Vulnerabilites related to cisco - catalyst_9124
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", matchCriteriaId: "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", vulnerable: true, }, { criteria: "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", matchCriteriaId: "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", matchCriteriaId: "9E2C378B-1507-4C81-82F6-9F599616845A", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", matchCriteriaId: "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", matchCriteriaId: "7CB85C75-4D35-480E-843D-60579EC75FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", matchCriteriaId: "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", matchCriteriaId: "E9273B95-20ED-4547-B0A8-95AD15B30372", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", matchCriteriaId: "AAE74AF3-C559-4645-A6C0-25C3D647AAC8", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", matchCriteriaId: "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", matchCriteriaId: "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", matchCriteriaId: "C6CE5198-C498-4672-AF4C-77AB4BE06C5C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", matchCriteriaId: "5F2558DF-2D1F-46BA-ABF1-08522D33268E", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", matchCriteriaId: "0B60D940-80C7-49F0-8F4E-3F99AC15FA82", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "68C08ECE-4D09-4E57-920B-B8E94E81603A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", matchCriteriaId: "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F5154A83-2499-4756-9150-8BFD9ACEF583", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "7CC235C6-63B1-4085-B9AA-47EFB17A144D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "54C41A49-87FA-4C98-8321-2808712B2F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F8ED25D1-973F-481A-8550-16508F73D2D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "35918620-E4C5-4E46-A5A9-63009333667A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "27440732-54F0-40DF-9896-88D60ABC568A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", matchCriteriaId: "FC39A276-532B-428A-83BA-141B626281A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "93103556-6C4A-4D35-91D1-5CDCDC740655", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5DEFC044-1D95-4386-AABB-ADE1099E3F85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "42759A0F-70C6-41DB-9DF9-2BC05685F678", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "95662406-0D7D-45B2-95F5-582FA275AC89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "A0E9FB66-F577-4744-B51F-3BD25293109F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "079DA749-0B94-4CCF-A3B1-7669DA213B52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "D96A05C3-1549-47DD-BADA-7872246EBDA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "2E7375AB-BE32-4879-BB54-CF5EDAB98188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "0E9E26B8-1539-4E21-AEAA-45095F79382A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "19C73CA1-2F92-4635-8D38-812D6D8ACD89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "EA17907A-388A-42E7-ACC6-2F59C72C93F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "A53A71EB-C346-42CD-AD58-F83F809D0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "90E87633-CD6E-439B-9CE8-66A1E414F09D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "742D9262-4329-4F0A-B97E-5FC65786946F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "FC14C45F-FDFB-4AAC-94EC-45860051379F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "C01E79D8-5F48-4939-BFD6-B363A76769D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CEE50FA1-6616-402A-9D86-9725206612C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5B907930-CA5C-4160-A3D1-8ACB559C9143", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "9331282F-B426-40DC-869E-F6F7DFE959A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", matchCriteriaId: "C67D4B91-66EB-490E-B43D-A7E159CC543B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", matchCriteriaId: "45A6A314-804B-47DC-B35E-804AD89588D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", matchCriteriaId: "968D60A4-036A-4792-BE8E-88F8B26444DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "754B93BA-0451-4C09-A124-284A62189D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "85293635-DD43-4651-8605-4F27F228AA91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "826FB2F4-45B5-4360-B577-11F75A1B67A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F3417E19-D7FC-487D-B316-B826DB3CB712", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "B66B6DB7-E48C-4758-915E-E4096CC5D68E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "69C3A33C-85E1-4157-81F7-39FA271CF8ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "E65FB9EC-A750-44C9-B251-5D8697C29EC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7948D988-3ED9-49BE-B820-15728DA93D21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3B465A44-EC90-41C6-BD9B-59D3B7E49540", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", matchCriteriaId: "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "DA329302-48FE-43FB-A15D-C3BEFB5AE868", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", matchCriteriaId: "37055F7B-2F2A-4B80-AC34-CAB0568BC692", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "534CF2AE-2149-4599-AC43-13EE8048B3EE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB15599-F795-4D24-A4A6-CD826F6A7A13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "441DF280-FC8C-481F-BDB9-7D757CF5BB72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "52BB9046-E47D-480A-93D2-DB0F76574E02", versionEndExcluding: "4.4.271", versionStartIncluding: "4.4.0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "C01BF34A-CD21-4B2F-9877-C89B8202B09A", versionEndExcluding: "4.9.271", versionStartIncluding: "4.9.0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "970E3D3C-8829-4599-95A7-AC63136CE48E", versionEndExcluding: "4.14.235", versionStartIncluding: "4.14", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", versionEndExcluding: "4.19.193", versionStartIncluding: "4.19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", versionEndExcluding: "5.4.124", versionStartIncluding: "5.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", versionEndExcluding: "5.10.42", versionStartIncluding: "5.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", versionEndExcluding: "5.12.9", versionStartIncluding: "5.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", }, { lang: "es", value: "El estándar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que el flag A-MSDU en el campo de encabezado QoS de texto plano esté autenticada. Contra dispositivos que admiten la recepción de tramas A-MSDU que no son SSP (que es obligatorio como parte de 802.11n), un adversario puede abusar de esto para inyectar paquetes de red arbitrarios", }, ], id: "CVE-2020-24588", lastModified: "2024-11-21T05:15:05.740", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.9, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 5.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 3.5, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.613", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-03-23 17:15
Modified
2024-11-21 07:40
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:business_150ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53461D22-32D2-4DE1-AD92-7973EC5B205B", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:business_150ax:-:*:*:*:*:*:*:*", matchCriteriaId: "AB2B555E-1523-4C62-A91D-EE1F3F1200EC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:business_151axm_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A020A23-9AD6-4543-A859-3830EBB12296", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:business_151axm:-:*:*:*:*:*:*:*", matchCriteriaId: "8760865B-4AB3-4A1A-960D-FF6974A7AC06", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AEAD0137-380A-42A1-8292-9923CCD36FEA", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105ax:-:*:*:*:*:*:*:*", matchCriteriaId: "C76DACE3-7D3B-4FE6-8567-0C9D43FF7A7E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9D31EFF0-1179-47AA-9D6E-1C9760F5A9EC", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D301BE7A-4A6A-48B1-8CF2-2FB930D47DB2", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105i_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "70D701B8-21F8-4286-B31F-C4CC18FF3B07", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105i:-:*:*:*:*:*:*:*", matchCriteriaId: "93510CF6-232E-4FBD-BF01-79070306FB97", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105w_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9CC5C951-CA0B-445D-B340-D1D6ECD94A59", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105w:-:*:*:*:*:*:*:*", matchCriteriaId: "77BE20A3-964E-46D3-ACA2-B53A175027D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4F837E8E-7B45-4D1C-8AD6-A40E60BB5CD0", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "37255F5F-CB34-469E-A323-59914D7540CF", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115ax:-:*:*:*:*:*:*:*", matchCriteriaId: "36E2B891-4F41-4D0D-BAA2-0256C0565BDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "591778EC-0772-44E4-B021-54B1B3504E83", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E0D5E598-481E-449A-9971-179687EB9592", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51F49A92-966B-4269-9E35-7A28A86685A6", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7AD186AA-430B-4F51-AAB0-9D869EAD586C", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117ax:-:*:*:*:*:*:*:*", matchCriteriaId: "BA8798F4-35BB-4F81-9385-B0274BFAAF15", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B540968A-C15E-4DAC-AEAE-4A0218600194", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E55F958F-C3DC-4DAF-8EE5-C55562224DA2", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1794D85C-A7E4-4959-A3F8-0F15BD4D30D1", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120ax:-:*:*:*:*:*:*:*", matchCriteriaId: "5889AFA2-752E-4EDD-A837-5C003025B25C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "588A0484-72B4-479C-9EA3-D427979BAAAB", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A7A404E6-04C8-48C3-8D86-866969BEFA63", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3D7445C6-7A24-454A-8129-C4F3EEB38130", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5A5860B4-186D-460F-9C36-D3031D927AB1", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6BB68FAD-4F8C-4228-99C4-6EDFFAF5242D", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124ax:-:*:*:*:*:*:*:*", matchCriteriaId: "53852300-C1D2-4F84-B8DA-4EDBCB374075", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FBB23E27-C004-4932-8690-1ECE1F4981B9", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7147FDD8-9B32-46E3-8537-0E8BEFFA4893", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3D612055-BDA4-49E2-9F31-1E434685BB83", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130ax_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "61148FE7-059D-47B6-92B6-14187ED5B65A", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130ax:-:*:*:*:*:*:*:*", matchCriteriaId: "5CADEB5A-5147-4420-A825-BAB07BD60AA2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "457919D4-12E5-4E31-B29C-A2798B711D0D", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2B49F389-8F3E-421C-8C6B-FD05EAD6ED34", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9136_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F409EED4-899A-4C4C-B919-2C5E6F96A738", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9136:-:*:*:*:*:*:*:*", matchCriteriaId: "09185C81-6FDF-4E6D-B8F7-E4B5D77909F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9162_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "17541D5B-1F7D-4F99-92D1-2A2709F2D12E", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9162:-:*:*:*:*:*:*:*", matchCriteriaId: "C9347227-9FA8-46B6-96EF-713543376296", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9164_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8A85B807-FE69-4445-9846-1C50BFD0D4E1", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9164:-:*:*:*:*:*:*:*", matchCriteriaId: "96E81F0A-5B5C-4DD3-A56F-C7BF53D4B070", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9166_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D76C0984-493A-4875-AACF-20870DF5DD7C", versionEndExcluding: "10.3.2.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9166:-:*:*:*:*:*:*:*", matchCriteriaId: "774AEB3E-5D6A-4E66-B0B4-C014A7C180E6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.", }, ], id: "CVE-2023-20112", lastModified: "2024-11-21T07:40:34.933", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-03-23T17:15:15.267", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-D2SunWK2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-D2SunWK2", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-126", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-125", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-03-23 17:15
Modified
2024-11-21 07:40
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*", matchCriteriaId: "D9EA7E3F-2EA0-4B32-BCA0-0E88FC9E4F9D", versionEndExcluding: "8.10.183.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:aironet_access_point_software:*:*:*:*:*:*:*:*", matchCriteriaId: "386B92C5-05F3-40A8-8F35-280DD9E84169", versionEndExcluding: "17.9.0.135", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*", matchCriteriaId: "72BFEED4-7AD7-406F-A044-BDEA98133711", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", matchCriteriaId: "8191FD87-4E55-4F38-8DB0-7E6772AD075B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", matchCriteriaId: "1D717945-EE41-4D0F-86EF-90826EBE9C3E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", matchCriteriaId: "99EAEA92-6589-4DFB-BC4B-8CBA425452D9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", matchCriteriaId: "D27AB201-342D-4517-9E05-6088598F4695", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815m:-:*:*:*:*:*:*:*", matchCriteriaId: "6E3225A6-DA3C-49FE-B0F8-8AC6B7DA3347", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815t:-:*:*:*:*:*:*:*", matchCriteriaId: "0E1D6F32-3F51-4C5B-97AF-1AD8917FCB07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815w:-:*:*:*:*:*:*:*", matchCriteriaId: "E09FEE6E-8169-4E90-ACF6-88BEE747D7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*", matchCriteriaId: "749040C6-A21A-4EF3-8213-42EE01CFA303", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105ax:-:*:*:*:*:*:*:*", matchCriteriaId: "C76DACE3-7D3B-4FE6-8567-0C9D43FF7A7E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115ax:-:*:*:*:*:*:*:*", matchCriteriaId: "36E2B891-4F41-4D0D-BAA2-0256C0565BDE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117ax:-:*:*:*:*:*:*:*", matchCriteriaId: "BA8798F4-35BB-4F81-9385-B0274BFAAF15", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120ax:-:*:*:*:*:*:*:*", matchCriteriaId: "5889AFA2-752E-4EDD-A837-5C003025B25C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124ax:-:*:*:*:*:*:*:*", matchCriteriaId: "53852300-C1D2-4F84-B8DA-4EDBCB374075", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130ax:-:*:*:*:*:*:*:*", matchCriteriaId: "5CADEB5A-5147-4420-A825-BAB07BD60AA2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "810472FD-52DE-4694-98FA-1AD858BEC895", versionEndExcluding: "16.12.8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "55C1CD64-ADE0-453F-9E0B-EA952F743892", versionEndExcluding: "17.3.6", versionStartIncluding: "17.1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "612EB810-AB85-49D4-BB5C-C03E2B1A0B43", versionEndExcluding: "17.6.5", versionStartIncluding: "17.4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "8F4C5572-9D7D-405C-AF93-DF9FF07F92F7", versionEndExcluding: "17.9.2", versionStartIncluding: "17.7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.", }, ], id: "CVE-2023-20056", lastModified: "2024-11-21T07:40:27.043", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-03-23T17:15:14.220", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-cli-dos-tc2EKEpu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-cli-dos-tc2EKEpu", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-03-23 17:15
Modified
2024-11-21 07:40
Severity ?
4.6 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*", matchCriteriaId: "D9EA7E3F-2EA0-4B32-BCA0-0E88FC9E4F9D", versionEndExcluding: "8.10.183.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:aironet_access_point_software:*:*:*:*:*:*:*:*", matchCriteriaId: "386B92C5-05F3-40A8-8F35-280DD9E84169", versionEndExcluding: "17.9.0.135", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*", matchCriteriaId: "72BFEED4-7AD7-406F-A044-BDEA98133711", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", matchCriteriaId: "8191FD87-4E55-4F38-8DB0-7E6772AD075B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", matchCriteriaId: "1D717945-EE41-4D0F-86EF-90826EBE9C3E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", matchCriteriaId: "99EAEA92-6589-4DFB-BC4B-8CBA425452D9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", matchCriteriaId: "D27AB201-342D-4517-9E05-6088598F4695", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815m:-:*:*:*:*:*:*:*", matchCriteriaId: "6E3225A6-DA3C-49FE-B0F8-8AC6B7DA3347", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815t:-:*:*:*:*:*:*:*", matchCriteriaId: "0E1D6F32-3F51-4C5B-97AF-1AD8917FCB07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815w:-:*:*:*:*:*:*:*", matchCriteriaId: "E09FEE6E-8169-4E90-ACF6-88BEE747D7A8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*", matchCriteriaId: "749040C6-A21A-4EF3-8213-42EE01CFA303", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105ax:-:*:*:*:*:*:*:*", matchCriteriaId: "C76DACE3-7D3B-4FE6-8567-0C9D43FF7A7E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115ax:-:*:*:*:*:*:*:*", matchCriteriaId: "36E2B891-4F41-4D0D-BAA2-0256C0565BDE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117ax:-:*:*:*:*:*:*:*", matchCriteriaId: "BA8798F4-35BB-4F81-9385-B0274BFAAF15", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120ax:-:*:*:*:*:*:*:*", matchCriteriaId: "5889AFA2-752E-4EDD-A837-5C003025B25C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124ax:-:*:*:*:*:*:*:*", matchCriteriaId: "53852300-C1D2-4F84-B8DA-4EDBCB374075", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130ax:-:*:*:*:*:*:*:*", matchCriteriaId: "5CADEB5A-5147-4420-A825-BAB07BD60AA2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "810472FD-52DE-4694-98FA-1AD858BEC895", versionEndExcluding: "16.12.8", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "55C1CD64-ADE0-453F-9E0B-EA952F743892", versionEndExcluding: "17.3.6", versionStartIncluding: "17.1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "612EB810-AB85-49D4-BB5C-C03E2B1A0B43", versionEndExcluding: "17.6.5", versionStartIncluding: "17.4", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", matchCriteriaId: "8F4C5572-9D7D-405C-AF93-DF9FF07F92F7", versionEndExcluding: "17.9.2", versionStartIncluding: "17.7", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.", }, ], id: "CVE-2023-20097", lastModified: "2024-11-21T07:40:32.780", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 2.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-03-23T17:15:15.027", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironetap-cmdinj-6bjT4FL8", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironetap-cmdinj-6bjT4FL8", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*", matchCriteriaId: "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*", matchCriteriaId: "BF0F9200-8AFD-4100-AF39-49476298C0E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "68C08ECE-4D09-4E57-920B-B8E94E81603A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", matchCriteriaId: "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F5154A83-2499-4756-9150-8BFD9ACEF583", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "7CC235C6-63B1-4085-B9AA-47EFB17A144D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "54C41A49-87FA-4C98-8321-2808712B2F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F8ED25D1-973F-481A-8550-16508F73D2D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "35918620-E4C5-4E46-A5A9-63009333667A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "27440732-54F0-40DF-9896-88D60ABC568A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", matchCriteriaId: "FC39A276-532B-428A-83BA-141B626281A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "93103556-6C4A-4D35-91D1-5CDCDC740655", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5DEFC044-1D95-4386-AABB-ADE1099E3F85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "42759A0F-70C6-41DB-9DF9-2BC05685F678", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "95662406-0D7D-45B2-95F5-582FA275AC89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "A0E9FB66-F577-4744-B51F-3BD25293109F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "079DA749-0B94-4CCF-A3B1-7669DA213B52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "D96A05C3-1549-47DD-BADA-7872246EBDA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "2E7375AB-BE32-4879-BB54-CF5EDAB98188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "0E9E26B8-1539-4E21-AEAA-45095F79382A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "19C73CA1-2F92-4635-8D38-812D6D8ACD89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "EA17907A-388A-42E7-ACC6-2F59C72C93F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "A53A71EB-C346-42CD-AD58-F83F809D0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "90E87633-CD6E-439B-9CE8-66A1E414F09D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "742D9262-4329-4F0A-B97E-5FC65786946F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "FC14C45F-FDFB-4AAC-94EC-45860051379F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "C01E79D8-5F48-4939-BFD6-B363A76769D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CEE50FA1-6616-402A-9D86-9725206612C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5B907930-CA5C-4160-A3D1-8ACB559C9143", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "9331282F-B426-40DC-869E-F6F7DFE959A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", matchCriteriaId: "C67D4B91-66EB-490E-B43D-A7E159CC543B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", matchCriteriaId: "45A6A314-804B-47DC-B35E-804AD89588D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", matchCriteriaId: "968D60A4-036A-4792-BE8E-88F8B26444DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "754B93BA-0451-4C09-A124-284A62189D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "85293635-DD43-4651-8605-4F27F228AA91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "826FB2F4-45B5-4360-B577-11F75A1B67A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F3417E19-D7FC-487D-B316-B826DB3CB712", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "B66B6DB7-E48C-4758-915E-E4096CC5D68E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "69C3A33C-85E1-4157-81F7-39FA271CF8ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "E65FB9EC-A750-44C9-B251-5D8697C29EC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7948D988-3ED9-49BE-B820-15728DA93D21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3B465A44-EC90-41C6-BD9B-59D3B7E49540", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", matchCriteriaId: "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "DA329302-48FE-43FB-A15D-C3BEFB5AE868", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", matchCriteriaId: "37055F7B-2F2A-4B80-AC34-CAB0568BC692", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "534CF2AE-2149-4599-AC43-13EE8048B3EE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB15599-F795-4D24-A4A6-CD826F6A7A13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "441DF280-FC8C-481F-BDB9-7D757CF5BB72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6EF369-8D83-4F5D-BDBE-99E89AD84810", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", matchCriteriaId: "8191FD87-4E55-4F38-8DB0-7E6772AD075B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "10BD5327-F3F8-4D0A-B6DC-2F11DF2E6866", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", matchCriteriaId: "1D717945-EE41-4D0F-86EF-90826EBE9C3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "893D104F-6711-46F9-804C-4B57562166E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", matchCriteriaId: "99EAEA92-6589-4DFB-BC4B-8CBA425452D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4AABCC2-D2A5-4A89-9DF9-6F80EB871CC9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", matchCriteriaId: "D27AB201-342D-4517-9E05-6088598F4695", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw-6300-con-x-k9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90A743E4-1302-4DAB-9300-65D8F468C8F2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw-6300-con-x-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3625BC-9003-4E07-B4EA-EB44CADDD6B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, { lang: "es", value: "Se detectó un problema en el controlador ALFA de Windows 10 versión 6.1316.1209 para AWUS036H. Las implementaciones WEP, WPA, WPA2 y WPA3 aceptan tramas de texto plano en una red Wi-Fi protegida. Un adversario puede abusar de esto para inyectar tramas de datos arbitrarias independientes de la configuración de la red", }, ], id: "CVE-2020-26140", lastModified: "2024-11-21T05:19:20.550", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.687", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-30 19:15
Modified
2024-11-21 06:43
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*", matchCriteriaId: "5B0C2129-8149-4362-827C-A5494C9D398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2B68B363-3C57-4E95-8B13-0F9B59D551F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*", matchCriteriaId: "7FCA2DB2-AE09-4A99-90C9-60AE0CD9A035", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*", matchCriteriaId: "11B83BED-5A49-4CF0-9827-AA291D01F60E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*", matchCriteriaId: "2C1E8937-51D9-43E6-876E-5D39AD3D32C4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA7AE63-99B9-4F28-8670-639A9B31E494", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*", matchCriteriaId: "E858B4AB-49B1-4F1C-8722-6E6911194924", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12sz-im:-:*:*:*:*:*:*:*", matchCriteriaId: "8D9ECE39-C111-412B-AF56-9B7435D98FE0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*", matchCriteriaId: "577D1BF2-5180-4301-941C-3C0ADDD23AA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-20sz-m:-:*:*:*:*:*:*:*", matchCriteriaId: "60DFE60A-34C5-42C3-B539-57AAA9D4F684", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-24sz-im:-:*:*:*:*:*:*:*", matchCriteriaId: "A1B25F27-6527-46F8-9C1A-4B4F79F3E6C4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*", matchCriteriaId: "9FE70CCD-6062-45D8-8566-7C9E237E030F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA3A897-ED4E-417F-BA6C-C1A825A210F6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*", matchCriteriaId: "375F9E12-A61B-4FD3-AE07-D4E686EB112A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*", matchCriteriaId: "D724F932-4548-429D-8CAA-E82C3435A194", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*", matchCriteriaId: "0BCC94C3-9EEF-4600-BE82-8AEDEB0F1446", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr-9901-rp:-:*:*:*:*:*:*:*", matchCriteriaId: "DE36709F-DCF2-428F-8746-9C5096182E87", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002_fixed_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0EAE214D-8DD8-4DA3-872A-609E7CE6E606", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023_router:-:*:*:*:*:*:*:*", matchCriteriaId: "399C03D1-C4B2-4DE6-9772-EC0BD88D7FCF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*", matchCriteriaId: "746254AC-B039-432C-AA5C-A82260E57AD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_5500:-:*:*:*:*:*:*:*", matchCriteriaId: "301681DF-2A9E-4A91-9918-4A46153ADC01", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_5700:-:*:*:*:*:*:*:*", matchCriteriaId: "A9EF0299-16A7-446D-855D-BFF91EE65534", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_900:-:*:*:*:*:*:*:*", matchCriteriaId: "EA873342-542E-4FC8-9C22-B5A43F9F3E9D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_900_:-:*:*:*:*:*:*:*", matchCriteriaId: "15A2D364-18BE-49BC-8473-FC33D37AFCC8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_900_route_switch_processor_2_\\(rsp2\\):-:*:*:*:*:*:*:*", matchCriteriaId: "406D120B-23C7-4B84-B976-066F933BBD1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_900_route_switch_processor_3_\\(rsp3\\):-:*:*:*:*:*:*:*", matchCriteriaId: "E19687EA-78E0-4E1C-A6B3-C1074FEA8CE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9000:-:*:*:*:*:*:*:*", matchCriteriaId: "3FEF8271-315F-4756-931F-015F790BE693", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9000:-:*:*:*:*:*:-:*", matchCriteriaId: "A15B6B59-E90B-43A8-B4E7-3718FE6990AE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9000:-:*:*:*:*:*:x64:*", matchCriteriaId: "1E82A9DB-C7ED-4BD9-8BAA-71928A23485C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9000_rsp440_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0A580194-1B06-4D71-B618-345046DBA9C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*", matchCriteriaId: "71BD158E-71D8-4DCA-8C09-F8AB7EF0EBDD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:x64:*", matchCriteriaId: "1BD9FC30-C073-4C63-8468-47DEF12A3875", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9000v:v2:*:*:*:*:*:*:*", matchCriteriaId: "C6B6AF64-42FF-4411-85EA-9AE537383CD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", matchCriteriaId: "324C97E6-1810-404F-9F45-6240F99FF039", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:x64:*", matchCriteriaId: "E9B8E1A6-A438-441D-ADA2-BE2BF837EAA9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", matchCriteriaId: "57EB55BB-41B7-40A1-B6F5-142FE8AB4C16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:x64:*", matchCriteriaId: "BB7DD32E-B22D-4392-B255-5C3F9CD39F3E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "D6279A69-2F9D-4CD9-9C19-62E701C3C4F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*", matchCriteriaId: "A46BB1E3-D813-4C19-81FA-96B8EF3E2F7B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "64E9CCC6-CA54-44C4-9A41-D2CA3A25BE8C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*", matchCriteriaId: "BC4E0CC8-9C67-4EB0-97A1-BAEFC6E9708A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*", matchCriteriaId: "DDB1A95C-8513-4CC7-8CDF-012B212FF02F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "AE761B1C-D749-4E1B-9A4A-7F41D1DF9C8C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-fs-a:-:*:*:*:*:*:*:*", matchCriteriaId: "97B64B28-7F3F-40BC-B289-0D1DB55B6461", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-fs-d:-:*:*:*:*:*:*:*", matchCriteriaId: "F5603296-34B3-4EEB-B242-C44BC56BFBB8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*", matchCriteriaId: "6C2A515C-797D-47EE-8051-F3FBE417BCE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*", matchCriteriaId: "E673A75F-EFF8-4591-8E0F-A21083563DBA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", matchCriteriaId: "433F4A82-04A4-4EAA-8C19-F7581DCD8D29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:-:*", matchCriteriaId: "A50A1CA4-F928-4787-ADB4-0274301B7EF6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:x64:*", matchCriteriaId: "915D9708-E3AC-447A-A67C-815A8E282A42", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-2sg-f-ah:-:*:*:*:*:*:*:*", matchCriteriaId: "E5456C70-6BA4-456A-BCFA-06FD052E44EF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-2sg-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "515CD97F-DDBD-4F75-A6DB-646890A30B32", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-3sg-f-ah:-:*:*:*:*:*:*:*", matchCriteriaId: "6E181FC9-6790-4C12-874F-67252B6879BA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-3sg-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "CAD4F12D-3F97-44D2-9DE2-571425E75F4E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_901s-4sg-f-d:-:*:*:*:*:*:*:*", matchCriteriaId: "FB1288DB-5946-4091-A6E8-42E0A0E7B2B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*", matchCriteriaId: "70352B04-C3FD-47F5-A2F8-691CF63EB50D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*", matchCriteriaId: "FE063AF2-5579-4D7E-8829-9102FC7CB994", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*", matchCriteriaId: "51938C0A-AFDB-4B12-BB64-9C67FC0C738F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*", matchCriteriaId: "A18E4A46-10D3-48F8-9E92-377ACA447257", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*", matchCriteriaId: "67D5E61B-9F17-4C56-A1BB-3EE08CB62C53", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*", matchCriteriaId: "DBE110B5-CC6E-4103-9983-4195BCC28165", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*", matchCriteriaId: "B97DDC45-ABD1-4C8F-A249-0865345637A4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-10sz-pd_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0D8A748B-DDA9-4F0B-9AAA-F9A62BBC3DCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3FE4D129-435B-45DD-838D-4017BD94DF93", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*", matchCriteriaId: "456C68A8-F3C8-4302-B55A-134979B42045", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12cz-a_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1F681230-2530-4ED9-85E9-FE7A57FCF2F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*", matchCriteriaId: "870D5B63-A1D5-442A-B2B9-9E522E5DB08F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*", matchCriteriaId: "17C6733C-F77B-4688-B051-C1557F4D8D41", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12cz-d_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1E3D23C1-FE0E-4D33-9E89-07A4135E1360", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*", matchCriteriaId: "2BD45D77-4097-4AFB-98DF-5B8188316C20", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*", matchCriteriaId: "489F97AB-5C6D-4AFE-BE5A-ABF7F9ED8B66", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-12sz-im_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0E598123-4AF8-44F6-BE87-9F62007FF658", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*", matchCriteriaId: "064DB97B-9E52-45BC-9F43-8FCB5570FC7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*", matchCriteriaId: "31608C12-FBED-4EAD-96EC-48BC4B356B77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24sz-im_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CBC28F05-20D0-4518-93FF-F254BA81E4B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*", matchCriteriaId: "D989205A-0576-415C-935E-E83AD42FD1CB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*", matchCriteriaId: "6D21D9A5-DE8F-4C55-B03F-35C04C270A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24sz-m_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D2BCA1C7-5642-4A2B-9E61-B141E70E098A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*", matchCriteriaId: "78C3EB40-574A-48F7-A679-90F62ED976B5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*", matchCriteriaId: "B6CC6206-DF19-4636-84C2-8912E443D122", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-24tz-m_router:-:*:*:*:*:*:*:*", matchCriteriaId: "C27ED272-FCA6-4002-93E1-EF0B89C84572", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*", matchCriteriaId: "85489F69-EAF0-4971-8C93-36838A8AA00E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*", matchCriteriaId: "BE95FEC1-12F3-44FC-B922-CD18CADB42FE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-4sz-a_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD184DD-8774-4C18-BE53-BC6B133B01C8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*", matchCriteriaId: "2D029B0C-2DAE-491A-90B4-79C093EC9E48", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*", matchCriteriaId: "BE37BC85-7758-4412-A5E6-0F1A19E8776B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920-4sz-d_router:-:*:*:*:*:*:*:*", matchCriteriaId: "22F587F6-876D-4AE4-B6BD-ED50D47F5361", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_920u-12sz-im:-:*:*:*:*:*:*:*", matchCriteriaId: "BA179D79-07E7-4721-85BB-0C740B516B1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*", matchCriteriaId: "2D5E60AB-94FF-448A-89D8-5D2197E21C74", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:x64:*", matchCriteriaId: "E7D9C475-6E5D-4AE9-A8D4-5B023C128A46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*", matchCriteriaId: "FA241214-2F05-4360-9B50-385355E29CF4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", matchCriteriaId: "A93212A4-50AB-42E7-89A4-5FBBAEA050C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:-:*", matchCriteriaId: "9FF5102C-3163-48F1-8D44-352D6715288D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:x64:*", matchCriteriaId: "0FB63566-D9F5-4A36-87E2-AC87ADB9DE6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*", matchCriteriaId: "EDA53A61-98B3-458C-8893-61CD7D6B1E48", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:x64:*", matchCriteriaId: "910A1686-5B13-4D37-9C1F-2F0073D57E5F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*", matchCriteriaId: "F396564E-B477-4A27-A189-CEB737552E25", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:-:*", matchCriteriaId: "7FA1F27F-3265-482D-AD31-BCB300419526", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:x64:*", matchCriteriaId: "430F0546-C2E9-41EE-8A8E-1C63945160F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", matchCriteriaId: "5445CC54-ACFB-4070-AF26-F91FEAA85181", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:-:*", matchCriteriaId: "6D1A5E2E-1CF6-4E3D-A474-9AA26758E574", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:x64:*", matchCriteriaId: "E1D3885B-7BEC-49DA-AE56-0DA18117C9E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9920:-:*:*:*:*:*:*:*", matchCriteriaId: "49E7ED87-8AC0-4107-A7A5-F334236E2906", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*", matchCriteriaId: "D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:-:*", matchCriteriaId: "3AE8FA9B-C71B-42AE-94B2-580F505BC17F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*", matchCriteriaId: "77D24BB4-6357-4BFC-A4CB-B33ECDEB3BEE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*", matchCriteriaId: "1B1F849A-05BA-4CA2-96AA-F8DFD5E725A5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*", matchCriteriaId: "AB060D83-2924-4D1D-9FEE-F8087FA8976D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*", matchCriteriaId: "8CF4D0E5-FF09-4919-B603-B42DB535386C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*", matchCriteriaId: "22C36989-4353-4B81-8B0F-FC6322C1C179", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "0C24227E-9FF6-4757-A342-958CA4B8BF63", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-hx-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "9E529335-18D1-4CEC-A8D5-CC1CA33D64F5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "3072DEFA-61D6-413F-97FD-F64C0E90155C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "D9FBFB5C-347B-4F73-93BE-4D3137D8F93A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1001-x-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "9F040372-CDAD-4AC4-9B7C-BFF9658B6BF2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "C33862F1-652A-4F60-BD3E-A6B3733E56A9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "130205FD-CA31-4E49-B8C4-181840270C70", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-hx-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "908A56D8-64AF-4813-9D4D-C429C0603A31", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "03A2AA1C-7568-4BB6-BBD3-8E03D32CDA1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x-rf:-:*:*:*:*:*:*:*", matchCriteriaId: "53DAF422-7E0B-44EB-AD8D-4643A9711739", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr1002-x-ws:-:*:*:*:*:*:*:*", matchCriteriaId: "1F7F661E-335C-4123-9363-E2E5D51846C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*", matchCriteriaId: "005F5347-A5E6-4954-ACAB-E4DF29119724", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5C2A8413-DF92-4690-8BC1-A21001BDF76B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "882B8D8F-E154-45C3-BB47-5353167C9776", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*", matchCriteriaId: "C8F7FAA3-003D-4BEE-99CC-C9F75D5293FC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A54B4EB4-EB41-4522-B7AB-C30F96099EA3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EAD7BE51-0BA6-4750-B274-A6E33D32B484", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "44C3EF8E-DF88-46DC-8E06-B009F346D1D2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "7E87F823-D924-4718-AD81-248A6C619531", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "CCAC93E0-F982-4E37-866E-43B7BC5AC82E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1FC866C9-BB98-4320-9FFA-F0960C560DA6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", matchCriteriaId: "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "C3AD7495-3DA2-4596-9620-CD36D7C561AC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E492F3F8-4188-41E4-9A84-5E30C4AC3378", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "718F2FDC-9EA4-4C4C-8821-B15E56AF8101", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*", matchCriteriaId: "EC5CB558-BD42-4615-BC31-41CCF25DE5C9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "E45BCCD0-65BB-431F-B448-221C1595CD92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F33BA722-0680-4074-8D03-41657F8CDCC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", matchCriteriaId: "295C46B4-5E9F-4DD8-861B-00BA43923306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "431570C7-74A1-4F7E-8FD0-690AEF0F823B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "C5D22E15-E1E8-4115-A55F-5743CA9C5947", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*", matchCriteriaId: "F840171D-CA1C-4E25-BD41-6B871C47BB84", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", matchCriteriaId: "7B240B20-CF48-4A72-9653-9D04D59C1391", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", matchCriteriaId: "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", matchCriteriaId: "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74CCD143-3D6E-4880-B275-ECF5B04238C6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D3784F-C572-4A6F-83B9-BCF64D339BC9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E09C466B-CE87-4A57-B40B-88C94BAAF36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", matchCriteriaId: "D58FF034-8E07-4518-A858-5F16F22217E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "376AD386-373D-4B24-966F-D11F76C9020F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "2280CAA3-03F6-4168-8E50-A6B7132A3B0E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0C1174-C789-4547-9899-F7FCD0905F92", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", matchCriteriaId: "EC366801-655A-403B-ACD9-3BB43802A3C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FF5463D0-A8D3-43EC-8CFF-F659A8C84436", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", matchCriteriaId: "05D4D7E4-B195-46D8-8A6B-6AA4B8357618", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", matchCriteriaId: "39600E51-4A21-4E5B-9FF9-E7C00AE86646", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*", matchCriteriaId: "47E4D5A8-7E4A-44C5-81DC-84712781206D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B13D6D50-D0FA-4527-BED3-52560DDD5253", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", matchCriteriaId: "965BF315-D833-4711-97FC-512151113367", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", matchCriteriaId: "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", matchCriteriaId: "F8E9B149-AA2B-4421-8CC3-5A4B32B7AADF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", matchCriteriaId: "04072C0F-78A2-4D10-87B2-52DC2537BA89", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", matchCriteriaId: "DD5C080E-D5C4-47B2-A46C-4EB3051C5221", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", matchCriteriaId: "41CEBEE0-DA67-4EE5-9BCF-263843053A8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", matchCriteriaId: "FD262F58-C47F-439E-A9FF-D1C60120D306", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", matchCriteriaId: "35490BDE-DF21-495E-9F8A-7631FCB32A1F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", matchCriteriaId: "20EFB5B8-4A38-48C5-A363-3C7F7763C1D5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*", matchCriteriaId: "749040C6-A21A-4EF3-8213-42EE01CFA303", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", matchCriteriaId: "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", matchCriteriaId: "7670A322-31C2-4A8A-86E9-09D63C52E4C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", matchCriteriaId: "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", matchCriteriaId: "0972076B-5C87-44B3-90EC-4C200B89318A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "74AED057-2458-4DE0-8D51-ABD766D07F68", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "19538C03-5FB8-4401-8B21-489C629D7E7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "B26D7061-F471-4DF0-A892-ED132958B84A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "033ED443-80E7-4012-9825-07AAC0D44B96", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "AD3F3CC6-A349-47B1-B282-B6458683C191", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CB24EF21-1C10-48A7-BC68-FFC842A28D12", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "ED0625A2-BF14-4552-83D8-AEE0A04EA023", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", matchCriteriaId: "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", matchCriteriaId: "21AFDC0D-7629-424E-827B-C8A8767324C3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", matchCriteriaId: "A263CFF2-A659-405B-90EA-51E49B25C6D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", matchCriteriaId: "CEFBD449-217D-4569-99F7-D56B853A3E07", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", matchCriteriaId: "7ED668FC-D1A5-4175-A234-23760BA6E788", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0D650C48-9241-42F7-87A9-20733329489A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", matchCriteriaId: "3ED16A65-9AFF-4825-95D1-162FBA0F566D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", matchCriteriaId: "82D345E7-8208-41AC-B11A-4425D29E98A1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E386D461-F1C1-4970-B056-D6119E74D449", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", matchCriteriaId: "99F3A466-F665-4132-ABC4-2DFC0A7E2B55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", matchCriteriaId: "B3395168-FF2E-4CB6-AABE-5E36DEB241CA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", matchCriteriaId: "226F985C-4669-4D0A-9DB4-CB1465B37B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", matchCriteriaId: "0B736A43-6F4E-40A9-84E4-D9E251489234", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", matchCriteriaId: "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "E99CA124-7D86-463B-A31E-A7836B7493E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "E014B028-8DD9-428C-B705-8F428F145932", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "A6C44229-A842-49B2-AD3E-79C83DB63EBE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5306E847-C718-4C83-9C97-8AB498DC4A88", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "18287CEF-B574-4498-A256-567CA6E6CA7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "1E9AAA2C-495E-4FD1-9050-264FDC25254B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "5713043E-2535-4540-B3EF-41FAC40BECE9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "67701D77-8B03-446A-AE22-4B8CCCD6F029", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", matchCriteriaId: "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", matchCriteriaId: "831A2390-7170-4FC0-A95E-3DAB1791017D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", matchCriteriaId: "F788CBC4-782F-4A43-AC80-4AEF1C43A22D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", matchCriteriaId: "493989DC-8F1B-45C9-AD11-38B97B958C9C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", matchCriteriaId: "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", matchCriteriaId: "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", matchCriteriaId: "F168FB20-0C44-4A5B-910A-04B9517545C2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", matchCriteriaId: "737F22AB-C5A9-4A18-BA3D-38A222491397", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "2E5DCFD5-2B46-4D06-9E4C-B2325F440F02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", matchCriteriaId: "D5508320-8318-41A8-8026-4A61907C1CD7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", matchCriteriaId: "AAD337D8-8C72-4025-A8C3-E63598DE7BDB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", matchCriteriaId: "176ACF88-6112-4179-8492-50C50577B300", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*", matchCriteriaId: "D07FC868-0B38-4F24-BA40-87966FF80AB7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", matchCriteriaId: "C19A801D-02D7-40B0-88E8-FE7BA8630E60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", matchCriteriaId: "5EA59279-3504-417D-9E86-E5886EE198BD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", matchCriteriaId: "D4035136-CC10-4DDD-92AF-9DC41D19CF8A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "8E283C34-43AE-49A5-A72B-32DEA185ABD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "ADB3AF13-5324-42CD-8EDB-6F730BF46214", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*", matchCriteriaId: "78706517-83F4-4D44-A6EC-B78ADCEABAC0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3200:-:*:*:*:*:*:*:*", matchCriteriaId: "EACA55A5-4E73-4187-96BE-08E04F2C7659", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "86879AC0-890E-42F4-9561-6851F38FE0AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3300:-:*:*:*:*:*:*:*", matchCriteriaId: "8E31CB8F-60FF-4D03-BE8C-824ECE967797", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "19017B10-F630-42CD-ACD2-E817FEF0E7F1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400:-:*:*:*:*:*:*:*", matchCriteriaId: "9A8E319D-5AE5-4074-9DAF-4B65F3B3CEE5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "04A41A34-58D2-4DBC-ABC9-20A62BC8A838", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", matchCriteriaId: "9C7CCC02-113E-4EA1-B0CA-9FDF1108BB71", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*", matchCriteriaId: "8DF0025D-8DE1-437D-9A4E-72C3AC6B46CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.", }, { lang: "es", value: "Una vulnerabilidad en el procesamiento de paquetes malformados del Protocolo Industrial Común (CIP) que se envían al software Cisco IOS y al software Cisco IOS XE podría permitir a un atacante remoto no autenticado causar una recarga no esperada del dispositivo afectado, lo que provocaría una condición de denegación de servicio (DoS). Esta vulnerabilidad es debido a que no es comprobado suficientemente la entrada durante el procesamiento de los paquetes CIP. Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete CIP malformado a un dispositivo afectado. Una explotación con éxito podría permitir al atacante causar al dispositivo afectado recargarse inesperadamente, resultando en una condición de DoS", }, ], id: "CVE-2022-20919", lastModified: "2024-11-21T06:43:48.977", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-30T19:15:13.417", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cip-dos-9rTbKLt9", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cip-dos-9rTbKLt9", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-248", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-755", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-30 19:15
Modified
2024-11-21 06:43
Severity ?
7.9 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*", matchCriteriaId: "4DE62C4B-7C06-4907-BADE-416C1618D2D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", matchCriteriaId: "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", matchCriteriaId: "1B9ED0E5-CB20-4106-9CF2-8EB587B33543", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", matchCriteriaId: "2B0E620C-8E09-4F7C-A326-26013173B993", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", matchCriteriaId: "FF93F1C8-669F-4ECB-8D81-ECDA7B550175", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", matchCriteriaId: "2E0BA345-B7D7-4975-9199-4DC7875BBFD0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", matchCriteriaId: "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", matchCriteriaId: "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad de autocuración del software Cisco IOS XE para controladores inalámbricos integrados en puntos de acceso Catalyst podría permitir a un atacante local autenticado escapar del shell restringido del controlador y ejecutar comandos arbitrarios en el sistema operativo subyacente del punto de acceso. Esta vulnerabilidad es debido a comprobaciones inapropiadas durante el reinicio de determinados procesos del sistema. Un atacante podría explotar esta vulnerabilidad al entrar en un dispositivo afectado y ejecutando determinados comandos CLI. Una explotación con éxito podría permitir al atacante ejecutar comandos arbitrarios en el Sistema Operativo subyacente como root. Para explotar con éxito esta vulnerabilidad, un atacante necesitaría credenciales válidas para un usuario de nivel de privilegio 15 del controlador inalámbrico", }, ], id: "CVE-2022-20855", lastModified: "2024-11-21T06:43:41.627", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.9, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 1.5, impactScore: 5.8, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-09-30T19:15:12.963", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewc-priv-esc-nderYLtK", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewc-priv-esc-nderYLtK", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-266", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-23 03:15
Modified
2024-11-21 05:44
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | embedded_wireless_controller | * | |
cisco | catalyst_9105 | - | |
cisco | catalyst_9115 | - | |
cisco | catalyst_9117 | - | |
cisco | catalyst_9120 | - | |
cisco | catalyst_9124 | - | |
cisco | catalyst_9130 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:cisco:embedded_wireless_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "8A643D3A-AF4A-4408-A3D9-E29059FA5246", versionEndIncluding: "17.6.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.", }, { lang: "es", value: "Una vulnerabilidad en la funcionalidad packet processing de Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un AP afectado. Esta vulnerabilidad es debido a una asignación insuficiente del búfer. Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico diseñado a un dispositivo afectado. Una explotación con éxito podría permitir al atacante agotar los recursos disponibles y causar una condición de DoS en un AP afectado, así como una condición de DoS para el tráfico del cliente que atraviesa el AP", }, ], id: "CVE-2021-1615", lastModified: "2024-11-21T05:44:44.683", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-23T03:15:12.470", references: [ { source: "psirt@cisco.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-410", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-23 03:15
Modified
2024-11-21 06:11
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_access_point_software:*:*:*:*:*:*:*:*", matchCriteriaId: "2688A8E4-F734-4353-889C-D4346F838AD3", versionEndExcluding: "8.10.162.0", versionStartIncluding: "8.10.0", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:aironet_access_point_software:17.2:*:*:*:*:*:*:*", matchCriteriaId: "58FD0CE4-DF50-41B9-9ED5-049585DA8E46", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:aironet_access_point_software:17.3:*:*:*:*:*:*:*", matchCriteriaId: "C9C881D9-8270-4413-B762-33E9661FC407", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A2D2305B-B69E-4F74-A44E-07B3205CE9F7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:6300_series_access_points:-:*:*:*:*:*:*:*", matchCriteriaId: "6E6F57DE-E039-49D7-B240-48CBD9CACD6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*", matchCriteriaId: "72BFEED4-7AD7-406F-A044-BDEA98133711", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", matchCriteriaId: "8191FD87-4E55-4F38-8DB0-7E6772AD075B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", matchCriteriaId: "1D717945-EE41-4D0F-86EF-90826EBE9C3E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", matchCriteriaId: "99EAEA92-6589-4DFB-BC4B-8CBA425452D9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", matchCriteriaId: "D27AB201-342D-4517-9E05-6088598F4695", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1830:-:*:*:*:*:*:*:*", matchCriteriaId: "093AB3A8-853B-4094-BFB5-6A8775AAA8D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*", matchCriteriaId: "4590D445-B4B6-48E6-BF55-BEA6BA763410", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*", matchCriteriaId: "848CC5CD-1982-4F31-A626-BD567E1C19F0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1840:-:*:*:*:*:*:*:*", matchCriteriaId: "A69CA9D6-914D-436F-AA81-B218CC312D29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1850:-:*:*:*:*:*:*:*", matchCriteriaId: "BE0B76A8-377E-4176-8F04-B0D468D4E767", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*", matchCriteriaId: "24E47788-9B54-42C5-AD83-428B22674575", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*", matchCriteriaId: "A333CD0B-4729-4E64-8B52-A3F5138F5B70", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*", matchCriteriaId: "749040C6-A21A-4EF3-8213-42EE01CFA303", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.", }, { lang: "es", value: "Una vulnerabilidad en la implementación WLAN Control Protocol (WCP) para Cisco Aironet Access Point (AP) software podría permitir a un atacante adyacente no autenticado causar una recarga de un dispositivo afectado, resultando en una condición de denegación de servicio (DoS). Esta vulnerabilidad es debido al manejo incorrecto de errores cuando un dispositivo afectado recibe una trama 802.11 inesperada. Un atacante podría explotar esta vulnerabilidad mediante el envío de determinadas tramas 802.11 a través de la red inalámbrica a una interfaz de un AP afectado. Una explotación con éxito podría permitir al atacante causar un filtrado de búfer de paquetes. Esto podría resultar eventualmente en fallos en la asignación del búfer, lo que desencadenaría una recarga del dispositivo afectado", }, ], id: "CVE-2021-34740", lastModified: "2024-11-21T06:11:05.760", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-23T03:15:19.947", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-401", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-401", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netbsd:netbsd:7.1:*:*:*:*:*:*:*", matchCriteriaId: "0A99D021-C66D-4FA2-B33C-4DAADBB6B431", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, { lang: "es", value: "Se detectó un problema en el kernel en NetBSD versión 7.1. Un punto de acceso (AP) reenvía tramas EAPOL a otros clientes aunque el remitente aún no se haya autenticado con éxito en el AP. Esto podría ser abusado en redes Wi-Fi proyectadas para lanzar ataques de denegación de servicio contra clientes conectados y facilitar la explotación de otras vulnerabilidades en clientes conectados", }, ], id: "CVE-2020-26139", lastModified: "2024-11-21T05:19:20.157", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 5.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.647", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-09-27 18:15
Modified
2024-11-21 07:40
Severity ?
5.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.
This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catalyst_9166_firmware | * | |
cisco | catalyst_9166 | - | |
cisco | catalyst_9164_firmware | * | |
cisco | catalyst_9164 | - | |
cisco | catalyst_9136_firmware | * | |
cisco | catalyst_9136 | - | |
cisco | catalyst_9130_firmware | * | |
cisco | catalyst_9130 | - | |
cisco | catalyst_9124_firmware | * | |
cisco | catalyst_9124 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9166_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C9E58B3F-A839-40D2-94E8-DBBA4233CB6A", versionEndExcluding: "17.6.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9166:-:*:*:*:*:*:*:*", matchCriteriaId: "774AEB3E-5D6A-4E66-B0B4-C014A7C180E6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9164_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "674A6482-211F-43C7-BB67-4B0DBEB08E2F", versionEndExcluding: "17.6.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9164:-:*:*:*:*:*:*:*", matchCriteriaId: "96E81F0A-5B5C-4DD3-A56F-C7BF53D4B070", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9136_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02DBA4EC-6404-467A-A862-5CF3704CA8CF", versionEndExcluding: "17.6.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9136:-:*:*:*:*:*:*:*", matchCriteriaId: "09185C81-6FDF-4E6D-B8F7-E4B5D77909F4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "396ED75A-FF33-4AE5-BE9F-DBFD111532CF", versionEndExcluding: "17.6.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "51EEDFEA-1E40-471B-8B2E-363C248F816E", versionEndExcluding: "17.6.6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.\r\n\r This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.", }, { lang: "es", value: "Una vulnerabilidad en el componente de red del software del punto de acceso (AP) de Cisco podría permitir que un atacante remoto no autenticado cause una interrupción temporal del servicio. Esta vulnerabilidad se debe al uso excesivo de los recursos AP. Un atacante podría aprovechar esta vulnerabilidad conectándose a un AP en un dispositivo afectado como cliente inalámbrico y enviando una alta tasa de tráfico durante un período prolongado de tiempo. Un exploit exitoso podría permitir al atacante provocar que la sesión de Datagram TLS (DTLS) se interrumpa y se reinicie, provocando una condición de denegación de servicio (DoS).", }, ], id: "CVE-2023-20176", lastModified: "2024-11-21T07:40:45.027", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-09-27T18:15:10.923", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", matchCriteriaId: "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", vulnerable: true, }, { criteria: "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", matchCriteriaId: "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "C2C083CF-3D4D-4AF0-8461-835F6AC264CC", versionEndExcluding: "4.4.271", versionStartIncluding: "4.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "11580478-2F79-45B8-9BC0-FEF28259A4F5", versionEndExcluding: "4.9.271", versionStartIncluding: "4.9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "970E3D3C-8829-4599-95A7-AC63136CE48E", versionEndExcluding: "4.14.235", versionStartIncluding: "4.14", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", versionEndExcluding: "4.19.193", versionStartIncluding: "4.19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", versionEndExcluding: "5.4.124", versionStartIncluding: "5.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", versionEndExcluding: "5.10.42", versionStartIncluding: "5.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", versionEndExcluding: "5.12.9", versionStartIncluding: "5.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", }, { lang: "es", value: "El estándar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que todos los fragmentos de una trama estén cifrados con la misma clave. Un adversario puede abusar de esto para descifrar fragmentos seleccionados cuando otro dispositivo envía tramas fragmentadas y la clave de cifrado WEP, CCMP o GCMP es periódicamente renovada", }, ], id: "CVE-2020-24587", lastModified: "2024-11-21T05:15:05.303", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 1.8, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:A/AC:H/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.2, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 2.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.580", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2023-20112
Vulnerability from cvelistv5
Published
2023-03-23 00:00
Modified
2024-10-25 16:02
Severity ?
EPSS score ?
Summary
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Aironet Access Point Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.895Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20230322 Cisco Access Point Software Association Request Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-D2SunWK2", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20112", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:35:52.092551Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T16:02:04.798Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Aironet Access Point Software ", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2023-03-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. ", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-03-23T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20230322 Cisco Access Point Software Association Request Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-D2SunWK2", }, ], source: { advisory: "cisco-sa-ap-assoc-dos-D2SunWK2", defect: [ [ "CSCwb04244", ], ], discovery: "INTERNAL", }, title: "Cisco Access Point Software Association Request Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20112", datePublished: "2023-03-23T00:00:00", dateReserved: "2022-10-27T00:00:00", dateUpdated: "2024-10-25T16:02:04.798Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20855
Vulnerability from cvelistv5
Published
2022-09-30 18:46
Modified
2024-11-01 18:50
Severity ?
EPSS score ?
Summary
A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewc-priv-esc-nderYLtK | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:24:50.248Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220928 Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewc-priv-esc-nderYLtK", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20855", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-01T18:42:17.297328Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-01T18:50:27.164Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS XE Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-09-28T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 7.9, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-266", description: "CWE-266", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-30T18:46:15", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220928 Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewc-priv-esc-nderYLtK", }, ], source: { advisory: "cisco-sa-ewc-priv-esc-nderYLtK", defect: [ [ "CSCwa23357", ], ], discovery: "INTERNAL", }, title: "Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-09-28T23:00:00", ID: "CVE-2022-20855", STATE: "PUBLIC", TITLE: "Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS XE Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point. This vulnerability is due to improper checks throughout the restart of certain system processes. An attacker could exploit this vulnerability by logging on to an affected device and executing certain CLI commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying OS as root. To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.9", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-266", }, ], }, ], }, references: { reference_data: [ { name: "20220928 Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewc-priv-esc-nderYLtK", }, ], }, source: { advisory: "cisco-sa-ewc-priv-esc-nderYLtK", defect: [ [ "CSCwa23357", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20855", datePublished: "2022-09-30T18:46:15.252083Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-01T18:50:27.164Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-26139
Vulnerability from cvelistv5
Published
2021-05-11 19:37
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:49:07.127Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-28T14:09:21", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-26139", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { name: "https://www.fragattacks.com", refsource: "MISC", url: "https://www.fragattacks.com", }, { name: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", refsource: "MISC", url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-26139", datePublished: "2021-05-11T19:37:55", dateReserved: "2020-09-29T00:00:00", dateUpdated: "2024-08-04T15:49:07.127Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20176
Vulnerability from cvelistv5
Published
2023-09-27 17:25
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.
This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Aironet Access Point Software |
Version: 8.10.170.0 |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T09:05:34.976Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-click-ap-dos-wdcXkvnQ", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Aironet Access Point Software", vendor: "Cisco", versions: [ { status: "affected", version: "8.10.170.0", }, ], }, { product: "Cisco Aironet Access Point Software (IOS XE Controller)", vendor: "Cisco", versions: [ { status: "affected", version: "16.10.1e", }, { status: "affected", version: "16.10.1", }, { status: "affected", version: "17.1.1t", }, { status: "affected", version: "17.1.1s", }, { status: "affected", version: "17.1.1", }, { status: "affected", version: "16.11.1a", }, { status: "affected", version: "16.11.1", }, { status: "affected", version: "16.11.1c", }, { status: "affected", version: "16.11.1b", }, { status: "affected", version: "16.12.1s", }, { status: "affected", version: "16.12.4", }, { status: "affected", version: "16.12.1", }, { status: "affected", version: "16.12.2s", }, { status: "affected", version: "16.12.1t", }, { status: "affected", version: "16.12.4a", }, { status: "affected", version: "16.12.5", }, { status: "affected", version: "16.12.3", }, { status: "affected", version: "16.12.6", }, { status: "affected", version: "16.12.8", }, { status: "affected", version: "16.12.7", }, { status: "affected", version: "16.12.6a", }, { status: "affected", version: "17.3.1", }, { status: "affected", version: "17.3.2a", }, { status: "affected", version: "17.3.3", }, { status: "affected", version: "17.3.2", }, { status: "affected", version: "17.3.4c", }, { status: "affected", version: "17.3.5a", }, { status: "affected", version: "17.3.6", }, { status: "affected", version: "17.2.1", }, { status: "affected", version: "17.2.1a", }, { status: "affected", version: "17.2.3", }, { status: "affected", version: "17.2.2", }, { status: "affected", version: "17.5.1", }, { status: "affected", version: "17.4.1", }, { status: "affected", version: "17.4.2", }, { status: "affected", version: "17.6.1", }, { status: "affected", version: "17.6.2", }, { status: "affected", version: "17.6.3", }, { status: "affected", version: "17.6.4", }, { status: "affected", version: "17.6.5", }, { status: "affected", version: "17.7.1", }, { status: "affected", version: "17.8.1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.\r\n\r This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "LOW", baseScore: 5.8, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "Uncontrolled Resource Consumption", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:49.991Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-click-ap-dos-wdcXkvnQ", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ", }, ], source: { advisory: "cisco-sa-click-ap-dos-wdcXkvnQ", defects: [ "CSCwb56120", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20176", datePublished: "2023-09-27T17:25:00.473Z", dateReserved: "2022-10-27T18:47:50.363Z", dateUpdated: "2024-08-02T09:05:34.976Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24588
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:08.467Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-01T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { url: "https://www.fragattacks.com", }, { url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24588", datePublished: "2021-05-11T00:00:00", dateReserved: "2020-08-21T00:00:00", dateUpdated: "2024-08-04T15:19:08.467Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24587
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:08.605Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-01T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { url: "https://www.fragattacks.com", }, { url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24587", datePublished: "2021-05-11T00:00:00", dateReserved: "2020-08-21T00:00:00", dateUpdated: "2024-08-04T15:19:08.605Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20056
Vulnerability from cvelistv5
Published
2023-03-23 00:00
Modified
2024-10-25 16:02
Severity ?
EPSS score ?
Summary
A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Aironet Access Point Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.565Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20230322 Cisco Access Point Software Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-cli-dos-tc2EKEpu", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20056", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:36:14.194265Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T16:02:56.470Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Aironet Access Point Software ", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2023-03-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. ", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-03-23T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20230322 Cisco Access Point Software Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-cli-dos-tc2EKEpu", }, ], source: { advisory: "cisco-sa-ap-cli-dos-tc2EKEpu", defect: [ [ "CSCwc61122", ], ], discovery: "INTERNAL", }, title: "Cisco Access Point Software Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20056", datePublished: "2023-03-23T00:00:00", dateReserved: "2022-10-27T00:00:00", dateUpdated: "2024-10-25T16:02:56.470Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-1615
Vulnerability from cvelistv5
Published
2021-09-23 02:30
Modified
2024-11-07 21:51
Severity ?
EPSS score ?
Summary
A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS XE Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T16:18:10.808Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210922 Cisco Embedded Wireless Controller Software for Catalyst Access Points Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-1615", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T21:47:23.605565Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-07T21:51:48.650Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS XE Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-09-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-410", description: "CWE-410", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-23T02:30:45", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210922 Cisco Embedded Wireless Controller Software for Catalyst Access Points Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT", }, ], source: { advisory: "cisco-sa-iosxe-ewc-dos-g6JruHRT", defect: [ [ "CSCvy04449", ], ], discovery: "INTERNAL", }, title: "Cisco Embedded Wireless Controller Software for Catalyst Access Points Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-09-22T16:00:00", ID: "CVE-2021-1615", STATE: "PUBLIC", TITLE: "Cisco Embedded Wireless Controller Software for Catalyst Access Points Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS XE Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.6", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-410", }, ], }, ], }, references: { reference_data: [ { name: "20210922 Cisco Embedded Wireless Controller Software for Catalyst Access Points Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT", }, ], }, source: { advisory: "cisco-sa-iosxe-ewc-dos-g6JruHRT", defect: [ [ "CSCvy04449", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-1615", datePublished: "2021-09-23T02:30:45.294570Z", dateReserved: "2020-11-13T00:00:00", dateUpdated: "2024-11-07T21:51:48.650Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-34740
Vulnerability from cvelistv5
Published
2021-09-23 02:26
Modified
2024-11-07 21:58
Severity ?
EPSS score ?
Summary
A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Aironet Access Point Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T00:19:48.125Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210922 Cisco Aironet Access Points WLAN Control Protocol Packet Buffer Leak Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2021-34740", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-07T21:40:33.671746Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-07T21:58:19.967Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Aironet Access Point Software", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2021-09-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-401", description: "CWE-401", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-23T02:26:41", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20210922 Cisco Aironet Access Points WLAN Control Protocol Packet Buffer Leak Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL", }, ], source: { advisory: "cisco-sa-airo-wpa-pktleak-dos-uSTyGrL", defect: [ [ "CSCvu98674", ], ], discovery: "INTERNAL", }, title: "Cisco Aironet Access Points WLAN Control Protocol Packet Buffer Leak Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2021-09-22T16:00:00", ID: "CVE-2021-34740", STATE: "PUBLIC", TITLE: "Cisco Aironet Access Points WLAN Control Protocol Packet Buffer Leak Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Aironet Access Point Software", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.4", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-401", }, ], }, ], }, references: { reference_data: [ { name: "20210922 Cisco Aironet Access Points WLAN Control Protocol Packet Buffer Leak Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL", }, ], }, source: { advisory: "cisco-sa-airo-wpa-pktleak-dos-uSTyGrL", defect: [ [ "CSCvu98674", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2021-34740", datePublished: "2021-09-23T02:26:41.933546Z", dateReserved: "2021-06-15T00:00:00", dateUpdated: "2024-11-07T21:58:19.967Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20097
Vulnerability from cvelistv5
Published
2023-03-23 00:00
Modified
2024-10-25 16:02
Severity ?
EPSS score ?
Summary
A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Aironet Access Point Software |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.587Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20230322 Cisco Access Point Software Command Injection Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironetap-cmdinj-6bjT4FL8", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2023-20097", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-25T14:36:03.962449Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-25T16:02:19.565Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Aironet Access Point Software ", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2023-03-22T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. ", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-77", description: "CWE-77", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-03-23T00:00:00", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20230322 Cisco Access Point Software Command Injection Vulnerability", tags: [ "vendor-advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironetap-cmdinj-6bjT4FL8", }, ], source: { advisory: "cisco-sa-aironetap-cmdinj-6bjT4FL8", defect: [ [ "CSCwc70131", ], ], discovery: "INTERNAL", }, title: "Cisco Access Point Software Command Injection Vulnerability", }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20097", datePublished: "2023-03-23T00:00:00", dateReserved: "2022-10-27T00:00:00", dateUpdated: "2024-10-25T16:02:19.565Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-20919
Vulnerability from cvelistv5
Published
2022-09-30 18:46
Modified
2024-11-01 18:50
Severity ?
EPSS score ?
Summary
A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cip-dos-9rTbKLt9 | vendor-advisory, x_refsource_CISCO |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T02:31:57.396Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20220928 Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cip-dos-9rTbKLt9", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2022-20919", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-01T18:43:50.327091Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-01T18:50:12.263Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2022-09-28T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.1", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-248", description: "CWE-248", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2022-09-30T18:46:37", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20220928 Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cip-dos-9rTbKLt9", }, ], source: { advisory: "cisco-sa-iosxe-cip-dos-9rTbKLt9", defect: [ [ "CSCwa96810", ], ], discovery: "INTERNAL", }, title: "Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2022-09-28T23:00:00", ID: "CVE-2022-20919", STATE: "PUBLIC", TITLE: "Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the processing of malformed Common Industrial Protocol (CIP) packets that are sent to Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation during processing of CIP packets. An attacker could exploit this vulnerability by sending a malformed CIP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a DoS condition.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.6", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-248", }, ], }, ], }, references: { reference_data: [ { name: "20220928 Cisco IOS and IOS XE Software Common Industrial Protocol Request Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-cip-dos-9rTbKLt9", }, ], }, source: { advisory: "cisco-sa-iosxe-cip-dos-9rTbKLt9", defect: [ [ "CSCwa96810", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2022-20919", datePublished: "2022-09-30T18:46:37.481110Z", dateReserved: "2021-11-02T00:00:00", dateUpdated: "2024-11-01T18:50:12.263Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-26140
Vulnerability from cvelistv5
Published
2021-05-11 19:34
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:49:07.137Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-28T14:11:58", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-26140", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { name: "https://www.fragattacks.com", refsource: "MISC", url: "https://www.fragattacks.com", }, { name: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", refsource: "MISC", url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-26140", datePublished: "2021-05-11T19:34:42", dateReserved: "2020-09-29T00:00:00", dateUpdated: "2024-08-04T15:49:07.137Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }