteriaId: "22EB41FD-4DE2-4753-A18C-C877B81B51D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m7:*:*:*:*:*:*:*", matchCriteriaId: "158EDE62-04C9-471B-B243-309D49583E67", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.7\\(3\\)m8:*:*:*:*:*:*:*", matchCriteriaId: "D8609F10-2B43-4BDC-AAF1-80D589910EF4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "5A58C01B-459E-432F-A49F-68EC45EE6E14", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0a:*:*:*:*:*:*:*", matchCriteriaId: "D8DFE673-9A5E-4369-A7BB-3DE7F8E503C4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m0b:*:*:*:*:*:*:*", matchCriteriaId: "4125EE35-ED52-4350-A4CE-E90EA8ED6BAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1:*:*:*:*:*:*:*", matchCriteriaId: "56AD5BA0-4D08-4A92-88BE-60AF29BC35CD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m1a:*:*:*:*:*:*:*", matchCriteriaId: "2881C5EA-0AC7-4074-A4FD-9FA33E3F60A4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2:*:*:*:*:*:*:*", matchCriteriaId: "198FF520-7631-49D9-B8A8-2E64F6237CC0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m2a:*:*:*:*:*:*:*", matchCriteriaId: "94E067E8-552B-4691-9F6A-C5E8766287BE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3:*:*:*:*:*:*:*", matchCriteriaId: "3C4162EC-90DE-4194-8ABC-55CCB8C24FF6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3a:*:*:*:*:*:*:*", matchCriteriaId: "405CC56E-574F-4983-B492-C8811FAF06E8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m3b:*:*:*:*:*:*:*", matchCriteriaId: "B1829074-66F9-4B3B-A084-B88D838CFC44", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m4:*:*:*:*:*:*:*", matchCriteriaId: "6715A135-61A7-4E56-948D-8A8D5F7C98C7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m5:*:*:*:*:*:*:*", matchCriteriaId: "4C836C26-DBC1-42CB-9B73-9F248D4F2B6A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.8\\(3\\)m6:*:*:*:*:*:*:*", matchCriteriaId: "B2CC4602-D1F5-4843-991A-2903C8336251", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "EEFE8A85-7F63-4E4C-A3FE-7B7E27AD1DF4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m0a:*:*:*:*:*:*:*", matchCriteriaId: "0807458A-2453-4575-AE19-0DE15E04B88C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m1:*:*:*:*:*:*:*", matchCriteriaId: "9BA0A0E0-A9D8-4FC3-88BD-FA0E7290A9A0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2:*:*:*:*:*:*:*", matchCriteriaId: "6A1AF57E-79E9-40F2-817A-5E7D2760F1E8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m2a:*:*:*:*:*:*:*", matchCriteriaId: "BEF9CEA3-054B-4469-A10F-DFCB9057E5E4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3:*:*:*:*:*:*:*", matchCriteriaId: "B8313597-49A9-4918-B8D5-8E53C5C9AFAB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3a:*:*:*:*:*:*:*", matchCriteriaId: "31D6B0E4-92F1-42FD-92DA-887D3D38CEBD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:15.9\\(3\\)m3b:*:*:*:*:*:*:*", matchCriteriaId: "13C6DA27-2445-4850-B0EF-82EE8C01C0B5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "F73E7874-A063-4AE5-9F0A-53D590B7B99B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*", matchCriteriaId: "013DD522-1561-4468-A350-C872B78FC291", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*", matchCriteriaId: "6907E1FE-760E-4557-A472-1A1F0052B82B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*", matchCriteriaId: "62291CDD-A775-44B4-85F3-CE1D494F55FE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*", matchCriteriaId: "658EDFE2-6EC8-4DD3-AACA-C168F942712A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*", matchCriteriaId: "9FCBE369-81ED-4C94-8C44-53C6F4A087CC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*", matchCriteriaId: "90005E78-413A-47D7-82B3-A3011E6B118D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*", matchCriteriaId: "D764D126-4604-43DD-9A66-BDD32565D893", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*", matchCriteriaId: "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*", matchCriteriaId: "06067D8B-79BD-4982-909F-7C08BE5660C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*", matchCriteriaId: "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*", matchCriteriaId: "672B77C7-0E6B-496D-9ACC-6AD965319B35", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*", matchCriteriaId: "2CA1D885-2270-4370-9F3F-CA80B0E96DD5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*", matchCriteriaId: "B9EC727B-AF92-460D-B61D-F45ECEEE5D56", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*", matchCriteriaId: "D5604A84-8240-45B6-9027-B03AA549CD5C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*", matchCriteriaId: "895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*", matchCriteriaId: "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*", matchCriteriaId: "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*", matchCriteriaId: "25725655-EBDE-4538-8AE1-CF5C81F09C5E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*", matchCriteriaId: "A98F2654-46F3-4C63-A2C2-48B372C655B1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*", matchCriteriaId: "4D4E206B-37BF-4D61-BE90-80BB65C0C582", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*", matchCriteriaId: "17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*", matchCriteriaId: "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*", matchCriteriaId: "20286676-70FF-471C-9612-74E5F0ECB8E0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*", matchCriteriaId: "F327F7D0-93E8-4005-9ECB-44852C16BB4C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.0s:*:*:*:*:*:*:*", matchCriteriaId: "6DAC081C-9A22-4CBC-A9D0-DD9995801791", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*", matchCriteriaId: "27252883-091A-471D-87FC-E07EADBC6FFE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*", matchCriteriaId: "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.1s:*:*:*:*:*:*:*", matchCriteriaId: "F43F819E-3072-430F-8C52-B43FF28D4687", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.2ae:*:*:*:*:*:*:*", matchCriteriaId: "6BC3D979-02B2-4EEC-A6C2-A44C9FC694D9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*", matchCriteriaId: "F7C340CE-7F18-448B-B9BE-BFEB1724C882", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.2s:*:*:*:*:*:*:*", matchCriteriaId: "C80F59A9-C1EF-4E9B-B204-1EEC7FDF65BC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.3ae:*:*:*:*:*:*:*", matchCriteriaId: "E9C1CA89-0FE4-4DC3-BB4B-299114E172AB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.3e:*:*:*:*:*:*:*", matchCriteriaId: "5F79BC92-0869-447C-AF34-3FBF42375D1A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*", matchCriteriaId: "09A930B7-7B9B-426E-A296-9F29F4A03F5B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.4e:*:*:*:*:*:*:*", matchCriteriaId: "4615A652-96A3-4809-94C0-7B7BF607B519", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*", matchCriteriaId: "309952D7-B220-4678-A16D-AA5FF005F782", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.5e:*:*:*:*:*:*:*", matchCriteriaId: "4A31B2A2-E88A-49AA-B187-3EA91CB8842A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.11.99ze:*:*:*:*:*:*:*", matchCriteriaId: "F0E8150B-629E-4B06-9B1F-168F06DCA1C6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*", matchCriteriaId: "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*", matchCriteriaId: "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*", matchCriteriaId: "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*", matchCriteriaId: "278ACF0A-949B-486D-8F6C-ADC2AF25FC17", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*", matchCriteriaId: "37A30BA4-D760-4321-AAC8-04093AAAEA3E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*", matchCriteriaId: "42616EA2-DDCF-4B57-BF2A-37968C82DDC6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*", matchCriteriaId: "246251E8-7D4E-4CD4-8D4F-BF360780FA36", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*", matchCriteriaId: "09F35F75-75E8-4A20-94C4-5908E404C8CB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*", matchCriteriaId: "9C01C1D8-A191-45B7-A6C5-EE225F05A49E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*", matchCriteriaId: "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*", matchCriteriaId: "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*", matchCriteriaId: "3F6E9386-30B4-4E86-9676-E7E005274048", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*", matchCriteriaId: "7E70C455-E41C-4B17-847A-5F4281139252", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*", matchCriteriaId: "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*", matchCriteriaId: "64A07329-3A7D-4483-AE69-4786FEB23D92", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*", matchCriteriaId: "F84E4463-DB0F-4B06-B403-B3606B386F02", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.6bs:*:*:*:*:*:*:*", matchCriteriaId: "E08D377F-EBEC-4234-8628-2CFD04E43CB0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*", matchCriteriaId: "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*", matchCriteriaId: "BAE50185-23ED-4640-9037-E45810793C85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.7s:*:*:*:*:*:*:*", matchCriteriaId: "96637FB9-B552-417B-8C7F-4F4524F69690", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*", matchCriteriaId: "5DA6851D-6DC1-403F-A511-EE996FE832F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*", matchCriteriaId: "B7C97617-6574-4EFD-8408-A9E21A56E1AC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*", matchCriteriaId: "FB188B71-4CF0-49EA-BA00-10FEDF994D70", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*", matchCriteriaId: "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*", matchCriteriaId: "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*", matchCriteriaId: "E61E0102-B9B6-41F4-9041-0A5F144D849A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*", matchCriteriaId: "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*", matchCriteriaId: "2A076E1F-3457-410A-8AB6-64416ECB20A7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*", matchCriteriaId: "FAD93CD1-4188-40B7-A20E-9C3FE8344A27", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*", matchCriteriaId: "0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*", matchCriteriaId: "2972E680-5A19-4858-9B35-0B959ED319A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.15.1xbs:*:*:*:*:*:*:*", matchCriteriaId: "4BF22C29-84DF-44CA-B574-FE04AB39E344", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*", matchCriteriaId: "F1BFE916-916F-4936-A331-21A0E8193920", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.15.2xbs:*:*:*:*:*:*:*", matchCriteriaId: "C2C7C0BA-D618-4B65-B42C-43393167EEE0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*", matchCriteriaId: "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*", matchCriteriaId: "5C5484A4-D116-4B79-8369-47979E20AACA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*", matchCriteriaId: "97410577-A005-49B6-981C-535B3484E72F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*", matchCriteriaId: "3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*", matchCriteriaId: "5568EABF-8F43-4A87-8DE4-A03E9065BE53", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*", matchCriteriaId: "A0E5BB91-B5E7-4961-87DC-26596E5EDED7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*", matchCriteriaId: "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*", matchCriteriaId: "D3822447-EB80-4DF2-B7F2-471F55BA99C0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*", matchCriteriaId: "BA0B441A-3A09-4A58-8A40-D463003A50BC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*", matchCriteriaId: "51E1A64A-204D-4567-A2DC-EFEB2AE62B54", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*", matchCriteriaId: "970FD986-6D0E-441C-9BF3-C66A25763A7A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*", matchCriteriaId: "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*", matchCriteriaId: "1826C997-6D5D-480E-A12E-3048B6C61216", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*", matchCriteriaId: "5D136C95-F837-49AD-82B3-81C25F68D0EB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*", matchCriteriaId: "C35B3F96-B342-4AFC-A511-7A735B961ECD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*", matchCriteriaId: "9E203E52-0A3A-4910-863D-05FEF537C9B8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*", matchCriteriaId: "DED2D791-4142-4B9E-8401-6B63357536B0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*", matchCriteriaId: "4B6442B5-A87E-493B-98D5-F954B5A001BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*", matchCriteriaId: "8794DA1D-9EE8-4139-B8E9-061A73CFD5F5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*", matchCriteriaId: "9FBEF4B2-EA12-445A-823E-E0E5343A405E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*", matchCriteriaId: "51EAC484-1C4F-4CA8-B8E1-6EE0E9497A4A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*", matchCriteriaId: "E0BC5E30-71D2-4C17-A1BA-0850A9BC7D50", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*", matchCriteriaId: "844E7CEC-5CB6-47AE-95F7-75693347C08E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*", matchCriteriaId: "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*", matchCriteriaId: "147A245E-9A5D-4178-A1AC-5B0D41C3B730", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*", matchCriteriaId: "169D71B3-1CCE-4526-8D91-048212EEDF08", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*", matchCriteriaId: "27F66514-B9C4-422E-B68E-406608302E03", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*", matchCriteriaId: "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*", matchCriteriaId: "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*", matchCriteriaId: "ABC524BA-544C-49B9-A9D6-800D25556532", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.10as:*:*:*:*:*:*:*", matchCriteriaId: "02A07FC8-5649-4A64-8B94-507524FE4551", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.10bs:*:*:*:*:*:*:*", matchCriteriaId: "A2E619BC-F1A2-45A7-BC12-E716BAC81376", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*", matchCriteriaId: "2BC99316-75AC-45EB-B6BB-DB014ED08ECA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*", matchCriteriaId: "12793F39-13C4-4DBC-9B78-FE361BDDF89D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*", matchCriteriaId: "1AEF94C7-CEE6-4696-9F1D-549639A831C2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*", matchCriteriaId: "876767C7-0196-4226-92B1-DDE851B53655", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*", matchCriteriaId: "0141D67B-632F-48ED-8837-4CC799616C57", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*", matchCriteriaId: "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*", matchCriteriaId: "FE444B39-D025-471B-835E-88671212ACAA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*", matchCriteriaId: "BE390091-D382-4436-BBB4-D4C33E4F6714", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*", matchCriteriaId: "EE81AA43-88D4-4EFC-B8F6-A41EFF437819", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*", matchCriteriaId: "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*", matchCriteriaId: "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*", matchCriteriaId: "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*", matchCriteriaId: "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*", matchCriteriaId: "CE3170E3-0BCC-4C5F-8E6C-5E91E8C4E7A8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*", matchCriteriaId: "3CCDB353-DD15-4C91-AD2A-73649C012E08", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*", matchCriteriaId: "7D7DAAE1-BB3F-4FBA-A6ED-3BABC9196C1C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*", matchCriteriaId: "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*", matchCriteriaId: "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*", matchCriteriaId: "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*", matchCriteriaId: "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*", matchCriteriaId: "014224BF-926E-470C-A133-84036D8AD533", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*", matchCriteriaId: "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*", matchCriteriaId: "B58E818D-03BB-4FE4-946B-B967E9764DA3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*", matchCriteriaId: "4063CCF8-19BE-4411-B71B-147BB146700B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*", matchCriteriaId: "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*", matchCriteriaId: "186ADB50-A4D4-4B32-884D-3195E7770346", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*", matchCriteriaId: "334F278A-CFEB-4145-9D8D-EFC36A1BF258", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*", matchCriteriaId: "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*", matchCriteriaId: "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*", matchCriteriaId: "63D05DBA-D3F0-492B-9976-54A7E46F315E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*", matchCriteriaId: "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.8sp:*:*:*:*:*:*:*", matchCriteriaId: "78224D59-5C86-4090-9645-170B6583C7E0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:3.18.9sp:*:*:*:*:*:*:*", matchCriteriaId: "CB2D4A7B-E0B7-4D65-B242-75934490D703", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*", matchCriteriaId: "0ED5527C-A638-4E20-9928-099E32E17743", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*", matchCriteriaId: "1A685A9A-235D-4D74-9D6C-AC49E75709CA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*", matchCriteriaId: "43052998-0A27-4E83-A884-A94701A3F4CE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*", matchCriteriaId: "89526731-B712-43D3-B451-D7FC503D2D65", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*", matchCriteriaId: "302933FE-4B6A-48A3-97F0-4B943251B717", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*", matchCriteriaId: "296636F1-9242-429B-8472-90352C056106", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*", matchCriteriaId: "77993343-0394-413F-ABF9-C1215E9AD800", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*", matchCriteriaId: "283971DD-DD58-4A76-AC2A-F316534ED416", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*", matchCriteriaId: "A8F324A5-4830-482E-A684-AB3B6594CEAE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*", matchCriteriaId: "E8120196-8648-49D0-8262-CD4C9C90C37A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*", matchCriteriaId: "33E7CCE2-C685-4019-9B55-B3BECB3E5F76", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*", matchCriteriaId: "0699DD6E-BA74-4814-93AB-300329C9D032", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*", matchCriteriaId: "C2E2D781-2684-45F1-AC52-636572A0DCA8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*", matchCriteriaId: "479FB47B-AF2E-4FCB-8DE0-400BF325666C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*", matchCriteriaId: "DF2B4C78-5C31-4F3D-9639-305E15576E79", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", matchCriteriaId: "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", matchCriteriaId: "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*", matchCriteriaId: "13CB889F-B064-4CAC-99AC-903745ACA566", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*", matchCriteriaId: "77E8AF15-AB46-4EAB-8872-8C55E8601599", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*", matchCriteriaId: "957318BE-55D4-4585-AA52-C813301D01C3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*", matchCriteriaId: "8F11B703-8A0F-47ED-AA70-951FF78B94A4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*", matchCriteriaId: "FE7B2557-821D-4E05-B5C3-67192573D97D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*", matchCriteriaId: "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*", matchCriteriaId: "187F699A-AF2F-42B0-B855-27413140C384", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*", matchCriteriaId: "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*", matchCriteriaId: "62EDEC28-661E-42EF-88F0-F62D0220D2E5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*", matchCriteriaId: "F821EBD7-91E2-4460-BFAF-18482CF6CB8C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*", matchCriteriaId: "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*", matchCriteriaId: "C9B825E6-5929-4890-BDBA-4CF4BD2314C9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*", matchCriteriaId: "65020120-491D-46CD-8C73-974B6F4C11E6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*", matchCriteriaId: "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*", matchCriteriaId: "3F35C623-6043-43A6-BBAA-478E185480CF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*", matchCriteriaId: "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*", matchCriteriaId: "D2833EAE-94C8-4279-A244-DDB6E2D15DC2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*", matchCriteriaId: "4B688E46-5BAD-4DEC-8B13-B184B141B169", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*", matchCriteriaId: "8C8F50DB-3A80-4D89-9F7B-86766D37338B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", matchCriteriaId: "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*", matchCriteriaId: "3F13F583-F645-4DF0-A075-B4F19D71D128", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", matchCriteriaId: "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*", matchCriteriaId: "01B53828-C520-4845-9C14-6C7D50EAA3A8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*", matchCriteriaId: "623BF701-ADC9-4F24-93C5-043A6A7FEF5F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*", matchCriteriaId: "E5311FBE-12BF-41AC-B8C6-D86007834863", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*", matchCriteriaId: "52FB055E-72F9-4CB7-A51D-BF096BD1A55D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*", matchCriteriaId: "0FBD681F-7969-42BE-A47E-7C287755DCB5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*", matchCriteriaId: "98255E6F-3056-487D-9157-403836EFB9D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*", matchCriteriaId: "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*", matchCriteriaId: "57D4F634-03D5-4D9F-901C-7E9CE45F2F38", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*", matchCriteriaId: "4463A1D1-E169-4F0B-91B2-FA126BB444CB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*", matchCriteriaId: "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*", matchCriteriaId: "CDD58C58-1B0C-4A71-8C02-F555CEF9C253", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*", matchCriteriaId: "96852D16-AF50-4C70-B125-D2349E6765D7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*", matchCriteriaId: "A15B882A-BA60-4932-A55E-F4A798B30EEB", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*", matchCriteriaId: "5C9C585C-A6EC-4385-B915-046C110BF95F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*", matchCriteriaId: "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*", matchCriteriaId: "47DBE4ED-1CD8-4134-9B33-17A91F44F17B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", matchCriteriaId: "119A964D-ABC8-424D-8097-85B832A833BD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*", matchCriteriaId: "0375BF9E-D04B-4E5B-9051-536806ECA44E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*", matchCriteriaId: "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*", matchCriteriaId: "012A6CF7-9104-4882-9C95-E6D4458AB778", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*", matchCriteriaId: "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*", matchCriteriaId: "78DE7780-4E8B-4BB6-BDEB-58032EC65851", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*", matchCriteriaId: "F29CEE37-4044-4A3C-9685-C9C021FD346A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*", matchCriteriaId: "3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*", matchCriteriaId: "5292764A-7D1C-4E04-86EF-809CB68EDD25", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*", matchCriteriaId: "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*", matchCriteriaId: "1E16D266-108F-4F8A-998D-F1CA25F2EAAD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*", matchCriteriaId: "F84AE35F-D016-4B8F-8FE2-C2ACB200DFED", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*", matchCriteriaId: "41D55481-C80E-4400-9C3D-9F6B1F7F13CE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", matchCriteriaId: "E4BF9829-F80E-4837-A420-39B291C4E17B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*", matchCriteriaId: "D07F9539-CFBE-46F7-9F5E-93A68169797D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", matchCriteriaId: "F5AB80E7-0714-44ED-9671-12C877B36A1E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", matchCriteriaId: "10182B94-6831-461E-B0FC-9476EAB6EBEF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*", matchCriteriaId: "961F8312-31B9-44E7-8858-EF8E2134F447", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*", matchCriteriaId: "3D62EE1B-9A59-406C-B7DF-91B495F3ECFE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", matchCriteriaId: "DB6BD18B-B9BD-452F-986E-16A6668E46B6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*", matchCriteriaId: "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*", matchCriteriaId: "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*", matchCriteriaId: "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*", matchCriteriaId: "04081A51-E08F-4114-9276-584E836181D3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", matchCriteriaId: "ADED0D82-2A4D-4235-BFAC-5EE2D862B652", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*", matchCriteriaId: "62A46516-CEB7-48D4-879B-341963A1FA31", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", matchCriteriaId: "D6EF98FA-6DF9-4935-9639-143E08462BC4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*", matchCriteriaId: "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", matchCriteriaId: "0A443E93-6C4B-4F86-BA7C-7C2A929E795A", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", matchCriteriaId: "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", matchCriteriaId: "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", matchCriteriaId: "314C7763-A64D-4023-9F3F-9A821AE4151F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", matchCriteriaId: "5820D71D-FC93-45AA-BC58-A26A1A39C936", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*", matchCriteriaId: "FC1C85DD-69CC-4AA8-B219-651D57FC3506", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", matchCriteriaId: "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*", matchCriteriaId: "B53E377A-0296-4D7A-B97C-576B0026543D", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", matchCriteriaId: "C98DED36-D4B5-48D6-964E-EEEE97936700", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", matchCriteriaId: "CD98C9E8-3EA6-4160-970D-37C389576516", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", matchCriteriaId: "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", matchCriteriaId: "9027A528-2588-4C06-810B-5BB313FE4323", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", matchCriteriaId: "7745ED34-D59D-49CC-B174-96BCA03B3374", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", matchCriteriaId: "19AF4CF3-6E79-4EA3-974D-CD451A192BA9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*", matchCriteriaId: "313BD54C-073C-4F27-82D5-C99EFC3A20F7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*", matchCriteriaId: "93B96E01-3777-4C33-9225-577B469A6CE5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*", matchCriteriaId: "65FC3CC1-CF4F-4A2D-A500-04395AFE8B47", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*", matchCriteriaId: "D18B32E3-6B33-4E3D-879A-82E2F0BFC906", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*", matchCriteriaId: "46E37204-FC9A-4397-AFA4-9CAC7A116D55", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.1za:*:*:*:*:*:*:*", matchCriteriaId: "027200FC-8AD4-47E4-A404-490AE4F997EC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*", matchCriteriaId: "E5019B59-508E-40B0-9C92-2C26F58E2FBE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*", matchCriteriaId: "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*", matchCriteriaId: "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*", matchCriteriaId: "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", matchCriteriaId: "D5750264-2990-4942-85F4-DB9746C5CA2B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*", matchCriteriaId: "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*", matchCriteriaId: "B9173AD6-6658-4267-AAA7-D50D0B657528", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*", matchCriteriaId: "7F02EE9D-45B1-43D6-B05D-6FF19472216B", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*", matchCriteriaId: "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*", matchCriteriaId: "8FCB9440-F470-45D1-AAFA-01FB5D76B600", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*", matchCriteriaId: "3F66ECFE-B631-47AE-995F-024A4E586A85", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*", matchCriteriaId: "3BBFDD70-7AF3-47AE-94CA-56C19F2D6234", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", matchCriteriaId: "E306B09C-CB48-4067-B60C-5F738555EEAC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", matchCriteriaId: "CD446C51-E713-4E46-8328-0A0477D140D2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", matchCriteriaId: "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", matchCriteriaId: "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*", matchCriteriaId: "89369318-2E83-489F-B872-5F2E247BBF8F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", matchCriteriaId: "8B4D4659-A304-459F-8AB3-ED6D84B44C0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", matchCriteriaId: "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", matchCriteriaId: "B51FA707-8DB1-4596-9122-D4BFEF17F400", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", matchCriteriaId: "C04DF35A-1B6F-420A-8D84-74EB41BF3700", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", matchCriteriaId: "211CC9B2-6108-4C50-AB31-DC527C43053E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", matchCriteriaId: "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", matchCriteriaId: "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", matchCriteriaId: "128F95D7-E49F-4B36-8F47-823C0298449E", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", matchCriteriaId: "E21B3881-37E9-4C00-9336-12C9C28D1B61", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*", matchCriteriaId: "E54599DB-A85E-4EEA-9985-2CBF90E28A08", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*", matchCriteriaId: "4046C325-7EDB-4C95-AA98-541BEC8F9E0F", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*", matchCriteriaId: "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", matchCriteriaId: "2B270A04-9961-4E99-806B-441CD674AFBD", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", matchCriteriaId: "1360069D-0358-4746-8C3F-44C2A40988D7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*", matchCriteriaId: "C5DD2403-113B-4100-8BD4-90E1927E6648", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.3.3a:*:*:*:*:*:*:*", matchCriteriaId: "A35FFA44-9A59-4C20-9D86-C40B68BD5F77", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", matchCriteriaId: "5A6B707B-4543-41F1-83DF-49A93BF56FB1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*", matchCriteriaId: "DC8F611B-D347-4A21-90E6-56CF4D8A35A3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*", matchCriteriaId: "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:17.4.1c:*:*:*:*:*:*:*", matchCriteriaId: "298C82F9-79A6-4DB7-8432-8B3A6DA39620", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "4B4318C0-0FD0-46B3-8E23-94EC53A34A20", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "16FC6220-78E1-44A6-A596-6368D3EF7CC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "DCAEDE0A-E6F9-4727-8DC2-F47579220BE0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*", matchCriteriaId: "8E289FAD-04F0-4E3A-BC4D-8E5116F01AF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", matchCriteriaId: "6655851F-58D9-49D9-A56E-8440A7F7BB45", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", matchCriteriaId: "F5E2AE67-DED3-4414-A194-386ADB2C8DC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", matchCriteriaId: "3920133A-684D-4A9F-B65A-FF4EAE5052E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", matchCriteriaId: "9ED06361-5A68-4656-AEA5-240C290594CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp2\\):-:*:*:*:*:*:*:*", matchCriteriaId: "C02F9303-F9DF-4166-AB4B-8C26B9FAD109", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp3\\):-:*:*:*:*:*:*:*", matchCriteriaId: "372CB4D6-BB22-4521-9C18-C0A663717168", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0EAE214D-8DD8-4DA3-872A-609E7CE6E606", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c8200-1n-4t:-:*:*:*:*:*:*:*", matchCriteriaId: "CCF17101-9EF9-47BB-B966-0FA9B71AEEFA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c8200l-1n-4t:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F0C218-B0FF-4BEC-B76F-1F4BAA6D0960", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*", matchCriteriaId: "0B37D793-0EE3-49CA-98B2-3E1F3D561A9F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*", matchCriteriaId: "03F5F6FA-9499-4232-A80A-494CE287A87A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*", matchCriteriaId: "58918BAA-7070-4901-B1C8-344E8A4DBEE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "08B9D533-FCF5-4B35-A0D2-2EA1E4A907AE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*", matchCriteriaId: "C809A939-105E-471E-A150-859015641989", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*", matchCriteriaId: "B2C657B7-172E-4E85-8027-4B5563F2CE14", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*", matchCriteriaId: "0B42926F-0841-4D40-BABE-852893C6020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "381144D6-7CDE-46E6-ADE7-76372740F283", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650:-:*:*:*:*:*:*:*", matchCriteriaId: "7814FA61-CAF1-46DE-9D84-CEBE6480EA03", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7EE4F60E-DF3D-4839-8731-7CF16DA8FF26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8EA5EEE3-A084-46B4-84C0-ADFD69800649", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "592F67D5-344B-49AF-A277-1089A40AC2FD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*", matchCriteriaId: "7434059A-25B8-4FAC-A756-6E571348B76E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DB2A5355-BF40-437C-8683-A7A81DEE362C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "43F4B90E-3499-45D4-864D-18505E2149F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*", matchCriteriaId: "858FEECF-CC69-4E68-8E8A-674643021964", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BE5FCCFF-E491-474F-9B86-AB51D8244582", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*", matchCriteriaId: "EA8464F8-D6D2-4165-ADE8-B40F7D8556C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*", matchCriteriaId: "61007628-A81B-43E0-86DE-1F7DDAD9F1A7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*", matchCriteriaId: "91B9F022-4C3D-493E-9418-E9CDDAFEC9B1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-l:-:*:*:*:*:*:*:*", matchCriteriaId: "B39F250E-6A89-4537-BD31-1FB81734A9A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-12x48uz-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CB4E3B69-DDE8-4EA2-8E63-D6EEF41083B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*", matchCriteriaId: "8904EAF5-25E7-4A6B-8117-1859F913B83B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A369CD35-1242-4556-A83D-BD69CC149CFA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "784A1499-1F33-493D-B433-EB2550C03C19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*", matchCriteriaId: "59A990D6-B748-4AFD-B924-1D19680BD3DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CECFC88D-5480-46E4-BF74-E11A514A8BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E54D16A8-0407-41E3-9599-9A6F57E1AA75", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DF3818CC-8653-4A9E-A57B-950A15914D6B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7EDC790B-B42D-45DB-ACF5-A789F76C2BC4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2A6BC84-91F2-437D-9D2E-F8B3F5966767", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7F331F13-5D05-4213-B442-D48D8E22287B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A6E312F4-90DA-40E4-BCD1-92F41BEEEECF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CA32EA3F-946D-430D-B00F-939D828DD72C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D239A09C-34D2-4418-B538-03A1080B8479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2C84561E-DD99-4433-9EF2-083F7C300123", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "B29871BE-CA7D-4108-B46A-CBD539C9A2B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "39CD9189-6524-4157-B90E-FF6A81DE3599", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2CF1B702-643A-4AF2-B0AD-3C540CF85F2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "96269625-CB31-4850-872B-B2C1321B13B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq:-:*:*:*:*:*:*:*", matchCriteriaId: "426B68A6-3A41-43DB-846F-AEFBA62E221B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5BDE086A-3FE5-46E3-BD66-23D0AE5089BE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "FA53775A-D3ED-4D34-8338-A384DBEB94E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7D4522-D6BB-467F-AF5D-4D753A89D524", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*", matchCriteriaId: "9C96215F-A300-4B4E-9D3A-C32E484BFC5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0C680534-C663-40B0-A4AA-7F292EE60FE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*", matchCriteriaId: "BAF4F233-7B47-46ED-BDC5-A589BCFC0B39", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "4A528EC0-4650-4787-BE52-A588E7E38A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "53898E96-03D6-43A2-AE05-46C62464BD26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*", matchCriteriaId: "465917E5-8BF0-4BBB-85A0-DE8F516880C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "D9FA66D9-E465-406E-A95C-608A1BE34D74", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "1456B204-A2A5-4790-A684-7F50D692EC9F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "AD715BDD-7C74-4785-BEDF-75918F6FB37A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "4CD10664-94D0-48C0-92EF-E8EA66841245", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "071A47F9-FF35-4F2C-BF5D-897CAC8BC08A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "9E988448-36C9-47E0-9356-DA400EB824E3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*", matchCriteriaId: "9D067EF9-00DB-4979-B12E-55749059A083", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*", matchCriteriaId: "A9FA300A-44B1-44EE-8111-C1296EB0B638", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8598A543-B30B-4BD4-9974-F432FFFDCDD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*", matchCriteriaId: "48DEBBAD-D28D-4784-BBD8-9FAD1710A919", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8A5FC516-6B48-4D77-B26D-FA097AC91D1A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*", matchCriteriaId: "6A7437E4-5C09-436C-AFBC-F6B6747A4339", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ECBC0277-4990-4DE7-AD80-20E8A6F561D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "6E7DAF69-662B-4999-A6AD-AA528B53EAF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D28306B1-3DDE-4444-9784-522B3D2163EE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*", matchCriteriaId: "9257D187-1F2D-40F4-8C87-78978DB56C3F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*", matchCriteriaId: "5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AF8261-74E0-4F53-B82C-A7BA7559D7CB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*", matchCriteriaId: "25AE251E-E99F-4546-85B0-C57834B040B7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C62FFCB9-4253-459B-9298-C252DA9177DB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*", matchCriteriaId: "991CBDFB-6836-4D1F-80A9-14EBCE3F855F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B4C0250-DA0D-4CEE-99F4-C211163C6653", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*", matchCriteriaId: "8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8D453BF6-AB9F-4D47-B4DF-C25C67358FFE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*", matchCriteriaId: "005F5347-A5E6-4954-ACAB-E4DF29119724", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2A8413-DF92-4690-8BC1-A21001BDF76B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "882B8D8F-E154-45C3-BB47-5353167C9776", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*", matchCriteriaId: "C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A54B4EB4-EB41-4522-B7AB-C30F96099EA3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EAD7BE51-0BA6-4750-B274-A6E33D32B484", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "44C3EF8E-DF88-46DC-8E06-B009F346D1D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7E87F823-D924-4718-AD81-248A6C619531", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CCAC93E0-F982-4E37-866E-43B7BC5AC82E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC866C9-BB98-4320-9FFA-F0960C560DA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C3AD7495-3DA2-4596-9620-CD36D7C561AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E492F3F8-4188-41E4-9A84-5E30C4AC3378", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "718F2FDC-9EA4-4C4C-8821-B15E56AF8101", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "EC5CB558-BD42-4615-BC31-41CCF25DE5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E45BCCD0-65BB-431F-B448-221C1595CD92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F33BA722-0680-4074-8D03-41657F8CDCC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", matchCriteriaId: "295C46B4-5E9F-4DD8-861B-00BA43923306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "431570C7-74A1-4F7E-8FD0-690AEF0F823B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C5D22E15-E1E8-4115-A55F-5743CA9C5947", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*", matchCriteriaId: "F840171D-CA1C-4E25-BD41-6B871C47BB84", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B240B20-CF48-4A72-9653-9D04D59C1391", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", matchCriteriaId: "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", matchCriteriaId: "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74CCD143-3D6E-4880-B275-ECF5B04238C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D3784F-C572-4A6F-83B9-BCF64D339BC9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E09C466B-CE87-4A57-B40B-88C94BAAF36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", matchCriteriaId: "D58FF034-8E07-4518-A858-5F16F22217E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "376AD386-373D-4B24-966F-D11F76C9020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2280CAA3-03F6-4168-8E50-A6B7132A3B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0C1174-C789-4547-9899-F7FCD0905F92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EC366801-655A-403B-ACD9-3BB43802A3C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FF5463D0-A8D3-43EC-8CFF-F659A8C84436", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "05D4D7E4-B195-46D8-8A6B-6AA4B8357618", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "39600E51-4A21-4E5B-9FF9-E7C00AE86646", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "47E4D5A8-7E4A-44C5-81DC-84712781206D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B13D6D50-D0FA-4527-BED3-52560DDD5253", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "965BF315-D833-4711-97FC-512151113367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", matchCriteriaId: "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "04072C0F-78A2-4D10-87B2-52DC2537BA89", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5C080E-D5C4-47B2-A46C-4EB3051C5221", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "41CEBEE0-DA67-4EE5-9BCF-263843053A8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FD262F58-C47F-439E-A9FF-D1C60120D306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "35490BDE-DF21-495E-9F8A-7631FCB32A1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", matchCriteriaId: "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", matchCriteriaId: "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "0972076B-5C87-44B3-90EC-4C200B89318A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74AED057-2458-4DE0-8D51-ABD766D07F68", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "19538C03-5FB8-4401-8B21-489C629D7E7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B26D7061-F471-4DF0-A892-ED132958B84A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "033ED443-80E7-4012-9825-07AAC0D44B96", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "AD3F3CC6-A349-47B1-B282-B6458683C191", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CB24EF21-1C10-48A7-BC68-FFC842A28D12", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ED0625A2-BF14-4552-83D8-AEE0A04EA023", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", matchCriteriaId: "21AFDC0D-7629-424E-827B-C8A8767324C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "A263CFF2-A659-405B-90EA-51E49B25C6D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFBD449-217D-4569-99F7-D56B853A3E07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED668FC-D1A5-4175-A234-23760BA6E788", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0D650C48-9241-42F7-87A9-20733329489A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3ED16A65-9AFF-4825-95D1-162FBA0F566D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82D345E7-8208-41AC-B11A-4425D29E98A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E386D461-F1C1-4970-B056-D6119E74D449", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "99F3A466-F665-4132-ABC4-2DFC0A7E2B55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B3395168-FF2E-4CB6-AABE-5E36DEB241CA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "226F985C-4669-4D0A-9DB4-CB1465B37B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0B736A43-6F4E-40A9-84E4-D9E251489234", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", matchCriteriaId: "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E99CA124-7D86-463B-A31E-A7836B7493E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E014B028-8DD9-428C-B705-8F428F145932", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A6C44229-A842-49B2-AD3E-79C83DB63EBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5306E847-C718-4C83-9C97-8AB498DC4A88", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "18287CEF-B574-4498-A256-567CA6E6CA7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "1E9AAA2C-495E-4FD1-9050-264FDC25254B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5713043E-2535-4540-B3EF-41FAC40BECE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "67701D77-8B03-446A-AE22-4B8CCCD6F029", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "831A2390-7170-4FC0-A95E-3DAB1791017D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "F788CBC4-782F-4A43-AC80-4AEF1C43A22D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "493989DC-8F1B-45C9-AD11-38B97B958C9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", matchCriteriaId: "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", matchCriteriaId: "737F22AB-C5A9-4A18-BA3D-38A222491397", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "2E5DCFD5-2B46-4D06-9E4C-B2325F440F02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "D5508320-8318-41A8-8026-4A61907C1CD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD337D8-8C72-4025-A8C3-E63598DE7BDB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", matchCriteriaId: "176ACF88-6112-4179-8492-50C50577B300", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", matchCriteriaId: "C19A801D-02D7-40B0-88E8-FE7BA8630E60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA59279-3504-417D-9E86-E5886EE198BD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "8E283C34-43AE-49A5-A72B-32DEA185ABD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB3AF13-5324-42CD-8EDB-6F730BF46214", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "78706517-83F4-4D44-A6EC-B78ADCEABAC0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_cg418-e:-:*:*:*:*:*:*:*", matchCriteriaId: "25CE5302-0BA9-4155-A68B-3CD735F64A9F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_cg522-e:-:*:*:*:*:*:*:*", matchCriteriaId: "405B9D5D-09E9-48D9-A164-04A6DCE41482", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ess9300:-:*:*:*:*:*:*:*", matchCriteriaId: "9A80AB4A-A121-4777-BD99-62D658A3DE22", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "86879AC0-890E-42F4-9561-6851F38FE0AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "19017B10-F630-42CD-ACD2-E817FEF0E7F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "04A41A34-58D2-4DBC-ABC9-20A62BC8A838", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cbr-8:-:*:*:*:*:*:*:*", matchCriteriaId: "AB77D0EC-A448-4D97-8EB0-EA4956549A52", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "BF8B0B49-2C99-410B-B011-5B821C5992FB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*", matchCriteriaId: "44D19136-4ECB-437F-BA8A-E2FE35A39BF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess-3300-24t-con-a:-:*:*:*:*:*:*:*", matchCriteriaId: "D4C98B90-69B3-4BDF-A569-4C102498BFAD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess-3300-24t-con-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7646B0A1-FDF5-4A60-A451-E84CE355302E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess-3300-24t-ncp-a:-:*:*:*:*:*:*:*", matchCriteriaId: "FA889066-14A8-4D88-9EFF-582FE1E65108", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess-3300-24t-ncp-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2A0C09AE-CD2A-486A-82D4-2F26AA6B6B95", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess-3300-con-a:-:*:*:*:*:*:*:*", matchCriteriaId: "BEF81CC0-AEED-42DE-B423-8F4E118680BA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess-3300-con-e:-:*:*:*:*:*:*:*", matchCriteriaId: "EDAAFDF1-7A3C-475F-AE82-B3194939D401", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess-3300-ncp-a:-:*:*:*:*:*:*:*", matchCriteriaId: "9566FC8C-0357-4780-976F-8A68E6A7D24A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ess-3300-ncp-e:-:*:*:*:*:*:*:*", matchCriteriaId: "07503D21-965B-49F0-B8F2-B5ECD656F277", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:isrv:-:*:*:*:*:*:*:*", matchCriteriaId: "DA48CFE9-2791-40D2-9F33-763C97F7D988", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.", }, { lang: "es", value: "Una vulnerabilidad en el soporte de Intercambio de Claves de Internet Versión 2 (IKEv2) para la funcionalidad AutoReconnect de Cisco IOS Software y Cisco IOS XE Software podría permitir a un atacante remoto autenticado agotar las direcciones IP libres del pool local asignado. Esta vulnerabilidad ocurre porque el código no libera la dirección IP asignada en determinadas condiciones de fallo. Un atacante podría explotar esta vulnerabilidad al intentar conectarse al dispositivo con un cliente que no sea AnyConnect. Una explotación con éxito podría permitir al atacante agotar las direcciones IP del pool local asignado, que impide a usuarios iniciar sesión y conlleva a una condición de denegación de servicio (DoS)", }, ], id: "CVE-2021-1620", lastModified: "2024-11-21T05:44:45.400", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 3.5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:M/Au:S/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 6.8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-23T03:15:13.030", references: [ { source: "psirt@cisco.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-563", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-772", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-13 19:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/108350 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot | Vendor Advisory | |
psirt@cisco.com | https://www.kb.cert.org/vuls/id/400865 | Third Party Advisory, US Government Resource | |
psirt@cisco.com | https://www.us-cert.gov/ics/advisories/icsa-20-072-03 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108350 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/400865 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.us-cert.gov/ics/advisories/icsa-20-072-03 | Third Party Advisory, US Government Resource |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "524E28A1-ABD9-416B-804C-EFFD7F822DE5", versionEndExcluding: "1.1.15", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*", matchCriteriaId: "763B801D-CA1E-4C56-8B06-3373EA307C7E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*", matchCriteriaId: "30AC6907-3091-409F-967D-64A82A0C5A8C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*", matchCriteriaId: "D11AF728-8EB0-45EB-A7DD-F2D52B3BB7B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*", matchCriteriaId: "92AE506A-E710-465B-B795-470FDE0E0ECA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*", matchCriteriaId: "1E07AF10-FFB2-4AC7-BBE7-199C3EFED81F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "32B7016C-C909-4F30-A80E-E30E9C2FB607", versionEndExcluding: "2.6.1.134", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*", matchCriteriaId: "52D96810-5F79-4A83-B8CA-D015790FCF72", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*", matchCriteriaId: "16FE2945-4975-4003-AE48-7E134E167A7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*", matchCriteriaId: "DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*", matchCriteriaId: "976901BF-C52C-4F81-956A-711AF8A60140", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0B8DB36E-D0AC-4FFC-8FDB-C5520689013A", versionEndExcluding: "1.0.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", matchCriteriaId: "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", matchCriteriaId: "38AE6DC0-2B03-4D36-9856-42530312CC46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", matchCriteriaId: "3DB2822B-B752-4CD9-A178-934957E306B4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", matchCriteriaId: "65378F3A-777C-4AE2-87FB-1E7402F9EA1B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E924AE61-94D5-4A68-A586-CA7119487F67", versionEndExcluding: "1.0.18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "07DAFDDA-718B-4B69-A524-B0CEB80FE960", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F8A7F11-B920-4C5B-B3CA-D29740FFE891", versionEndExcluding: "11.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*", matchCriteriaId: "BEBE1DDE-6C69-45EC-A666-D9596E8721DA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*", matchCriteriaId: "00BCB49E-E2D2-4374-8D48-A287FC538F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*", matchCriteriaId: "637D7CA3-89CD-418A-BF87-0935A7805173", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*", matchCriteriaId: "4CBE2B16-B9AD-4ED2-AE18-7087C478FEEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*", matchCriteriaId: "D94B415B-08E2-4845-BD11-7EBCD08215E0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*", matchCriteriaId: "784ECC2E-F4AC-4430-9F33-9B1DBD89692F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*", matchCriteriaId: "8A34FAE4-7B2A-47BF-AB0A-5FAF8E8920CE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*", matchCriteriaId: "3FADBF85-52F4-468C-A44C-5107484757EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*", matchCriteriaId: "90E418C4-F91B-4E0D-B1DC-2B099D991F80", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*", matchCriteriaId: "E22A4B07-04DF-4AF2-B2A9-E4430C4F3A64", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*", matchCriteriaId: "DFDCD640-E1BB-48F8-BEB4-85AAF7099FA2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*", matchCriteriaId: "893147FC-1AD0-441C-B031-6C432ED2FFD8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*", matchCriteriaId: "DE30FCF9-DFF6-419C-8DCA-0B695E3FADE7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*", matchCriteriaId: "239EC4DE-5E2C-44D7-9C32-BFCD854670AC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*", matchCriteriaId: "F2956624-92FC-43D7-A038-15071A90E0B4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*", matchCriteriaId: "988125C4-DB88-438F-8F6D-0992424081A5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*", matchCriteriaId: "AD9B34B9-78EC-49AE-B342-F2BAD63CD50C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*", matchCriteriaId: "5D258F96-93A5-455E-9542-2C95B3D31455", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*", matchCriteriaId: "B443FC34-767F-45B4-8516-A1A8B6C8D917", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*", matchCriteriaId: "08C3403A-3943-4A69-A536-3FA6DEDFF21B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*", matchCriteriaId: "7259F6BC-BA31-47E4-BFA6-647068A946CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*", matchCriteriaId: "3F825D9C-25C6-4F76-A7EE-F61A548A0CE1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*", matchCriteriaId: "360B9A25-5272-487A-AF1A-CE2FDFD6F23C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*", matchCriteriaId: "77C59A0F-F256-42C3-A3E1-71F02614F55A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*", matchCriteriaId: "3ADE8708-95D4-4D30-85ED-BE870410F3B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7F99FC1A-2738-468B-BD01-4F715A1B7809", versionEndExcluding: "11.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "90242967-37AB-4124-87DE-D826A3895BE7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "EB99D062-EE0C-4695-AA4D-2DCE3E2B15AF", versionEndExcluding: "16.12.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D6CCBE67-E509-43EC-9AFB-8A9B6A115126", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "39C9F8C2-9E34-4027-9112-42AEC0B84F7C", versionEndExcluding: "16.3.9", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "76843179-3569-4556-9F4C-6543B8A8E1DE", versionEndExcluding: "16.6.7", versionStartIncluding: "16.4.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "1B526102-9DDC-4E23-B582-DEF7EA35E42C", versionEndExcluding: "16.9.4", versionStartIncluding: "16.7.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "F50DDAE4-2C87-4B8B-9BCB-2FD32A6976D6", versionEndExcluding: "16.12.1", versionStartIncluding: "16.10.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "C56A1D02-3061-40C5-AD87-0BEA869838F4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*", matchCriteriaId: "1F98C767-8E9F-4B01-A09E-359A496B2B3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*", matchCriteriaId: "0FCAA286-6B36-4EB7-9AE5-CA082D125E78", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*", matchCriteriaId: "F6B1C2CF-0EF1-428F-8FB8-D45E4C6CB340", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*", matchCriteriaId: "450EA21E-68E0-4617-85A9-9C39B96E12ED", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*", matchCriteriaId: "17B65497-2EAC-4B9E-9D05-58A0B6D1F399", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "35726753-BAA4-479F-AF9C-F4D012881F83", versionEndExcluding: "15.6\\(3\\)m7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "7A3FBAE1-F786-4799-AF70-6E7B5DC19BB9", versionEndIncluding: "15.7\\(3\\)m5", versionStartIncluding: "15.7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "72240B45-0D8E-4EA6-8208-068BF6EF8B30", versionEndExcluding: "15.8\\(3\\)m3", versionStartIncluding: "15.8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "B7F56D01-F647-452D-A564-4198A893BC70", versionEndExcluding: "15.9\\(3\\)m", versionStartIncluding: "15.9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6835F8AD-B55D-4B57-B3B5-0095E309B2B3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "83AA5C75-B959-4167-906C-BE9C84C7E676", versionEndExcluding: "1.0.05", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*", matchCriteriaId: "6FBBA8E7-14B2-4869-8ED4-72F120E547FC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CB084F19-E475-41FA-A72F-23D4D6913523", versionEndExcluding: "1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C49E8AE0-745B-459C-AAD9-D41690D48DDE", versionEndExcluding: "1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BC5D8FF8-60F8-4F89-A488-F815D0FB00E1", versionEndExcluding: "1.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "13C3D17D-DD95-49CA-918A-A0F5289B0C3D", versionEndExcluding: "15.6\\(3\\)m6b", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "DA254534-247F-47BA-B146-0E3B7E9F9269", versionEndIncluding: "15.7\\(3\\)m4b", versionStartIncluding: "15.7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "E0F05F3A-A38F-4922-AE54-BE1BC64C4B7C", versionEndExcluding: "15.8\\(3\\)m2a", versionStartIncluding: "15.8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", matchCriteriaId: "3C996F3B-0333-4B9A-B3E7-F50E64B0AAB3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D05CC9-8D04-4DE0-A854-375192B4D46C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "64C3BBBB-4349-4D2B-9944-84BE03407650", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*", matchCriteriaId: "76B7C13F-46C5-460A-A6C9-3837A28A0CE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*", matchCriteriaId: "77D24BB4-6357-4BFC-A4CB-B33ECDEB3BEE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*", matchCriteriaId: "1B1F849A-05BA-4CA2-96AA-F8DFD5E725A5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*", matchCriteriaId: "AB060D83-2924-4D1D-9FEE-F8087FA8976D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*", matchCriteriaId: "8CF4D0E5-FF09-4919-B603-B42DB535386C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*", matchCriteriaId: "22C36989-4353-4B81-8B0F-FC6322C1C179", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*", matchCriteriaId: "A267A86B-144D-46C3-9F63-95606106A5B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "C807F789-3038-42C3-B5EB-6CD628EBF718", versionEndExcluding: "16.2.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*", matchCriteriaId: "DED2353D-A508-4764-975F-57F9DACD91FA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*", matchCriteriaId: "9EBA765C-B6F0-4D4D-8933-06E655084AF4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "CC6F34E1-7DE4-459B-AF41-D973201ADC49", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*", matchCriteriaId: "D8DAC3AF-FEFC-4B14-A7BE-7008E65FD012", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*", matchCriteriaId: "7FCA2DB2-AE09-4A99-90C9-60AE0CD9A035", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*", matchCriteriaId: "11B83BED-5A49-4CF0-9827-AA291D01F60E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*", matchCriteriaId: "2C1E8937-51D9-43E6-876E-5D39AD3D32C4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA7AE63-99B9-4F28-8670-639A9B31E494", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*", matchCriteriaId: "E858B4AB-49B1-4F1C-8722-6E6911194924", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*", matchCriteriaId: "577D1BF2-5180-4301-941C-3C0ADDD23AA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*", matchCriteriaId: "9FE70CCD-6062-45D8-8566-7C9E237E030F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA3A897-ED4E-417F-BA6C-C1A825A210F6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*", matchCriteriaId: "375F9E12-A61B-4FD3-AE07-D4E686EB112A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*", matchCriteriaId: "D724F932-4548-429D-8CAA-E82C3435A194", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*", matchCriteriaId: "0BCC94C3-9EEF-4600-BE82-8AEDEB0F1446", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*", matchCriteriaId: "16088337-C057-4271-B5C7-74FE1573B0F0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*", matchCriteriaId: "A69B8AFD-17F5-4809-BDB9-3337BA52BC58", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "6A628A7B-FE58-4881-B705-C3BCBED6F201", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*", matchCriteriaId: "0A9C769E-ED9C-4F06-928D-CC7FFBA54EC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*", matchCriteriaId: "C5B19A31-99E3-4141-9FE8-7A5FD16FAE5C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*", matchCriteriaId: "DB1DFCD7-F14A-4530-8E36-55FE0EE1E7C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "84C89BB9-D62D-4E36-8BFD-D583F383120D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*", matchCriteriaId: "88262B7E-8C2F-49FE-9F58-8A1C78285A93", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*", matchCriteriaId: "C6109DBC-5489-4FF9-B940-E174126488AB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA59279-3504-417D-9E86-E5886EE198BD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*", matchCriteriaId: "C44B33A5-DB73-4A3B-AA5B-97B8493AD28B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*", matchCriteriaId: "CAB82552-DD9D-45C9-8296-B4C8D510FFA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*", matchCriteriaId: "82AF763B-9299-4EDC-B42D-B83736839CA1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*", matchCriteriaId: "C4EA89F6-14B5-4EC7-BAEB-E783FF1982AB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*", matchCriteriaId: "E5BF29D2-7C65-4724-B6AE-249BB22725CE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*", matchCriteriaId: "D55DC09B-CF82-4461-8886-BE90451BFF9E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*", matchCriteriaId: "F393681D-7EC1-46D5-BAFB-786528E259B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*", matchCriteriaId: "ABE8CE5B-09CF-4138-9495-7223FFA64443", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*", matchCriteriaId: "15AEC57E-7851-4C8D-AB02-A932C3929F26", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*", matchCriteriaId: "B14DB778-9B07-4AFF-8BF3-4631B23501BD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*", matchCriteriaId: "326F9936-57E7-4E8F-9C51-093788454A3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*", matchCriteriaId: "884F1D0A-8A6F-45E4-9AC7-A8603AB8AE4E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "7D54F012-3136-4CA8-B119-FD7446EC96C6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "0514874D-C8F0-496E-9B04-FA699B339EEE", versionEndExcluding: "15.5\\(1\\)sy4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*", matchCriteriaId: "F508C81E-D31B-44BA-82C8-FEDA00324B8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*", matchCriteriaId: "05A9E0CA-BB70-4F74-BAD6-BE80669D1699", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*", matchCriteriaId: "4CAE1989-0E75-414E-BCB3-E0057F1492E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*", matchCriteriaId: "B1A1BA05-615E-4304-992D-6EEA176D852F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*", matchCriteriaId: "D883A807-6909-4087-892B-1E505521EA7A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*", matchCriteriaId: "DE2D76C8-552A-44C2-9C30-0CF31F6BC719", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "649A1287-A03D-48B8-ADFA-26F175366C91", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*", matchCriteriaId: "8776111D-894D-4EEB-8ADD-A9AC26AE30D6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "975D2EC3-3499-48FD-87F2-4BAD1CDB0E4C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "27ACCA11-D39B-468E-9C3C-BBF110ED3581", versionEndExcluding: "16.9.4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "5BB36C23-9303-4E3D-8C4A-B2E2150CF3FE", versionEndExcluding: "16.12.1", versionStartIncluding: "16.10", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*", matchCriteriaId: "0B37D793-0EE3-49CA-98B2-3E1F3D561A9F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*", matchCriteriaId: "03F5F6FA-9499-4232-A80A-494CE287A87A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*", matchCriteriaId: "58918BAA-7070-4901-B1C8-344E8A4DBEE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "08B9D533-FCF5-4B35-A0D2-2EA1E4A907AE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*", matchCriteriaId: "C809A939-105E-471E-A150-859015641989", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*", matchCriteriaId: "B2C657B7-172E-4E85-8027-4B5563F2CE14", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*", matchCriteriaId: "0B42926F-0841-4D40-BABE-852893C6020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "381144D6-7CDE-46E6-ADE7-76372740F283", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "902D1451-9E2E-4BC3-8B61-D87C142F4485", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "8E283C34-43AE-49A5-A72B-32DEA185ABD3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "59CD23DF-9B9D-459F-A3BF-F2D53FBDAF71", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB3AF13-5324-42CD-8EDB-6F730BF46214", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "13174CD9-8564-4041-93EC-8E8D7F4F3443", versionEndExcluding: "1.0.2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "B443B2C3-E3C1-4ADF-BF9B-164D00318B08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", matchCriteriaId: "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053", versionEndExcluding: "8.4.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "ECE54217-EF6D-4191-9267-113041B14A08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6DE58C19-66CD-45DD-BF5C-C333A30AA096", versionEndExcluding: "11.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "6EFF3999-1FF6-42C0-BE62-3FA227297264", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*", matchCriteriaId: "E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*", matchCriteriaId: "966F7DF8-1F20-4A74-B633-8B5AEE63C193", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*", matchCriteriaId: "46EA0E17-C399-4DA0-A550-F5469CC82F3F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*", matchCriteriaId: "41C4BF85-7077-463B-8E52-F67949849123", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*", matchCriteriaId: "F9102353-A21A-41C2-AA0B-9B00F66B693E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*", matchCriteriaId: "1536A363-E423-42DD-928B-FC6E91264371", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*", matchCriteriaId: "AB4F5CA4-BBD2-4DC9-8F99-9CC1B2A90BF2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*", matchCriteriaId: "A2442B13-F163-4219-AED9-7FA4CCD1A8D6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*", matchCriteriaId: "7617BA24-6474-49CF-B78D-0056D3F8385B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*", matchCriteriaId: "C3DCE7D6-0E78-4CF3-BF7A-6A4945ADD4F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*", matchCriteriaId: "344675F6-9045-492D-9577-E0CE333AD6E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*", matchCriteriaId: "BC7F2221-B5BE-408C-BA84-9776469EE2D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*", matchCriteriaId: "D8D61548-61B4-4B53-8574-9DB92B00A627", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*", matchCriteriaId: "4FF08FAF-67DD-4361-947A-40D5938DB8BA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*", matchCriteriaId: "1CE2AD36-5D52-4489-AAC1-A7AC1B3D2581", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FEA95-703B-44E0-A7CA-9E38B2EB1980", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2D37BF94-9D5F-4A88-8115-3A88FF144845", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C33F0D81-1314-440B-9FC2-56D76CA4CD79", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*", matchCriteriaId: "8E50806D-115D-4903-A5B2-62654FFDD9F5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*", matchCriteriaId: "15AE071E-0CEF-4305-A92D-9F4C324BD4ED", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*", matchCriteriaId: "3E007368-04AF-49C7-892F-ED2BB1E4EA61", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*", matchCriteriaId: "9DBEF775-EC98-4391-BAD2-61870A7DEE88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", matchCriteriaId: "68A586A3-0291-4BA3-9211-6EE0BBB7F39C", versionEndExcluding: "9.3\\(2\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*", matchCriteriaId: "5AEB8547-3FA8-42F5-8106-57B0F994BEC5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*", matchCriteriaId: "E4D2069C-23A2-4113-B674-024D36E40BDD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*", matchCriteriaId: "572F9105-9B6C-4460-8B49-14812AC3DC28", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*", matchCriteriaId: "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*", matchCriteriaId: "FE8EFEE8-FC8D-480C-917E-24C3B8D56E29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "7482F9FB-CA6A-4CA2-B6FB-FD0DCDF603ED", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*", matchCriteriaId: "6487A95B-0D04-4ABA-B491-8A935694AFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "F2E84307-41BC-4F85-BC9A-FF02178765F8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "55A31452-5B60-4273-BA38-8FA684DED953", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3FCA39-927B-4C89-A58B-E6859ED8176A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*", matchCriteriaId: "D7B464B3-DE25-4980-ABC3-10D7C79C12E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*", matchCriteriaId: "214472EB-424C-48B7-8EF3-7B679A5042BF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", matchCriteriaId: "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053", versionEndExcluding: "8.4.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*", matchCriteriaId: "57E3CF0C-5AD0-4A30-9335-4945CBC04A60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*", matchCriteriaId: "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*", matchCriteriaId: "9AFA9BC1-3386-4AAE-A1B6-D81761D3EA9B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*", matchCriteriaId: "8E6AC35C-29B2-42C7-862D-D9AC3461D8D6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*", matchCriteriaId: "F33AB95C-62FC-48EC-84AB-5EFA5C061F3B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*", matchCriteriaId: "B6BF05BA-E0CC-45D6-963F-27F0BD7B3C4F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*", matchCriteriaId: "D409BDF3-9F35-4D94-9DF0-7B58A519A005", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "98B12A01-8EF8-4DDE-9A40-51A9BC7D42AC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*", matchCriteriaId: "696AFE49-10E1-4C56-93D3-F4118B3E01AB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD6741CC-EEA4-4DC8-A21B-DB84B861316B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*", matchCriteriaId: "678F3A32-372A-441E-8115-95181FBAF628", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF426F3E-4474-43C7-84F5-EF61957E5004", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*", matchCriteriaId: "01AE8153-6C23-46AB-BEAA-A6F27FDFEED7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.", }, { lang: "es", value: "Una vulnerabilidad en la lógica que maneja el control de acceso de uno de los componentes de hardware en la implementación Secure Boot de propiedad de Cisco, podría permitir que un atacante local autenticado escriba una imagen de firmware modificada en el componente. Esta vulnerabilidad afecta a varios productos de Cisco que admiten la funcionalidad de Secure Boot basada en hardware. La vulnerabilidad se genera por una comprobación incorrecta en el área de código que administra las actualizaciones en las instalaciones de Field Programmable Gate Array (FPGA) parte de la implementación del hardware Secure Boot. Un atacante con privilegios elevados y acceso al sistema operativo subyacente que se ejecuta en el dispositivo afectado podría explotar esta vulnerabilidad al escribir una imagen de firmware modificada en el FPGA. Una explotación exitosa podría hacer que el dispositivo se vuelva inutilizable (y requiera un reemplazo de hardware) o permitir la manipulación del proceso de comprobación de Secure Boot, que en algunas circunstancias puede permitir al atacante instalar y arrancar una imagen de software malicioso. Un atacante deberá cumplir todas las condiciones siguientes para intentar explotar esta vulnerabilidad: Tener acceso administrativo privilegiado al dispositivo. Poder acceder al sistema operativo subyacente que se ejecuta en el dispositivo; Esto se puede lograr mediante el uso de un mecanismo documentado de soporte o mediante la explotación de otra vulnerabilidad que proporcionaría a un atacante con dicho acceso. Desarrollar o tener acceso a un exploit específico de la plataforma. Un atacante que busque explotar esta vulnerabilidad en múltiples plataformas afectadas necesitará investigar cada una de esas plataformas y después desarrollar una vulnerabilidad específica de la plataforma. Si bien el proceso de investigación se podría realizar en diferentes plataformas, es poco probable que una vulnerabilidad desarrollada para una plataforma de hardware determinada opere en una plataforma de hardware diferente.", }, ], id: "CVE-2019-1649", lastModified: "2024-11-21T04:37:00.627", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-13T19:29:01.520", references: [ { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108350", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/400865", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/108350", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.kb.cert.org/vuls/id/400865", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "US Government Resource", ], url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-667", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2019-1649
Vulnerability from cvelistv5
Published
2019-05-13 19:10
Modified
2024-11-20 17:23
Severity ?
EPSS score ?
Summary
A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot | vendor-advisory, x_refsource_CISCO | |
https://www.kb.cert.org/vuls/id/400865 | third-party-advisory, x_refsource_CERT-VN | |
http://www.securityfocus.com/bid/108350 | vdb-entry, x_refsource_BID | |
https://www.us-cert.gov/ics/advisories/icsa-20-072-03 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Routers |
Version: unspecified < 16.12.1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:20:28.350Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190513 Cisco Secure Boot Hardware Tampering Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot", }, { name: "VU#400865", tags: [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred", ], url: "https://www.kb.cert.org/vuls/id/400865", }, { name: "108350", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/108350", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1649", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-20T16:55:08.575056Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-20T17:23:01.830Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Routers", vendor: "Cisco", versions: [ { lessThan: "16.12.1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-05-13T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.", }, ], exploits: [ { lang: "en", value: "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-03-26T02:22:29", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190513 Cisco Secure Boot Hardware Tampering Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot", }, { name: "VU#400865", tags: [ "third-party-advisory", "x_refsource_CERT-VN", ], url: "https://www.kb.cert.org/vuls/id/400865", }, { name: "108350", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/108350", }, { tags: [ "x_refsource_MISC", ], url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", }, ], source: { advisory: "cisco-sa-20190513-secureboot", defect: [ [ "CSCvn77141", "CSCvn77142", "CSCvn77143", "CSCvn77147", "CSCvn77150", "CSCvn77151", "CSCvn77152", "CSCvn77153", "CSCvn77154", "CSCvn77155", "CSCvn77156", "CSCvn77158", "CSCvn77159", "CSCvn77160", "CSCvn77162", "CSCvn77166", "CSCvn77167", "CSCvn77168", "CSCvn77169", "CSCvn77170", "CSCvn77171", "CSCvn77172", "CSCvn77175", "CSCvn77178", "CSCvn77180", "CSCvn77181", "CSCvn77182", "CSCvn77183", "CSCvn77184", "CSCvn77185", "CSCvn77191", "CSCvn77201", "CSCvn77202", "CSCvn77205", "CSCvn77207", "CSCvn77209", "CSCvn77212", "CSCvn77219", "CSCvn77220", "CSCvn77222", "CSCvn77245", "CSCvn77246", "CSCvn77248", "CSCvn77249", "CSCvn89137", "CSCvn89138", "CSCvn89140", "CSCvn89143", "CSCvn89144", "CSCvn89145", "CSCvn89146", "CSCvn89150", "CSCvp42792", ], ], discovery: "INTERNAL", }, title: "Cisco Secure Boot Hardware Tampering Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-05-13T17:30:00-0700", ID: "CVE-2019-1649", STATE: "PUBLIC", TITLE: "Cisco Secure Boot Hardware Tampering Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Routers", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "16.12.1", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform.", }, ], }, exploit: [ { lang: "en", value: "This vulnerability was publicly disclosed by Red Balloon Security on May 13, 2019.", }, ], impact: { cvss: { baseScore: "6.7", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-284", }, ], }, ], }, references: { reference_data: [ { name: "20190513 Cisco Secure Boot Hardware Tampering Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot", }, { name: "VU#400865", refsource: "CERT-VN", url: "https://www.kb.cert.org/vuls/id/400865", }, { name: "108350", refsource: "BID", url: "http://www.securityfocus.com/bid/108350", }, { name: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", refsource: "MISC", url: "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", }, ], }, source: { advisory: "cisco-sa-20190513-secureboot", defect: [ [ "CSCvn77141", "CSCvn77142", "CSCvn77143", "CSCvn77147", "CSCvn77150", "CSCvn77151", "CSCvn77152", "CSCvn77153", "CSCvn77154", "CSCvn77155", "CSCvn77156", "CSCvn77158", "CSCvn77159", "CSCvn77160", "CSCvn77162", "CSCvn77166", "CSCvn77167", "CSCvn77168", "CSCvn77169", "CSCvn77170", "CSCvn77171", "CSCvn77172", "CSCvn77175", "CSCvn77178", "CSCvn77180", "CSCvn77181", "CSCvn77182", "CSCvn77183", "CSCvn77184", "CSCvn77185", "CSCvn77191", "CSCvn77201", "CSCvn77202", "CSCvn77205", "CSCvn77207", "CSCvn77209", "CSCvn77212", "CSCvn77219", "CSCvn77220", "CSCvn77222", "CSCvn77245", "CSCvn77246", "CSCvn77248", "CSCvn77249", "CSCvn89137", "CSCvn89138", "CSCvn89140", "CSCvn89143", "CSCvn89144", "CSCvn89145", "CSCvn89146", "CSCvn89150", "CSCvp42792", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1649", datePublished: "2019-05-13T19:10:14.147871Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-20T17:23:01.830Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1620
Vulnerability from cvelistv5
Published
2021-09-23 02:31
Modified
2024-11-07 21:51
Severity ?
EPSS score ?
Summary
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:18:10.394Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1620", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T21:40:25.956619Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-07T21:51:30.491Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-09-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.7, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-563", description: "CWE-563", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-23T02:31:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr", }, ], source: { advisory: "cisco-sa-ikev2-ebFrwMPr", defect: [ [ "CSCvw25564", ], ], discovery: "INTERNAL", }, title: "Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-09-22T16:00:00", ID: "CVE-2021-1620", STATE: "PUBLIC", TITLE: "Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconnect feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to exhaust the free IP addresses from the assigned local pool. This vulnerability occurs because the code does not release the allocated IP address under certain failure conditions. An attacker could exploit this vulnerability by trying to connect to the device with a non-AnyConnect client. A successful exploit could allow the attacker to exhaust the IP addresses from the assigned local pool, which prevents users from logging in and leads to a denial of service (DoS) condition.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.7", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-563", }, ], }, ], }, references: { reference_data: [ { name: "20210922 Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-ebFrwMPr", }, ], }, source: { advisory: "cisco-sa-ikev2-ebFrwMPr", defect: [ [ "CSCvw25564", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1620", datePublished: "2021-09-23T02:31:01.213819Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-07T21:51:30.491Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }