Vulnerabilites related to cisco - ip_phone_8821
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", matchCriteriaId: "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", vulnerable: true, }, { criteria: "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", matchCriteriaId: "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", matchCriteriaId: "21540673-614A-4D40-8BD7-3F07723803B0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", matchCriteriaId: "9E2C378B-1507-4C81-82F6-9F599616845A", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", matchCriteriaId: "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", matchCriteriaId: "7CB85C75-4D35-480E-843D-60579EC75FCB", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", matchCriteriaId: "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", matchCriteriaId: "E9273B95-20ED-4547-B0A8-95AD15B30372", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", matchCriteriaId: "AAE74AF3-C559-4645-A6C0-25C3D647AAC8", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", matchCriteriaId: "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", matchCriteriaId: "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", matchCriteriaId: "C6CE5198-C498-4672-AF4C-77AB4BE06C5C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", matchCriteriaId: "5F422A8C-2C4E-42C8-B420-E0728037E15C", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", matchCriteriaId: "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:r2:*:*:*:*:*:*", matchCriteriaId: "5F2558DF-2D1F-46BA-ABF1-08522D33268E", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", matchCriteriaId: "0B60D940-80C7-49F0-8F4E-3F99AC15FA82", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "68C08ECE-4D09-4E57-920B-B8E94E81603A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", matchCriteriaId: "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F5154A83-2499-4756-9150-8BFD9ACEF583", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "7CC235C6-63B1-4085-B9AA-47EFB17A144D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "54C41A49-87FA-4C98-8321-2808712B2F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F8ED25D1-973F-481A-8550-16508F73D2D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "35918620-E4C5-4E46-A5A9-63009333667A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "27440732-54F0-40DF-9896-88D60ABC568A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", matchCriteriaId: "FC39A276-532B-428A-83BA-141B626281A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "93103556-6C4A-4D35-91D1-5CDCDC740655", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5DEFC044-1D95-4386-AABB-ADE1099E3F85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "42759A0F-70C6-41DB-9DF9-2BC05685F678", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "95662406-0D7D-45B2-95F5-582FA275AC89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "A0E9FB66-F577-4744-B51F-3BD25293109F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "079DA749-0B94-4CCF-A3B1-7669DA213B52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "D96A05C3-1549-47DD-BADA-7872246EBDA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "2E7375AB-BE32-4879-BB54-CF5EDAB98188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "0E9E26B8-1539-4E21-AEAA-45095F79382A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "19C73CA1-2F92-4635-8D38-812D6D8ACD89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "EA17907A-388A-42E7-ACC6-2F59C72C93F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "A53A71EB-C346-42CD-AD58-F83F809D0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "90E87633-CD6E-439B-9CE8-66A1E414F09D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "742D9262-4329-4F0A-B97E-5FC65786946F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "FC14C45F-FDFB-4AAC-94EC-45860051379F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "C01E79D8-5F48-4939-BFD6-B363A76769D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CEE50FA1-6616-402A-9D86-9725206612C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5B907930-CA5C-4160-A3D1-8ACB559C9143", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "9331282F-B426-40DC-869E-F6F7DFE959A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", matchCriteriaId: "C67D4B91-66EB-490E-B43D-A7E159CC543B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", matchCriteriaId: "45A6A314-804B-47DC-B35E-804AD89588D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", matchCriteriaId: "968D60A4-036A-4792-BE8E-88F8B26444DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "754B93BA-0451-4C09-A124-284A62189D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "85293635-DD43-4651-8605-4F27F228AA91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "826FB2F4-45B5-4360-B577-11F75A1B67A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F3417E19-D7FC-487D-B316-B826DB3CB712", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "B66B6DB7-E48C-4758-915E-E4096CC5D68E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "69C3A33C-85E1-4157-81F7-39FA271CF8ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "E65FB9EC-A750-44C9-B251-5D8697C29EC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7948D988-3ED9-49BE-B820-15728DA93D21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3B465A44-EC90-41C6-BD9B-59D3B7E49540", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", matchCriteriaId: "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "DA329302-48FE-43FB-A15D-C3BEFB5AE868", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", matchCriteriaId: "37055F7B-2F2A-4B80-AC34-CAB0568BC692", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "534CF2AE-2149-4599-AC43-13EE8048B3EE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB15599-F795-4D24-A4A6-CD826F6A7A13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "441DF280-FC8C-481F-BDB9-7D757CF5BB72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "52BB9046-E47D-480A-93D2-DB0F76574E02", versionEndExcluding: "4.4.271", versionStartIncluding: "4.4.0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "C01BF34A-CD21-4B2F-9877-C89B8202B09A", versionEndExcluding: "4.9.271", versionStartIncluding: "4.9.0", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "970E3D3C-8829-4599-95A7-AC63136CE48E", versionEndExcluding: "4.14.235", versionStartIncluding: "4.14", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", versionEndExcluding: "4.19.193", versionStartIncluding: "4.19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", versionEndExcluding: "5.4.124", versionStartIncluding: "5.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", versionEndExcluding: "5.10.42", versionStartIncluding: "5.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", versionEndExcluding: "5.12.9", versionStartIncluding: "5.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", }, { lang: "es", value: "El estándar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que el flag A-MSDU en el campo de encabezado QoS de texto plano esté autenticada. Contra dispositivos que admiten la recepción de tramas A-MSDU que no son SSP (que es obligatorio como parte de 802.11n), un adversario puede abusar de esto para inyectar paquetes de red arbitrarios", }, ], id: "CVE-2020-24588", lastModified: "2024-11-21T05:15:05.740", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 2.9, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 5.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 3.5, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.1, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.613", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-04-15 20:15
Modified
2025-02-24 16:14
Severity ?
Summary
A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html | Exploit, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs | Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-05-03", cisaExploitAdd: "2021-11-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IP Phones Web Server Remote Code Execution and Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "F84C7842-0D6A-4950-AC9B-63602140BAF1", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "144FA4D4-61A7-454F-9373-F91548E4B8AE", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "85C8430D-496C-44CA-AA95-6448F3459373", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8851_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "5800EBC5-4C54-46E9-B742-A49EE6D57A32", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "BB5548D1-7E70-4E75-B0FC-FC390B858612", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8851_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "07844DC0-2E7A-4540-897D-C4E2B440C4EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", matchCriteriaId: "8AF6DC5E-F582-445E-BF05-2D55A0954663", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7841_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "1617D281-505F-49D2-AAAB-91D61F7D4797", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", matchCriteriaId: "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7821_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "B552853A-14E0-4339-A87E-7AE00BF143EA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", matchCriteriaId: "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8811_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "8260121F-1819-40ED-A3CC-86A98B84CF13", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "2404681B-34F2-4F60-AE8B-1A41E2FCFB68", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8811_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "D7BDE345-B411-4A8B-A6A6-A031C52E2844", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "D1350005-A1E5-4794-B853-9DB3494C3B78", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "F5E2CDC1-4031-4F88-94C2-4AA7AC112D87", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "228ADA90-87B0-4BBF-A7CB-ABDC2509E5A7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8845_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "363E47B4-E22B-4A8A-92CD-1ACDB2CF6CD5", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "B41E93DB-62E6-4AFB-8C72-44C51E1CB1E7", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8845_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "16218F2F-0889-437D-A8C4-EFC7C197C19A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", matchCriteriaId: "A313E64A-F43C-4FBA-A389-6171CBD709C0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7861_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "5E2460C9-F9C8-4436-BD8E-3FDD8978E8C8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", matchCriteriaId: "E52C420C-FD54-4BE4-8720-E05307D53520", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8841_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "B73D3CF0-E2A3-4A76-82D8-3C899B41BA11", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "E719FD30-98C0-4582-8ED5-DDBA01CCC055", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8841_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "6528A512-7359-4F95-9BD4-0083524F9125", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", matchCriteriaId: "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7811_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "6D715BDD-D977-4581-BA09-A2936991CFA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", matchCriteriaId: "D7260C17-7067-47AD-995F-366A5E8B10E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "AA6858D1-20BC-417A-9328-196798A23B48", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "9E4622EF-D5CA-4971-A3A7-0610C136F160", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "2740B39B-ADD1-4CD9-BEF8-FFBDEA1567F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "A3783AE8-6B80-4DC4-8525-84E63D50DAAC", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "FFC9FAB0-B9A7-476A-AAF0-A4B14FC48CF2", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "E6745422-3CE4-41A0-A87E-BD9C5DA45BF2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "EE56B858-B59D-4197-9B2A-33A03908B967", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:8831_firmware:10.3\\(1\\)es14:*:*:*:*:*:*:*", matchCriteriaId: "9F731586-5715-45FA-AB4D-7301D15DFB60", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:8831_firmware:11.0\\(1\\):*:*:*:*:*:*:*", matchCriteriaId: "188DB874-2611-4919-A2E0-A955852AB424", vulnerable: true, }, { criteria: "cpe:2.3:o:cisco:8831_firmware:11.0\\(5\\)sr1:*:*:*:*:*:*:*", matchCriteriaId: "DAD76AAB-7FD9-4F31-87C2-899128A1943E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", matchCriteriaId: "BE2514A1-486C-40F7-8746-56E2B973CBE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.", }, { lang: "es", value: "Una vulnerabilidad en el servidor web de Cisco IP Phones, podría permitir a un atacante no autenticado remoto ejecutar código con privilegios root o causar una recarga de un teléfono IP afectado, resultando en una condición de denegación de servicio (DoS). La vulnerabilidad es debido a una falta de comprobación de entrada apropiada de las peticiones HTTP. Un atacante podría explotar esta vulnerabilidad mediante el envío de una petición HTTP diseñada al servidor web de un dispositivo apuntado. Una explotación con éxito podría permitir a un atacante ejecutar código remotamente con privilegios root o causar una recarga de un teléfono IP afectado, resultando en una condición DoS.", }, ], id: "CVE-2020-3161", lastModified: "2025-02-24T16:14:27.920", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-04-15T20:15:15.097", references: [ { source: "psirt@cisco.com", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-22 20:29
Modified
2024-11-21 04:37
Severity ?
8.1 (High) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permissions. An attacker could exploit this vulnerability by uploading invalid files to an affected device. A successful exploit could allow the attacker to write files in arbitrary locations on the filesystem. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ip_phone_8821_firmware | * | |
cisco | ip_phone_8821 | - | |
cisco | ip_phone_8821-ex_firmware | * | |
cisco | ip_phone_8821-ex | - | |
cisco | ip_conference_phone_8832_firmware | * | |
cisco | ip_conference_phone_8832 | - | |
cisco | ip_phone_8800_firmware | * | |
cisco | ip_phone_8800 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BF3F2457-858E-40FA-85D1-6F7D2F159881", versionEndExcluding: "11.0\\(5\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7964E7B4-DC9E-4278-9F0F-A992C4B0A9A1", versionEndExcluding: "11.0\\(5\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "EE56B858-B59D-4197-9B2A-33A03908B967", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A670F039-B178-4D87-A8E8-56A13C1D3900", versionEndExcluding: "12.5\\(1\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "97B45071-9689-4D89-AD75-5170DA2E7A29", versionEndExcluding: "12.5\\(1\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8800:-:*:*:*:*:*:*:*", matchCriteriaId: "C1BBEA07-3154-4270-B865-D4AD26EB3B42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permissions. An attacker could exploit this vulnerability by uploading invalid files to an affected device. A successful exploit could allow the attacker to write files in arbitrary locations on the filesystem. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de gestión web de Session Initiation Protocol (SIP) en los teléfonos Cisco IP 8800 Series podría permitir que un atacante remoto autenticado escriba archivos arbitrarios en el sistema de archivos. La vulnerabilidad se debe a una validación de entrada insuficiente y a permisos a nivel de archivo. Un atacante podría explotar esta vulnerabilidad subiendo archivos inválidos a un dispositivo afectado. Un exploit exitoso podría permitir que el atacante escriba archivos en ubicaciones arbitrarias en el sistema de archivos. La vulnerabilidad afecta a los productos Cisco IP Phone 8800 Series que ejecutan una versión de software SIP anterior a la 11.0(5) para Wireless IP Phone 8821 y 8821-EX; y 12.5(1)SR1 para IP Conference Phone 8832 y el resto de IP Phone 8800 Series.", }, ], id: "CVE-2019-1765", lastModified: "2024-11-21T04:37:19.630", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-22T20:29:00.477", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:alfa:awus036h_firmware:6.1316.1209:*:*:*:*:windows_10:*:*", matchCriteriaId: "8A9FCD5B-54DD-4EF7-AB08-56EDE3B35E7B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:alfa:awus036h:-:*:*:*:*:*:*:*", matchCriteriaId: "BF0F9200-8AFD-4100-AF39-49476298C0E3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "68C08ECE-4D09-4E57-920B-B8E94E81603A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "83B4B8A7-6CAE-43F7-8DCF-0129392E41A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1750d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1D412FC9-835A-4FAB-81B0-4FFB8F48ACA3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", matchCriteriaId: "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F5154A83-2499-4756-9150-8BFD9ACEF583", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "7CC235C6-63B1-4085-B9AA-47EFB17A144D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "8396EACC-A0FA-4A4A-8411-8D9ED40B7F28", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:eec_m12:*", matchCriteriaId: "54C41A49-87FA-4C98-8321-2808712B2F68", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "F8ED25D1-973F-481A-8550-16508F73D2D2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "35918620-E4C5-4E46-A5A9-63009333667A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1788-2ia_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "27440732-54F0-40DF-9896-88D60ABC568A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1788-2ia:-:*:*:*:*:*:m12:*", matchCriteriaId: "FC39A276-532B-428A-83BA-141B626281A5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w721-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "93103556-6C4A-4D35-91D1-5CDCDC740655", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w721-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5DEFC044-1D95-4386-AABB-ADE1099E3F85", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w722-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "42759A0F-70C6-41DB-9DF9-2BC05685F678", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w722-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "95662406-0D7D-45B2-95F5-582FA275AC89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w734-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "A0E9FB66-F577-4744-B51F-3BD25293109F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w734-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "079DA749-0B94-4CCF-A3B1-7669DA213B52", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w738-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "05D1BC5E-C26E-4E3D-B0DF-014C7DE16F4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w738-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "D96A05C3-1549-47DD-BADA-7872246EBDA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "2E7375AB-BE32-4879-BB54-CF5EDAB98188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "0E9E26B8-1539-4E21-AEAA-45095F79382A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w748-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "8BD6E779-AFE3-48C3-95B7-E7BED14BAE0B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w748-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5AA05DFB-5C02-4822-8D32-406C11ABFFC2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w761-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "0F01F2C2-E968-45EE-BA91-39AEEFC0345C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w761-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "19C73CA1-2F92-4635-8D38-812D6D8ACD89", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "EA17907A-388A-42E7-ACC6-2F59C72C93F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "A53A71EB-C346-42CD-AD58-F83F809D0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w774-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F801DE5A-781D-4DDA-9BD3-A9F3A4501D34", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w774-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "90E87633-CD6E-439B-9CE8-66A1E414F09D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "742D9262-4329-4F0A-B97E-5FC65786946F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "A04D6C4A-C7DB-4757-8C34-BE6EB7D1BC50", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w778-1_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "FC14C45F-FDFB-4AAC-94EC-45860051379F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w778-1:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "C01E79D8-5F48-4939-BFD6-B363A76769D7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CEE50FA1-6616-402A-9D86-9725206612C6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "5B907930-CA5C-4160-A3D1-8ACB559C9143", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "9331282F-B426-40DC-869E-F6F7DFE959A8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "CAE6D7C0-9AA7-4EE7-B5A9-987BC549442E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2_firmware:-:*:*:*:*:*:sfp:*", matchCriteriaId: "C67D4B91-66EB-490E-B43D-A7E159CC543B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2:-:*:*:*:*:*:sfp:*", matchCriteriaId: "45A6A314-804B-47DC-B35E-804AD89588D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w786-2ia_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "236FBB62-ADAF-4316-BE4A-0F3ACE9B94FB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w786-2ia:-:*:*:*:*:*:rj45:*", matchCriteriaId: "968D60A4-036A-4792-BE8E-88F8B26444DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "754B93BA-0451-4C09-A124-284A62189D53", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:m12:*", matchCriteriaId: "85293635-DD43-4651-8605-4F27F228AA91", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-1_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "826FB2F4-45B5-4360-B577-11F75A1B67A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-1:-:*:*:*:*:*:rj45:*", matchCriteriaId: "F3417E19-D7FC-487D-B316-B826DB3CB712", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12:*", matchCriteriaId: "4B7AFF23-828B-4BB4-8A00-0E5C852C95C2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12:*", matchCriteriaId: "9A9E77DB-7B9D-40D0-8947-DFB1B2B7522C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "B66B6DB7-E48C-4758-915E-E4096CC5D68E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:m12_eec:*", matchCriteriaId: "69C3A33C-85E1-4157-81F7-39FA271CF8ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w788-2_firmware:-:*:*:*:*:*:rj45:*", matchCriteriaId: "E65FB9EC-A750-44C9-B251-5D8697C29EC2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w788-2:-:*:*:*:*:*:rj45:*", matchCriteriaId: "64BD7639-6E6B-4ED7-8AB9-393BC48F10F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7948D988-3ED9-49BE-B820-15728DA93D21", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "1AAE316D-6BA6-4C3F-9EE1-E23E4CB6FD19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3B465A44-EC90-41C6-BD9B-59D3B7E49540", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "AA96B540-439B-4A1A-9D7D-C45AEFBC7BE6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "3684DA7E-E49F-42A6-9DA2-FEF6DEDBE9B8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1:-:*:*:*:*:*:eec:*", matchCriteriaId: "43A34072-F6CC-4843-9FEF-E0ECA96BBAEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5690A7D8-2B9F-4DBB-84A8-82B1A7C822B4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "DA329302-48FE-43FB-A15D-C3BEFB5AE868", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wam766-1_6ghz_firmware:-:*:*:*:*:*:eec:*", matchCriteriaId: "AA44AF5A-1AAD-4C68-8771-E14BA8ABFBA6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wam766-1_6ghz:-:*:*:*:*:*:eec:*", matchCriteriaId: "37055F7B-2F2A-4B80-AC34-CAB0568BC692", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum763-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "534CF2AE-2149-4599-AC43-13EE8048B3EE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum763-1:-:*:*:*:*:*:*:*", matchCriteriaId: "C501445F-BDF6-4A0A-85FD-E6BFBF0A3C6F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E95E358-45E9-40EC-B3A3-D65C4BA42CE7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1:-:*:*:*:*:*:*:*", matchCriteriaId: "4EB15599-F795-4D24-A4A6-CD826F6A7A13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_wum766-1_6ghz_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "441DF280-FC8C-481F-BDB9-7D757CF5BB72", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_wum766-1_6ghz:-:*:*:*:*:*:*:*", matchCriteriaId: "FF8A9161-738C-4730-8EC9-6A5C5FDE279D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA6EF369-8D83-4F5D-BDBE-99E89AD84810", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*", matchCriteriaId: "8191FD87-4E55-4F38-8DB0-7E6772AD075B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "10BD5327-F3F8-4D0A-B6DC-2F11DF2E6866", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", matchCriteriaId: "1D717945-EE41-4D0F-86EF-90826EBE9C3E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "893D104F-6711-46F9-804C-4B57562166E7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", matchCriteriaId: "99EAEA92-6589-4DFB-BC4B-8CBA425452D9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1562i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E4AABCC2-D2A5-4A89-9DF9-6F80EB871CC9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", matchCriteriaId: "D27AB201-342D-4517-9E05-6088598F4695", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw-6300-con-x-k9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90A743E4-1302-4DAB-9300-65D8F468C8F2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw-6300-con-x-k9:-:*:*:*:*:*:*:*", matchCriteriaId: "ED3625BC-9003-4E07-B4EA-EB44CADDD6B4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, { lang: "es", value: "Se detectó un problema en el controlador ALFA de Windows 10 versión 6.1316.1209 para AWUS036H. Las implementaciones WEP, WPA, WPA2 y WPA3 aceptan tramas de texto plano en una red Wi-Fi protegida. Un adversario puede abusar de esto para inyectar tramas de datos arbitrarias independientes de la configuración de la red", }, ], id: "CVE-2020-26140", lastModified: "2024-11-21T05:19:20.550", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 3.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:A/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.687", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-22 20:29
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to critical services and cause a DoS condition. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ip_phone_8821_firmware | * | |
cisco | ip_phone_8821 | - | |
cisco | ip_phone_8821-ex_firmware | * | |
cisco | ip_phone_8821-ex | - | |
cisco | ip_conference_phone_8832_firmware | * | |
cisco | ip_conference_phone_8832 | - | |
cisco | ip_phone_8800_firmware | * | |
cisco | ip_phone_8800 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BF3F2457-858E-40FA-85D1-6F7D2F159881", versionEndExcluding: "11.0\\(5\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7964E7B4-DC9E-4278-9F0F-A992C4B0A9A1", versionEndExcluding: "11.0\\(5\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "EE56B858-B59D-4197-9B2A-33A03908B967", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A670F039-B178-4D87-A8E8-56A13C1D3900", versionEndExcluding: "12.5\\(1\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "97B45071-9689-4D89-AD75-5170DA2E7A29", versionEndExcluding: "12.5\\(1\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8800:-:*:*:*:*:*:*:*", matchCriteriaId: "C1BBEA07-3154-4270-B865-D4AD26EB3B42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to critical services and cause a DoS condition. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de gestión web de Session Initiation Protocol (SIP) en los teléfonos Cisco IP 8800 Series podría permitir que un atacante remoto sin autenticar omita la autorización, acceda a servicios críticos y provoque una condición de denegación de servicio (DoS). La vulnerabilidad existe debido a que el software no sanea las URL antes de manejar las peticiones. Un atacante podría explotar esta vulnerabilidad enviando una URL manipulada. Su explotación con éxito podría permitir que el atacante obtenga acceso a servicios críticos y provoque una denegación de servicio (DoS). La vulnerabilidad afecta a los productos Cisco IP Phone 8800 Series que ejecutan una versión de software SIP anterior a la 11.0(5) para Wireless IP Phone 8821 y 8821-EX; y 12.5(1)SR1 para IP Conference Phone 8832 y el resto de IP Phone 8800 Series. Cisco IP Conference Phone 8831 no se ha visto afectado.", }, ], id: "CVE-2019-1763", lastModified: "2024-11-21T04:37:19.370", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-22T20:29:00.400", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-284", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-22 20:29
Modified
2024-11-21 04:37
Severity ?
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability exists because the software improperly validates user-supplied input during user authentication. An attacker could exploit this vulnerability by connecting to an affected device using HTTP and supplying malicious user credentials. A successful exploit could allow the attacker to trigger a reload of an affected device, resulting in a DoS condition, or to execute arbitrary code with the privileges of the app user. Cisco fixed this vulnerability in the following SIP Software releases: 10.3(1)SR5 and later for Cisco Unified IP Conference Phone 8831; 11.0(4)SR3 and later for Cisco Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 and later for the rest of the Cisco IP Phone 7800 Series and 8800 Series.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DF44E183-3663-4805-B8B5-DDD73B7D4BBB", versionEndExcluding: "11.0\\(4\\)sr3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C03FE12B-C853-4BD2-A2C6-E16714CCD582", versionEndExcluding: "11.0\\(4\\)sr3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "EE56B858-B59D-4197-9B2A-33A03908B967", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_conference_phone_7800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B2156412-18B6-4CA2-850D-E6C15EF2820B", versionEndExcluding: "12.5\\(1\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_conference_phone_7800:-:*:*:*:*:*:*:*", matchCriteriaId: "FD555A01-346C-40E8-B956-1246095967AE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "97B45071-9689-4D89-AD75-5170DA2E7A29", versionEndExcluding: "12.5\\(1\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8800:-:*:*:*:*:*:*:*", matchCriteriaId: "C1BBEA07-3154-4270-B865-D4AD26EB3B42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:unified_ip_conferenece_phone_8831_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ECBF37AF-9846-4550-B3DE-7ECE3DED4E63", versionEndExcluding: "10.3\\(1\\)sr5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:unified_ip_conferenece_phone_8831:-:*:*:*:*:*:*:*", matchCriteriaId: "7173A2F4-EE73-47AC-B920-F7C0F3E47EEB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability exists because the software improperly validates user-supplied input during user authentication. An attacker could exploit this vulnerability by connecting to an affected device using HTTP and supplying malicious user credentials. A successful exploit could allow the attacker to trigger a reload of an affected device, resulting in a DoS condition, or to execute arbitrary code with the privileges of the app user. Cisco fixed this vulnerability in the following SIP Software releases: 10.3(1)SR5 and later for Cisco Unified IP Conference Phone 8831; 11.0(4)SR3 and later for Cisco Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 and later for the rest of the Cisco IP Phone 7800 Series and 8800 Series.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de gestión web de SIP (Session Initiation Protocol) de los teléfonos Cisco IP de la serie 7800 podría permitir que un atacante remoto no autenticado provoque una denegación de servicio (DoS) o ejecute código arbitrario. La vulnerabilidad existe debido a que el software valida incorrectamente las entradas proporcionadas por el usuario durante la autenticación de usuario. Un atacante podría explotar esta vulnerabilidad conectándose a un dispositivo afectado mediante HTTP y proporcionando credenciales maliciosas de usuario. Su explotación con éxito podría permitir que el atacante desencadene la recarga de un dispositivo afectado, lo que resulta en una condición de denegación de servicio (DoS), o ejecute código arbitrario con los privilegios del usuario de la app. Cisco solucionó esta vulnerabilidad en los siguientes lanzamientos de software SIP: 10.3(1)SR5 y siguientes para Cisco Unified IP Conference Phone 8831; 11.0(4)SR3 y siguientes para Cisco Wireless IP Phone 8821 y 8821-EX; y 12.5(1)SR1 y siguientes para el resto de Cisco IP Phone 7800 Series y 8800 Series.", }, ], id: "CVE-2019-1716", lastModified: "2024-11-21T04:37:09.980", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-22T20:29:00.353", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-rce", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-rce", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-03-22 20:29
Modified
2024-11-21 04:37
Severity ?
8.1 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ip_phone_8821_firmware | * | |
cisco | ip_phone_8821 | - | |
cisco | ip_phone_8821-ex_firmware | * | |
cisco | ip_phone_8821-ex | - | |
cisco | ip_conference_phone_8832_firmware | * | |
cisco | ip_conference_phone_8832 | - | |
cisco | ip_phone_8800_firmware | * | |
cisco | ip_phone_8800 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BF3F2457-858E-40FA-85D1-6F7D2F159881", versionEndExcluding: "11.0\\(5\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7964E7B4-DC9E-4278-9F0F-A992C4B0A9A1", versionEndExcluding: "11.0\\(5\\)", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "EE56B858-B59D-4197-9B2A-33A03908B967", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_conference_phone_8832_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A670F039-B178-4D87-A8E8-56A13C1D3900", versionEndExcluding: "12.5\\(1\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_conference_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "F1010D16-DC6E-47A6-8BF9-C1026D975E3D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "97B45071-9689-4D89-AD75-5170DA2E7A29", versionEndExcluding: "12.5\\(1\\)sr1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8800:-:*:*:*:*:*:*:*", matchCriteriaId: "C1BBEA07-3154-4270-B865-D4AD26EB3B42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de gestión web de Session Initiation Protocol (SIP) en los teléfonos Cisco IP 8800 Series podría permitir que un atacante remoto sin autenticar lleve a cabo un ataque Cross-Site Request Forgery (CSRF). La vulnerabilidad se debe a la medidas de protección contra CSRF insuficientes para la interfaz de administración web de un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad haciendo que un usuario autenticado de la interfaz siga un enlace manipulado. Su explotación con éxito podría permitir que el atacante realice acciones arbitrarias en un dispositivo objetivo mediante un navegador web y con los privilegios del usuario. La vulnerabilidad afecta a los productos Cisco IP Phone 8800 Series que ejecutan una versión de software SIP anterior a la 11.0(5) para Wireless IP Phone 8821 y 8821-EX; y 12.5(1)SR1 para IP Conference Phone 8832 y el resto de IP Phone 8800 Series. Cisco IP Conference Phone 8831 no se ha visto afectado.", }, ], id: "CVE-2019-1764", lastModified: "2024-11-21T04:37:19.503", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-03-22T20:29:00.447", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2023-01-20 07:15
Modified
2024-11-21 07:40
Severity ?
8.6 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3603E753-AD60-4AF0-8FA8-A371260CB0C1", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7800:-:*:*:*:*:*:*:*", matchCriteriaId: "EF03D5F2-0483-409B-90F0-A1430774A258", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7811_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "40DA5ABA-C866-4560-BE21-77B2643E8DB6", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7811:-:*:*:*:*:*:*:*", matchCriteriaId: "D7260C17-7067-47AD-995F-366A5E8B10E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7821_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BABDE4DB-5BAA-448E-B009-D872FC515237", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7821:-:*:*:*:*:*:*:*", matchCriteriaId: "AE7AFFF0-5B21-400B-B923-E9B7FCCE08FA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7832_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1CCABEA0-842F-449C-BE24-4B1BDD32F9BF", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7832:-:*:*:*:*:*:*:*", matchCriteriaId: "32D8B3FD-3157-49D3-A4BA-D4FAAB1B6D4C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7841_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7667725-6B7B-4A04-890D-7487B58EC256", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7841:-:*:*:*:*:*:*:*", matchCriteriaId: "73CF8A50-11BD-4506-BF2A-CCA36BF59EFF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_7861_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "702F4804-A675-4222-9AAE-2C5EF7D99001", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_7861:-:*:*:*:*:*:*:*", matchCriteriaId: "E52C420C-FD54-4BE4-8720-E05307D53520", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "02291A1F-29F1-4972-9CD9-E09116DF80C5", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8800:-:*:*:*:*:*:*:*", matchCriteriaId: "C1BBEA07-3154-4270-B865-D4AD26EB3B42", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3F8D7A6A-1279-42A9-9FE9-1F6C8F765D17", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8811:-:*:*:*:*:*:*:*", matchCriteriaId: "D0CC3127-3152-4906-9FE0-BC6F21DCADAA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A4D6EB2-404C-48CD-9F24-4845A95BA0AE", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FAFDFD58-C58F-4967-9E85-6FAE66346E37", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "EE56B858-B59D-4197-9B2A-33A03908B967", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8831_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5334C11E-B07E-49A5-95CA-536630CEA788", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8831:-:*:*:*:*:*:*:*", matchCriteriaId: "CF13D70B-1F27-4B3F-83FD-EF9688F1D123", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AA83664-C710-4B45-B09F-3E29A2EB6638", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B1C26834-45D8-4B0D-A08C-BE0594EEAB4F", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8841:-:*:*:*:*:*:*:*", matchCriteriaId: "7944CC9C-AE08-4F30-AF65-134DADBD0FA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33C51A07-3C77-4DDC-9C4F-E5E3BE55268E", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8845:-:*:*:*:*:*:*:*", matchCriteriaId: "A313E64A-F43C-4FBA-A389-6171CBD709C0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2196ED9F-DA82-4D70-9BC2-97673A96B881", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8851:-:*:*:*:*:*:*:*", matchCriteriaId: "8AF6DC5E-F582-445E-BF05-2D55A0954663", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AFBDA235-4866-4058-82F5-27297E1923BF", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9249A092-250D-4BB8-AEEA-3B2190246223", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phones_8832_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "24A5CEB2-54CA-46D0-872D-90AAB39C9023", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phones_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "6B980D4B-63D0-4786-AD62-FFE49FED33FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:unified_ip_phone_8851nr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "18741BE2-B397-4F53-9845-4CB8AF7E65DD", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:unified_ip_phone_8851nr:-:*:*:*:*:*:*:*", matchCriteriaId: "B021B260-CD3C-4EA5-9A2C-FE80B4ACA787", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:unified_ip_phone_8865nr_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2CEC15D2-210D-49B1-898D-591AA318CC82", versionEndExcluding: "14.1\\(1\\)sr2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:unified_ip_phone_8865nr:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB7D543-296F-44AE-9335-BF3244F21E55", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "503FE588-7543-45A1-A742-4657A5CC2DE8", versionEndExcluding: "11.0\\(6\\)sr4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:wireless_ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "F97DF354-7690-417E-B223-72C8BDA36DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:wireless_ip_phone_8821-ex_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "09F02957-0FED-4D40-B42D-529C0FCEF252", versionEndExcluding: "11.0\\(6\\)sr4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:wireless_ip_phone_8821-ex:-:*:*:*:*:*:*:*", matchCriteriaId: "26CAE4C7-EADB-41A9-BE48-1A4F3D8D3D7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.", }, { lang: "es", value: "Una vulnerabilidad en la interfaz de administración basada en web de los teléfonos Cisco IP Phone de las series 7800 y 8800 podría permitir que un atacante remoto no autenticado omita la autenticación en un dispositivo afectado. Esta vulnerabilidad se debe a una validación insuficiente de la entrada proporcionada por el usuario. Un atacante podría aprovechar esta vulnerabilidad enviando una solicitud manipulada a la interfaz de administración basada en web. Un exploit exitoso podría permitir al atacante acceder a ciertas partes de la interfaz web que normalmente requerirían autenticación.", }, ], id: "CVE-2023-20018", lastModified: "2024-11-21T07:40:21.247", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 4.7, source: "psirt@cisco.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 2.5, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-01-20T07:15:13.633", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-288", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-863", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:19
Severity ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:netbsd:netbsd:7.1:*:*:*:*:*:*:*", matchCriteriaId: "0A99D021-C66D-4FA2-B33C-4DAADBB6B431", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, { lang: "es", value: "Se detectó un problema en el kernel en NetBSD versión 7.1. Un punto de acceso (AP) reenvía tramas EAPOL a otros clientes aunque el remitente aún no se haya autenticado con éxito en el AP. Esto podría ser abusado en redes Wi-Fi proyectadas para lanzar ataques de denegación de servicio contra clientes conectados y facilitar la explotación de otras vulnerabilidades en clientes conectados", }, ], id: "CVE-2020-26139", lastModified: "2024-11-21T05:19:20.157", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 5.5, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.6, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.647", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.fragattacks.com", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-287", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-05-11 20:15
Modified
2024-11-21 05:15
Severity ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:ieee:ieee_802.11:*:*:*:*:*:*:*:*", matchCriteriaId: "EA94FAA4-9BBF-402D-8B33-20A5E8AAFC5D", vulnerable: true, }, { criteria: "cpe:2.3:a:linux:mac80211:-:*:*:*:*:*:*:*", matchCriteriaId: "20B7EA3B-CCBA-4483-9BDD-DC8ED8689A22", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", matchCriteriaId: "DEECE5FC-CACF-4496-A3E7-164736409252", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "11CE6C04-4994-463F-A456-1D47F2BD793A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-100:-:*:*:*:*:*:*:*", matchCriteriaId: "132AD177-3F7F-4CD7-9BD5-EE5A24CE671C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-110_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA7E7D8A-CC58-47F6-9F3F-BE74F1CF27E8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-110:-:*:*:*:*:*:*:*", matchCriteriaId: "C4E82587-A7A1-4057-896A-F30B9DF7C831", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "89F2DFE1-6E7B-42CC-9814-90F426D14490", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-120:-:*:*:*:*:*:*:*", matchCriteriaId: "AE3EC767-2ECA-44E4-AA03-9E2673A2B2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8197BD27-2AD7-434C-8F64-24B3D6D6E188", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-130:-:*:*:*:*:*:*:*", matchCriteriaId: "81C15C55-207E-4030-AC2A-B2E3791D92B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB011F08-5526-4D49-8100-A874CD265FB5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-200:-:*:*:*:*:*:*:*", matchCriteriaId: "8F81C550-CE6F-4E68-A088-5EC0CEF40600", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-230_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A1C3DCD8-9AD7-411B-95DC-B989EEC3E035", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-230:-:*:*:*:*:*:*:*", matchCriteriaId: "29B18F4E-4968-493A-BC90-5D8D7F619F39", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-235_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6AAA44BE-54CE-498B-83EF-D21DF2A57A5E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-235:-:*:*:*:*:*:*:*", matchCriteriaId: "54878C0D-8842-490F-B556-76AF47A65891", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-250_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2A71084-E505-4648-9B5C-C0305DCE91AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-250:-:*:*:*:*:*:*:*", matchCriteriaId: "EE97F0AD-8658-476A-8E22-DA67A5FD9F73", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "60A09137-CF46-420E-9792-BB6E46C5C415", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-260:-:*:*:*:*:*:*:*", matchCriteriaId: "A006A8BD-D56E-40C2-ADD2-C11759153808", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-65_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C890ABE-5D64-4D7F-A67B-BC026649E0B3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-65:-:*:*:*:*:*:*:*", matchCriteriaId: "6B617EA3-E69E-43CA-99D4-86A408C55C90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:c-75_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AD2A3CCF-E8B5-4E7F-BCE7-DB70E8E72B4B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:c-75:-:*:*:*:*:*:*:*", matchCriteriaId: "8EE26D5A-486B-48F3-9C1C-4EE3FD8F0234", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DF499EE6-0047-42C0-8360-6A2B3DF51B1B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-105:-:*:*:*:*:*:*:*", matchCriteriaId: "7A31FF47-55EE-451B-ABDD-CE82E8EFBC98", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:o-90_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0B9860B5-6CC7-4F29-9514-A469AF6B28F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:o-90:-:*:*:*:*:*:*:*", matchCriteriaId: "41F9E4B2-63FC-4F53-9C12-7478B7B6AD48", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-118_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0C9D810C-AA04-4748-80EB-3FB5DE507F89", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-118:-:*:*:*:*:*:*:*", matchCriteriaId: "5BEE861E-2604-42BD-ABAA-DA729F4EBDBC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:arista:w-68_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1C1EF830-C210-48DB-A3F8-FC706AC5F3C7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:arista:w-68:-:*:*:*:*:*:*:*", matchCriteriaId: "9F03BB48-C89A-41F6-99DE-12FF95DCD9F2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5F7999A6-03FE-4C38-9C46-B3221E7B3815", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", matchCriteriaId: "CC042678-29AA-44F7-BBF0-1D752D25687D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "81634E2A-FAD5-4B1C-A93E-545870615343", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "AA8D5057-138A-42C4-BA35-8077A0A60068", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1100-8p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ECAB3869-E15B-4ED4-A98C-75DE0DBA8F3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1100-8p:-:*:*:*:*:*:*:*", matchCriteriaId: "ED555B12-41F4-4D62-B519-22601FB7AF8D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1101-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "57F5F016-52B5-4A4C-9EE0-B478A98CEC9A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1101-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "21B10158-5235-483E-BACD-C407609EA6BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-2p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B17C8544-CB4E-407B-BE52-4D42D81BF1BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-2p:-:*:*:*:*:*:*:*", matchCriteriaId: "8964F9BA-6E6C-44BF-9A8C-93D081B6678C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:1109-4p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BA214FF2-358E-4291-B803-58A9AC14ABEC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1109-4p:-:*:*:*:*:*:*:*", matchCriteriaId: "51251FE1-67D2-4903-B7D3-E0C727B9A93C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1532_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31FB34B4-235B-4C92-8E9C-DD04136C745F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1532:-:*:*:*:*:*:*:*", matchCriteriaId: "9CCECB59-4EA8-4FD4-81CB-329EBF7C080C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542d_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2051CA5B-967D-4830-87EB-1756559C1FED", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", matchCriteriaId: "C5DB7510-2741-464A-8FC9-8419985E330F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1542i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C72EC048-B84B-4744-BC04-BA8612C79D04", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", matchCriteriaId: "3AE916B2-CAAD-4508-A47E-A7D4D88B077A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5DD78C-B89C-44AF-B153-033FEDE22CF8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552:-:*:*:*:*:*:*:*", matchCriteriaId: "B54636F7-8061-49A1-923B-F976491593CB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1552h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D795375C-E17C-4E05-8C88-F080C22652B2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*", matchCriteriaId: "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1572_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53106CD6-749D-4781-B28E-E075E61D1196", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1572:-:*:*:*:*:*:*:*", matchCriteriaId: "F1FA8DA7-0D47-4C37-B96A-EBE004B0B23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "C25445A6-4B1E-4F77-804D-FFD9507B022A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1702:-:*:*:*:*:*:*:*", matchCriteriaId: "729FDD5F-C378-4DF1-B6CB-A1F62FD4550D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "54BDAFC3-940F-40C4-896E-99B6DABA9E3F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*", matchCriteriaId: "02F4C00A-D1E2-4B21-A14E-F30B4B818493", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F9FC7CCB-52D2-4B4D-82AA-759C80E17018", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*", matchCriteriaId: "BC836B4D-A489-4300-B0A2-EF0B6E01E623", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DB94F02B-C71A-4EAE-B931-30CFA52A890C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", matchCriteriaId: "36F923CF-D4EB-48F8-821D-8BB3A69ABB62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1810w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EF011423-521A-41C4-A403-FF82C2C14874", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", matchCriteriaId: "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E076DDF4-6817-4CFD-B4A3-243D8D755DE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", matchCriteriaId: "F8BF9DDB-884D-47B5-A295-8BFA5207C412", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1815i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "205E19BF-078D-475D-A9F0-4A1604A2D554", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", matchCriteriaId: "207DC80E-499C-4CA3-8A88-F027DBC64CCF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "72A15C8E-73D8-480D-B5C9-E72E8D4695D0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1832:-:*:*:*:*:*:*:*", matchCriteriaId: "751469E2-91A8-48F1-81A8-AEBF1420EECE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1842_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFAEDA4F-C728-4D60-8661-90429A264E40", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1842:-:*:*:*:*:*:*:*", matchCriteriaId: "18035D1A-C8D9-4055-A5CA-541711DBA71A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_1852_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "883C24F0-99B3-42E0-AC27-6B4B3D4F5FA2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_1852:-:*:*:*:*:*:*:*", matchCriteriaId: "80871D9C-43D5-4507-AC36-CDD7CC4A7C86", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8CC13255-92FB-4585-B6EF-E4D94EB6158D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2702:-:*:*:*:*:*:*:*", matchCriteriaId: "1917B7F4-17DD-4734-A856-ED7CE9AF8DA7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAD27F3F-961F-4F44-AD2D-CF9EAD04E2B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", matchCriteriaId: "3C28A6B0-10FF-4C6D-8527-2313E163C98E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4A796152-A567-4B7A-8202-94858CD95119", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", matchCriteriaId: "098A82FF-95F7-416A-BADD-C57CE81ACD32", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_2800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ED80079E-2744-4325-86DA-EA3647B45179", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", matchCriteriaId: "DD1D5813-9223-4B3F-9DE2-F3EF854FC927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7B836136-CCD2-49AC-9871-1C3B6255EDA7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6F72DB8D-9A3F-436A-AE5D-AC8941ED527E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EFFE3575-DDAF-433E-8D77-4CCADADC99B9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", matchCriteriaId: "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4FD51123-ECF1-4042-AE1C-724FF4C51F43", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", matchCriteriaId: "10D7583E-2B61-40F1-B9A6-701DA08F8CDF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800i_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "34C47517-5F78-4D3C-818E-6DBFD1B56592", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", matchCriteriaId: "945DDBE7-6233-416B-9BEE-7029F047E298", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_3800p_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F103B67B-89C9-465D-AF2E-3D24A8F5465D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", matchCriteriaId: "0ED89428-750C-4C26-B2A1-E3D63F8B3F44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_4800_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5618CE7C-DF82-4849-AC79-A00B747883BE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", matchCriteriaId: "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_ap803_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "40F38C35-EFC2-4CF9-AD88-FADC42F0649D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_ap803:-:*:*:*:*:*:*:*", matchCriteriaId: "5062B18F-F28C-4975-A5A3-45C0EC03F448", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:aironet_iw3702_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "338A22C8-5617-45C8-AB3E-5E45341DFE60", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:aironet_iw3702:-:*:*:*:*:*:*:*", matchCriteriaId: "6214A82C-54A6-48FC-9714-742704BEF1D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68410865-70F5-4578-99E4-827DBE0207B1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", matchCriteriaId: "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6FF827E8-02BE-42C0-A0CE-B649601847E4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", matchCriteriaId: "19F93DF4-67DB-4B30-AC22-60C67DF32DB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9105axw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C9309C6-EC43-4EB9-BD7A-CBCC581AA58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", matchCriteriaId: "59C77B06-3C22-4092-AAAB-DB099A0B16A6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EEB7E5B-AE32-455A-A351-368FB78E5276", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", matchCriteriaId: "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3EE86352-EEDB-4890-87B8-025EA970219B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "56A3430C-9AF7-4604-AD95-FCF2989E9EB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3C3DCF4E-081A-4375-A4A0-AAAD8F024114", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", matchCriteriaId: "DE4C56A6-E843-498A-A17B-D3D1B01E70E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9115axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B69CC2B-CD3A-4BEF-8FF1-9925E460B049", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", matchCriteriaId: "F050F416-44C3-474C-9002-321A33F288D6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06C11A3E-E431-4923-AEBA-25E3247F19C3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", matchCriteriaId: "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6E48E571-AE00-47E2-BABC-849A63DBDCF4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9117axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9A46503-A8BD-4F95-BAB0-2DE5D689DD4F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", matchCriteriaId: "7A699C5C-CD03-4263-952F-5074B470F20E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1EA2B34D-533C-4316-AD59-EA2FCF10B9F0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", matchCriteriaId: "A47C2D6F-8F90-4D74-AFE1-EAE954021F46", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A8A6B51-5192-4B98-9D94-682290890074", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D07AB0E3-151D-4D80-A482-41E7A27AE068", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", matchCriteriaId: "46D41CFE-784B-40EE-9431-8097428E5892", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "0A99728C-9E6B-4249-BAAA-C080109EFC4A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", matchCriteriaId: "5D148A27-85B6-4883-96B5-343C8D32F23B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9120axp_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8C73A651-932E-43CA-B40F-2F75510AEE36", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", matchCriteriaId: "735CA950-672C-4787-8910-48AD07868FDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8A71D9CA-91DF-48DD-AE3D-DED883666A75", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "C11EF240-7599-4138-B7A7-17E4479F5B83", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axd_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FF43EC0A-AC28-408A-8375-11CE249217A1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", matchCriteriaId: "E987C945-4D6D-4BE5-B6F0-784B7E821D11", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9124axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "ABA19FD7-047B-43AA-9237-807AAA2E9F7D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", matchCriteriaId: "B434C6D7-F583-4D2B-9275-38A5EC4ECC30", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "19D85A86-1D8B-4006-8BF7-4593B1D7EB70", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", matchCriteriaId: "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130_ap_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "166D74EA-8820-4C78-B43B-FCBC9779FCB7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", matchCriteriaId: "248A3FFC-C33C-4336-A37C-67B6046556E5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axe_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "67C380AE-C888-4AED-80D2-B9AF5EB9EC85", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", matchCriteriaId: "4EC1F736-6240-4FA2-9FEC-D8798C9D287C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_9130axi_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1AA48001-7F56-4155-B70D-5DC41D73DB38", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", matchCriteriaId: "169E5354-07EA-4639-AB4B-20D2B9DE784C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB09D94E-A6B2-496D-87A3-53CB9872FA69", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "C559D6F7-B432-4A2A-BE0E-9697CC412C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_ac_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FE4AFA1C-5A9E-4DF4-B9C7-66EF918548C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:*", matchCriteriaId: "23153AA4-B169-4421-BFF8-873205FC9C21", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dc_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE3E846C-359B-4EF1-AD68-DE612C5697F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:*", matchCriteriaId: "67DC3B71-B64D-4C49-B089-B274FA34ECB6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:catalyst_iw6300_dcw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4CFE9F2D-407B-49CE-BB6C-80DC941A9371", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:*", matchCriteriaId: "4F857465-314F-4124-9835-8A269486D654", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:esw6300_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A3EBAC6D-93DB-4380-8B6E-61555A9C8A3C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*", matchCriteriaId: "09051BC5-CFE7-43EF-975D-BF77724E8776", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_6861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD79F5E4-AA2D-40EB-9E59-2FEB4FD49ECD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_6861:-:*:*:*:*:*:*:*", matchCriteriaId: "C05A7CA6-AD58-45D7-AF32-129E22855D8E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8821_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A138C033-0F4D-41F8-B0FF-CDE9261DA7D9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8821:-:*:*:*:*:*:*:*", matchCriteriaId: "36C99E0B-0383-4CB3-B325-EC0F3D57D39D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8832_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2CDAD5D-3702-42EE-AE5A-A08842870EEA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8832:-:*:*:*:*:*:*:*", matchCriteriaId: "A5EA5C6B-243B-419A-9C60-1CDBD039C1D8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8861_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CC9DD95-DC0E-4A47-A0EB-32D551B323CD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8861:-:*:*:*:*:*:*:*", matchCriteriaId: "090EE553-01D5-45F0-87A4-E1167F46EB77", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ip_phone_8865_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DAAAB671-8EBF-4D9C-9AA5-E3C306CDB931", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ip_phone_8865:-:*:*:*:*:*:*:*", matchCriteriaId: "BB99B9AB-64B5-4989-9579-A1BB5D2D87EF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FB907B21-237D-4629-964C-408B5AD590E6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62C534-29F8-48CA-9D45-42C49CE68577", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-bk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2F956BF-E845-43FF-87A8-EA62DDFB1228", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-bk9:-:*:*:*:*:*:*:*", matchCriteriaId: "B670C5A3-4E19-428F-87D0-C2B12EE2CB92", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829-2lte-ea-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4541452E-32E8-451B-B8F3-1118ECCBAE50", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829-2lte-ea-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "6BF5C3D3-833D-405B-8E1E-ED3BC29CD5E0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ck9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D5C512E9-F7A6-492E-BE4B-93858E34CCD9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ck9:-:*:*:*:*:*:*:*", matchCriteriaId: "F8D39174-298E-4C06-A289-B0C4585B2E99", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-ek9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B6041298-45A9-41CB-A644-55D5DC40B5D4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-ek9:-:*:*:*:*:*:*:*", matchCriteriaId: "CB259DDC-AB98-405E-A369-49A3B89F48F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-sk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2A1385AA-FACE-4150-93E8-610A73F90CCB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-sk9:-:*:*:*:*:*:*:*", matchCriteriaId: "99B57D05-6702-4026-9E36-0CBEC6BE8001", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-ga-zk9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "715401BE-1E29-4260-9D10-245C6246BE94", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-ga-zk9:-:*:*:*:*:*:*:*", matchCriteriaId: "CC62F7A8-9D57-4703-A7DF-451C2CA75919", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-na-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CC762476-57D4-40E8-BE70-2F6861F31EF7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-na-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "78F497A3-8153-4524-9E8D-2CFDCF2ADCDE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ir829gw-lte-vz-ak9_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "795A3C41-753D-4590-B71F-37E9DD7DD5D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:ir829gw-lte-vz-ak9:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD4298-A8D5-4D7C-A9D9-694606042C12", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr10_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8E9F6455-59CC-4A3B-AFDD-60B5DD1E9ECF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr10:-:*:*:*:*:*:*:*", matchCriteriaId: "5EF406E2-A24B-4D94-B4F7-2186B1D82462", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_gr60_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EC624300-4EBB-44B9-9D90-F411368FE60A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_gr60:-:*:*:*:*:*:*:*", matchCriteriaId: "33B44092-CC37-4683-920D-8F84C60CCCEF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr12_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "9005D484-CEF5-4B8D-86B0-6CB5860A157E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr12:-:*:*:*:*:*:*:*", matchCriteriaId: "03F4DBFC-42FC-44FD-9EDF-4C0C92053E4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr20_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BE66B0F4-1211-40A4-BDB3-D8F6C74678AF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr20:-:*:*:*:*:*:*:*", matchCriteriaId: "07B1207B-C065-483D-8AB3-6B9CEC4D3C7C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr26_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "06205774-F85A-42F8-B599-1A529BBFA68B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr26:-:*:*:*:*:*:*:*", matchCriteriaId: "60D19311-A114-455C-9011-004446C80E27", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr30h_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6C922D55-E2DC-4970-A381-30F95CEB038B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr30h:-:*:*:*:*:*:*:*", matchCriteriaId: "602DA0AF-86EB-4A01-BDE3-43596DEC746A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr32_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B2718D7-1D20-40D5-9E43-7AE1AA7AFCCF", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr32:-:*:*:*:*:*:*:*", matchCriteriaId: "E011F146-3AB9-446D-ACFD-FE5B021735D3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr33_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BFB4CE7A-6FC1-4171-A743-CD8BB14C9864", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr33:-:*:*:*:*:*:*:*", matchCriteriaId: "12E670DC-C4D2-4277-A4DD-222D60A7CDB1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr34_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F7449719-1071-41B8-BDE9-81ACFBEE5D0F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr34:-:*:*:*:*:*:*:*", matchCriteriaId: "814ADA42-72A9-48D6-B524-5F5BD76F3059", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr36_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "25616833-BCF6-4611-A9AB-248F761C5603", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr36:-:*:*:*:*:*:*:*", matchCriteriaId: "8A66108F-5CED-4D41-8EE9-9479090B31DD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "92DD4610-420C-459B-9B05-85600EF466D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42:-:*:*:*:*:*:*:*", matchCriteriaId: "18E7D194-AA15-43CD-9019-7B286F528773", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr42e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "78B15252-5725-4B7B-8DBE-10251EB9C212", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr42e:-:*:*:*:*:*:*:*", matchCriteriaId: "6FB4754D-3B94-42AA-A150-6BDFF42B3270", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr44_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63217CCA-1926-46AD-956E-702A94420D91", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr44:-:*:*:*:*:*:*:*", matchCriteriaId: "07E495B6-CA7A-4F58-99A2-550F83E1E020", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr45_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "6B9BC8A2-451A-4BDE-B073-FF39DD9E5D90", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr45:-:*:*:*:*:*:*:*", matchCriteriaId: "C4F47740-D0F3-478B-AFC3-51EB3AED34A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7DC56150-D025-40A9-B350-8E95B62D236C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46:-:*:*:*:*:*:*:*", matchCriteriaId: "27E9718F-E50B-412F-86D7-DA6F39056006", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr46e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "914C5C0C-EACD-4A4C-83B2-26AA4EF283D5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr46e:-:*:*:*:*:*:*:*", matchCriteriaId: "B6B83072-84F6-43A4-9CC1-32924AFCC737", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr52_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E1F09491-2234-4C86-A80C-445B48A9FE78", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr52:-:*:*:*:*:*:*:*", matchCriteriaId: "5634D1AB-B64D-44D0-A431-FE52E879B4BD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D8998B44-D926-46F9-AF3F-02EEF99680A5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53:-:*:*:*:*:*:*:*", matchCriteriaId: "920CF4B6-9424-48DA-9622-FB0C0510E52F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr53e_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "746D2300-CA9A-4C09-9A2B-FCC9DAEC74EC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr53e:-:*:*:*:*:*:*:*", matchCriteriaId: "3EC322AE-6731-41F3-9C59-8CF9622D997A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "79419F89-0F01-4FD7-9102-ABFAFF3F2424", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr55:-:*:*:*:*:*:*:*", matchCriteriaId: "C0036877-C975-4AC7-B933-E5BC5E300B44", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr56_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC64210E-A2F8-42DC-AB94-2547A51F63C5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr56:-:*:*:*:*:*:*:*", matchCriteriaId: "E37474E5-76DE-4326-A5A8-D8900A8A2F62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr62_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "089164E3-B852-43BA-8C2C-FEE1C267C58C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr62:-:*:*:*:*:*:*:*", matchCriteriaId: "2F8F3095-F280-44B0-8BC6-50221247ACE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr66_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "27DA3F64-514B-4DB7-A6B0-6A303F296DC7", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr66:-:*:*:*:*:*:*:*", matchCriteriaId: "CBB99337-4422-46AB-9B79-A96CE207AC28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BD532656-21FE-4F82-846E-C8CB752B87F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr70:-:*:*:*:*:*:*:*", matchCriteriaId: "37D7E013-920A-4C32-98C1-FBD7C450DD88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr72_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E80D395-C853-41A3-8438-BF880C799A01", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr72:-:*:*:*:*:*:*:*", matchCriteriaId: "68086DA9-AD50-41DC-B8B5-D9BB0512C6B6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr74_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8181BA-846A-4D83-9DB9-B915B9EFFD7C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr74:-:*:*:*:*:*:*:*", matchCriteriaId: "366ABABA-D9C5-4D46-9516-7262AA32D4CD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr76_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B02C40A8-0294-4C3D-8AC9-8D56AF1D2B4E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr76:-:*:*:*:*:*:*:*", matchCriteriaId: "D071FC26-097A-432B-8900-DA02D3116D29", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr84_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2D4901FE-B1AE-4CAB-9D91-139737B6E832", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr84:-:*:*:*:*:*:*:*", matchCriteriaId: "9543B910-A999-4CEF-B06A-3F1A46784BF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mr86_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "AC06358C-6F27-4A27-8553-CF138D4214CC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mr86:-:*:*:*:*:*:*:*", matchCriteriaId: "A57AA24E-09E0-4EB6-9580-A68267767119", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx64w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "15CD8683-DFB3-45E3-B6E2-92AFD846B0BA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx64w:-:*:*:*:*:*:*:*", matchCriteriaId: "B1038F5F-020D-41FD-9C3D-F2685F1EA916", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx65w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "01AD96C5-1620-4339-94E7-343E1ADAAC4C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx65w:-:*:*:*:*:*:*:*", matchCriteriaId: "69A23113-F7E1-4587-A4FF-A4AAB446A69D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3F910935-E534-462D-8045-71C58BDD7285", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67cw:-:*:*:*:*:*:*:*", matchCriteriaId: "E85585DA-C918-445B-9B44-B2B1A982A1F7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx67w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "4B2F5CB3-1AE0-4905-A28B-090FDA56622E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx67w:-:*:*:*:*:*:*:*", matchCriteriaId: "F2529662-8A54-4DFC-80E7-922CF22DE2F3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68cw_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "39884334-73AF-4E98-B05A-20FFF82B5DF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68cw:-:*:*:*:*:*:*:*", matchCriteriaId: "18E682AA-05AD-483F-915F-A2B2C98233B7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_mx68w_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85EF67F0-973F-4FD1-8077-CE68D2AB1149", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_mx68w:-:*:*:*:*:*:*:*", matchCriteriaId: "03F9C184-3811-4A26-846D-54ECE7CF939F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "04CF5026-CC39-48FF-A8F0-8E31A425343E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3:-:*:*:*:*:*:*:*", matchCriteriaId: "FB81CFD0-9558-47AB-96E4-CB21C1AA9159", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:meraki_z3c_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7F97974E-3C2B-49DB-A0FA-B5FEE7C98B18", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:meraki_z3c:-:*:*:*:*:*:*:*", matchCriteriaId: "6646F004-E0E0-4316-A022-2793C28FBCCC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "61A0EF95-7CC5-4EE2-A5D8-803195F63F49", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55:-:*:*:*:*:*:*:*", matchCriteriaId: "E6554B9F-CD89-49B4-B55A-510B1C881C4F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_55s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "68546316-D08D-4E0B-BDDE-BF6320B730EB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_55s:-:*:*:*:*:*:*:*", matchCriteriaId: "5D0EC6FF-44F6-4033-BDAF-A396C2635D3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "85FDA9FB-BB79-4A60-B825-D68B3719BFE3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70:-:*:*:*:*:*:*:*", matchCriteriaId: "A85B502B-2F55-4CA5-9AAA-0CD5BBA45EB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_70s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "5565DF04-82F3-40C7-8E82-44A0DA72398B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_70s:-:*:*:*:*:*:*:*", matchCriteriaId: "15073B83-81ED-4E98-8521-1320F8120C3F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_board_85s_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "2CA125CA-2BF9-4F22-8F8B-DC2E09A19E51", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_board_85s:-:*:*:*:*:*:*:*", matchCriteriaId: "31842684-B05D-4E17-9229-EC6993E78612", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "69224767-0E2B-4A85-A7F1-77C6B41668DE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx70:-:*:*:*:*:*:*:*", matchCriteriaId: "5EEB693F-64A4-46CC-B7AB-8BC0AA84F9E1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_dx80_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "53BE3D06-730E-44E2-B3B0-ED29AB5D1BF1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_dx80:-:*:*:*:*:*:*:*", matchCriteriaId: "C17B385C-68D5-4FF5-AE40-6EDA46E3ACB7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "90095155-ABC0-43C9-896A-55A797EC2055", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55:-:*:*:*:*:*:*:*", matchCriteriaId: "9A983D4D-9E04-45CE-BE3C-9FCD0018837F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_55_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ABF29-B908-4A43-B3CC-9145721727A9", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_55_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "9A36CB8A-C74F-46B4-BFCE-523488D33B93", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CA1BD59F-078D-45D2-AC39-C479A4C6E7CA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70:-:*:*:*:*:*:*:*", matchCriteriaId: "AD45F341-FAD8-4B10-B28C-8697E51C6B61", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB5631A8-0201-432E-9912-B99D44D757DB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual:-:*:*:*:*:*:*:*", matchCriteriaId: "6BB2955F-2C82-4668-8C0B-412BEFE0E09E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_dual_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "A16E007C-A310-474D-8174-EC98FEDDCE76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_dual_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "40E028E3-2DEB-4015-9BB0-97413DE60A47", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "CCE92390-9835-4556-A439-5A6FE108A9AB", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single:-:*:*:*:*:*:*:*", matchCriteriaId: "1B47AE71-CF1B-402B-BB60-645A856A632D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_70_single_g2_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "BEB8DBF7-428A-42D4-8D52-8FF1329D3A56", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_70_single_g2:-:*:*:*:*:*:*:*", matchCriteriaId: "4C05259D-1F6C-440C-BCF4-A87BCC2EEA81", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "3610C3BC-6994-443F-BD27-0D11293C4079", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit:-:*:*:*:*:*:*:*", matchCriteriaId: "7AD5AD81-0976-483E-AA31-6D53A63A8D90", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:webex_room_kit_mini_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "31D7CC29-6916-4A75-86DE-0BC4FBA3A639", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:webex_room_kit_mini:-:*:*:*:*:*:*:*", matchCriteriaId: "D320D1AC-EAA7-45FD-B932-FC9554934BC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "28B0DBF3-63BB-40EF-9D46-E32D074D73DA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "B5A8F30C-6BB7-4CC6-ADBE-1859DAF66C58", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1E5ADC21-F308-4CAA-8E98-4E7FDC7EDAAC", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "C08E2F3E-C4B5-4227-A88D-C50E209A12CF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "E2915178-6BB6-45EE-A19D-EDB5B78F2BE2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "C2795E42-D044-4D48-BCB2-61CC1A3471B1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "7154EAF0-2E61-4813-B443-C4556137EB4D", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "D382D4A1-C8FD-4B47-B2C4-145232EC8AC5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_ac_1550_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D7262E71-08D0-4F5E-8445-1FA0E2243340", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_ac_1550:-:*:*:*:*:*:*:*", matchCriteriaId: "EA05D5D2-F6C1-4FBB-B334-73F30F108562", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6_ax1650_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "DD2249BC-F119-471D-9D71-4690A65A1020", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", matchCriteriaId: "7E239C04-1D6B-4305-9340-BFEC3E54E19A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:killer_wi-fi_6e_ax1675_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "1CA43945-7F16-4A50-9E25-D91EE4A270F1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", matchCriteriaId: "35F09C95-25BD-440A-AD79-8510E54F8DD9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3165_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "662CE728-C754-465B-A4AC-E63D5115EFC4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3165:-:*:*:*:*:*:*:*", matchCriteriaId: "C527CEB1-3D59-4ACD-B67F-B3919AFCE54C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_3168_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "160C541B-2617-4199-914D-ECE3A0791397", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_3168:-:*:*:*:*:*:*:*", matchCriteriaId: "EA1FA4A0-728B-4DB1-BA3C-CA80ECBA8624", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B9C7F70F-207C-4D8C-8C3E-08C7772810F8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8260:-:*:*:*:*:*:*:*", matchCriteriaId: "EB7638C7-6F12-4C10-8B6D-5F866950CA05", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_8265_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "FA4C0E13-8027-4375-AA26-764DAD7E3C9B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_8265:-:*:*:*:*:*:*:*", matchCriteriaId: "3CDDDE40-5D30-49AF-91C0-9A4FA7741201", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9260_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "30A4744B-DA96-4614-AA99-9198A6D4C442", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9260:-:*:*:*:*:*:*:*", matchCriteriaId: "09145915-AFD1-4D5D-8178-8571C43A0BA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9461_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "63756272-F713-4249-91C2-F29A382C63A6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9461:-:*:*:*:*:*:*:*", matchCriteriaId: "C1950BF4-323D-4A25-A645-3ED60ED6F3AC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9462_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "8EFDF863-4FB2-4D21-8744-A82A7C0EAA76", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9462:-:*:*:*:*:*:*:*", matchCriteriaId: "28157739-A073-4B01-B308-470841344A2F", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_ac_9560_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "42D55365-A759-4F72-B85D-5C13710F2AF6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_ac_9560:-:*:*:*:*:*:*:*", matchCriteriaId: "52B5EF48-BA3E-470C-9C68-12CEF8EFF045", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "B8531052-3602-4309-93A9-CA7020EF95F4", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "CB9FC918-AC9F-4C15-8404-1C2E8DC506A9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "EB831D03-30CD-4218-9E69-13FC12115805", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "D5A7944D-2BB4-47A9-A2F5-AB68A9FC8C70", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wi-fi_6e_ax210_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "049297F7-84C0-4AD0-8806-AA41AC02CEAE", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", matchCriteriaId: "77EADB2D-F10B-40A9-A938-A89EE0FEFF60", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:proset_wireless_7265_\\(rev_d\\)_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "D2C67C7D-DA10-47A7-8407-5624981DFBE8", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:proset_wireless_7265_\\(rev_d\\):-:*:*:*:*:*:*:*", matchCriteriaId: "2BFF8901-DEFF-4D08-8692-571682DE8582", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax200_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "55FD8273-3968-4A85-A4FF-00CCE3B89C25", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", matchCriteriaId: "9D653F9C-5B2E-400F-8F50-BFE466F08F0E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:intel:wi-fi_6_ax201_firmware:-:*:*:*:*:*:*:*", matchCriteriaId: "F2DF0C27-886C-48F8-83DA-85BE0F239DD3", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", matchCriteriaId: "A0433774-9479-4A01-B697-1379AEA223C9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "C2C083CF-3D4D-4AF0-8461-835F6AC264CC", versionEndExcluding: "4.4.271", versionStartIncluding: "4.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "11580478-2F79-45B8-9BC0-FEF28259A4F5", versionEndExcluding: "4.9.271", versionStartIncluding: "4.9", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "970E3D3C-8829-4599-95A7-AC63136CE48E", versionEndExcluding: "4.14.235", versionStartIncluding: "4.14", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "FC7D3563-5878-403A-9BB7-6C44E6FE10A0", versionEndExcluding: "4.19.193", versionStartIncluding: "4.19", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "01D49B11-5E8A-427F-B9BE-8A5174DEDD65", versionEndExcluding: "5.4.124", versionStartIncluding: "5.4", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "B39B1E70-2AF7-4482-9ADF-45A1C04A4BC3", versionEndExcluding: "5.10.42", versionStartIncluding: "5.10", vulnerable: true, }, { criteria: "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", matchCriteriaId: "3B1CFA77-6B5E-430C-AC49-3B3508F2D903", versionEndExcluding: "5.12.9", versionStartIncluding: "5.12", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", }, { lang: "es", value: "El estándar 802.11 que sustenta a Wi-Fi Protected Access (WPA, WPA2, y WPA3) y Wired Equivalent Privacy (WEP) no requiere que todos los fragmentos de una trama estén cifrados con la misma clave. Un adversario puede abusar de esto para descifrar fragmentos seleccionados cuando otro dispositivo envía tramas fragmentadas y la clave de cifrado WEP, CCMP o GCMP es periódicamente renovada", }, ], id: "CVE-2020-24587", lastModified: "2024-11-21T05:15:05.303", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "HIGH", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 1.8, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:A/AC:H/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 3.2, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", availabilityImpact: "NONE", baseScore: 2.6, baseSeverity: "LOW", confidentialityImpact: "LOW", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-05-11T20:15:08.580", references: [ { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "cve@mitre.org", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Third Party Advisory", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.fragattacks.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-327", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2020-3161
Vulnerability from cvelistv5
Published
2020-04-15 20:10
Modified
2024-11-08 16:11
Severity ?
EPSS score ?
Summary
A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs | vendor-advisory, x_refsource_CISCO | |
http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IP phone |
Version: n/a |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T07:24:00.645Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20200415 Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2020-3161", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T16:11:11.668072Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2021-11-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3161", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-08T16:11:35.635Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IP phone", vendor: "Cisco", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2020-04-15T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about the vulnerability that is described in this advisory. Cisco PSIRT is not aware of any malicious use of this vulnerability.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-17T16:05:59", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20200415 Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html", }, ], source: { advisory: "cisco-sa-voip-phones-rce-dos-rB6EeRXs", defect: [ [ "CSCuz03016", "CSCvs78272", "CSCvs78441", ], ], discovery: "INTERNAL", }, title: "Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2020-04-15T16:00:00-0700", ID: "CVE-2020-3161", STATE: "PUBLIC", TITLE: "Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IP phone", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web server for Cisco IP Phones could allow an unauthenticated, remote attacker to execute code with root privileges or cause a reload of an affected IP phone, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of proper input validation of HTTP requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web server of a targeted device. A successful exploit could allow the attacker to remotely execute code with root privileges or cause a reload of an affected IP phone, resulting in a DoS condition.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is aware of public announcements about the vulnerability that is described in this advisory. Cisco PSIRT is not aware of any malicious use of this vulnerability.", }, ], impact: { cvss: { baseScore: "9.8", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20200415 Cisco IP Phones Web Server Remote Code Execution and Denial of Service Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voip-phones-rce-dos-rB6EeRXs", }, { name: "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/157265/Cisco-IP-Phone-11.7-Denial-Of-Service.html", }, ], }, source: { advisory: "cisco-sa-voip-phones-rce-dos-rB6EeRXs", defect: [ [ "CSCuz03016", "CSCvs78272", "CSCvs78441", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2020-3161", datePublished: "2020-04-15T20:10:11.570472Z", dateReserved: "2019-12-12T00:00:00", dateUpdated: "2024-11-08T16:11:35.635Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-26139
Vulnerability from cvelistv5
Published
2021-05-11 19:37
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:49:07.127Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-28T14:09:21", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-26139", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { name: "https://www.fragattacks.com", refsource: "MISC", url: "https://www.fragattacks.com", }, { name: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", refsource: "MISC", url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", refsource: "MLIST", url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-26139", datePublished: "2021-05-11T19:37:55", dateReserved: "2020-09-29T00:00:00", dateUpdated: "2024-08-04T15:49:07.127Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1765
Vulnerability from cvelistv5
Published
2019-03-22 20:05
Modified
2024-11-21 19:42
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permissions. An attacker could exploit this vulnerability by uploading invalid files to an affected device. A successful exploit could allow the attacker to write files in arbitrary locations on the filesystem. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Wireless IP Phone 8821 and 8821-EX |
Version: unspecified < 11.0(5) |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.715Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190320 Cisco IP Phone 8800 Series Path Traversal Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1765", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:59:55.624771Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:42:16.141Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Wireless IP Phone 8821 and 8821-EX", vendor: "Cisco", versions: [ { lessThan: "11.0(5)", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Cisco IP Conference Phone 8832 and the rest of the IP Phone 8800 Series", vendor: "Cisco", versions: [ { lessThan: "12.5(1)SR1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-03-20T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permissions. An attacker could exploit this vulnerability by uploading invalid files to an affected device. A successful exploit could allow the attacker to write files in arbitrary locations on the filesystem. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-22T20:05:23", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190320 Cisco IP Phone 8800 Series Path Traversal Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv", }, ], source: { advisory: "cisco-sa-20190320-ipptv", defect: [ [ "CSCvn56213", "CSCvo57138", ], ], discovery: "INTERNAL", }, title: "Cisco IP Phone 8800 Series Path Traversal Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-03-20T16:00:00-0700", ID: "CVE-2019-1765", STATE: "PUBLIC", TITLE: "Cisco IP Phone 8800 Series Path Traversal Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Wireless IP Phone 8821 and 8821-EX", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "11.0(5)", }, ], }, }, { product_name: "Cisco IP Conference Phone 8832 and the rest of the IP Phone 8800 Series", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "12.5(1)SR1", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an authenticated, remote attacker to write arbitrary files to the filesystem. The vulnerability is due to insufficient input validation and file-level permissions. An attacker could exploit this vulnerability by uploading invalid files to an affected device. A successful exploit could allow the attacker to write files in arbitrary locations on the filesystem. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-22", }, ], }, ], }, references: { reference_data: [ { name: "20190320 Cisco IP Phone 8800 Series Path Traversal Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipptv", }, ], }, source: { advisory: "cisco-sa-20190320-ipptv", defect: [ [ "CSCvn56213", "CSCvo57138", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1765", datePublished: "2019-03-22T20:05:23.295708Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:42:16.141Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24588
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:08.467Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-01T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { url: "https://www.fragattacks.com", }, { url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24588", datePublished: "2021-05-11T00:00:00", dateReserved: "2020-08-21T00:00:00", dateUpdated: "2024-08-04T15:19:08.467Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-20018
Vulnerability from cvelistv5
Published
2023-01-19 01:35
Modified
2024-08-02 08:57
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco Session Initiation Protocol (SIP) Software |
Version: 9.3(4) 3rd Party Version: 9.3(4)SR3 3rd Party Version: 9.3(4)SR1 3rd Party Version: 9.3(4)SR2 3rd Party Version: 11.0(3)SR3 Version: 11.0(2)SR1 Version: 11.5(1) Version: 11.0(5)SR2 Version: 11.0(2) Version: 11.7(1) Version: 11.0(4)SR3 Version: 11.0(0.7) MPP Version: 11.0(4)SR2 Version: 11.0(3)SR5 Version: 11.0(3)SR6 Version: 11.0(3) Version: 11.0(4)SR1 Version: 11.0(1) MPP Version: 11.0(4) Version: 11.0(3)SR4 Version: 11.0(5) Version: 11.0(3)SR1 Version: 11.0(5)SR1 Version: 11.0(3)SR2 Version: 11.0(2)SR2 Version: 11.0(1) Version: 11.5(1)SR1 Version: 11-0-1MSR1-1 Version: 10.4(1) 3rd Party Version: 10.3(1.11) 3rd Party Version: 10.2(2) Version: 10.2(1)SR1 Version: 10.1(1.9) Version: 10.1(1)SR2 Version: 10.2(1) Version: 10.1(1)SR1 Version: 10.4(1)SR2 3rd Party Version: 10.3(1) Version: 10.3(1)SR4b Version: 10.3(1)SR5 Version: 10.3(1.9) 3rd Party Version: 10.3(2) Version: 10.3(1)SR4 Version: 10.3(1)SR2 Version: 10.3(1)SR3 Version: 10.3(1)SR1 Version: 12.6(1) Version: 12.1(1) Version: 12.5(1)SR1 Version: 12.5(1)SR2 Version: 12.5(1) Version: 12.5(1)SR3 Version: 12.6(1)SR1 Version: 12.7(1) Version: 12.1(1)SR1 Version: 12.0(1) Version: 12.0(1)SR2 Version: 12.0(1)SR1 Version: 12.0(1)SR3 Version: 12.8(1) Version: 12.8(1)SR1 Version: 12.8(1)SR2 Version: 11.0(5)SR3 Version: 11.0(6) Version: 11.0(6)SR1 Version: 11.0(6)SR2 Version: 10.3(1)SR6 Version: 10.3(1)SR7 Version: 12.7(1)SR1 Version: 14.0(1)SR1 Version: 14.0(1) Version: 14.0(1)SR2 Version: 14.0(1)SR3 Version: 14.1(1) Version: 14.1(1)SR1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:57:35.086Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "cisco-sa-ip-phone-auth-bypass-pSqxZRPR", tags: [ "x_transferred", ], url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Cisco Session Initiation Protocol (SIP) Software", vendor: "Cisco", versions: [ { status: "affected", version: "9.3(4) 3rd Party", }, { status: "affected", version: "9.3(4)SR3 3rd Party", }, { status: "affected", version: "9.3(4)SR1 3rd Party", }, { status: "affected", version: "9.3(4)SR2 3rd Party", }, { status: "affected", version: "11.0(3)SR3", }, { status: "affected", version: "11.0(2)SR1", }, { status: "affected", version: "11.5(1)", }, { status: "affected", version: "11.0(5)SR2", }, { status: "affected", version: "11.0(2)", }, { status: "affected", version: "11.7(1)", }, { status: "affected", version: "11.0(4)SR3", }, { status: "affected", version: "11.0(0.7) MPP", }, { status: "affected", version: "11.0(4)SR2", }, { status: "affected", version: "11.0(3)SR5", }, { status: "affected", version: "11.0(3)SR6", }, { status: "affected", version: "11.0(3)", }, { status: "affected", version: "11.0(4)SR1", }, { status: "affected", version: "11.0(1) MPP", }, { status: "affected", version: "11.0(4)", }, { status: "affected", version: "11.0(3)SR4", }, { status: "affected", version: "11.0(5)", }, { status: "affected", version: "11.0(3)SR1", }, { status: "affected", version: "11.0(5)SR1", }, { status: "affected", version: "11.0(3)SR2", }, { status: "affected", version: "11.0(2)SR2", }, { status: "affected", version: "11.0(1)", }, { status: "affected", version: "11.5(1)SR1", }, { status: "affected", version: "11-0-1MSR1-1", }, { status: "affected", version: "10.4(1) 3rd Party", }, { status: "affected", version: "10.3(1.11) 3rd Party", }, { status: "affected", version: "10.2(2)", }, { status: "affected", version: "10.2(1)SR1", }, { status: "affected", version: "10.1(1.9)", }, { status: "affected", version: "10.1(1)SR2", }, { status: "affected", version: "10.2(1)", }, { status: "affected", version: "10.1(1)SR1", }, { status: "affected", version: "10.4(1)SR2 3rd Party", }, { status: "affected", version: "10.3(1)", }, { status: "affected", version: "10.3(1)SR4b", }, { status: "affected", version: "10.3(1)SR5", }, { status: "affected", version: "10.3(1.9) 3rd Party", }, { status: "affected", version: "10.3(2)", }, { status: "affected", version: "10.3(1)SR4", }, { status: "affected", version: "10.3(1)SR2", }, { status: "affected", version: "10.3(1)SR3", }, { status: "affected", version: "10.3(1)SR1", }, { status: "affected", version: "12.6(1)", }, { status: "affected", version: "12.1(1)", }, { status: "affected", version: "12.5(1)SR1", }, { status: "affected", version: "12.5(1)SR2", }, { status: "affected", version: "12.5(1)", }, { status: "affected", version: "12.5(1)SR3", }, { status: "affected", version: "12.6(1)SR1", }, { status: "affected", version: "12.7(1)", }, { status: "affected", version: "12.1(1)SR1", }, { status: "affected", version: "12.0(1)", }, { status: "affected", version: "12.0(1)SR2", }, { status: "affected", version: "12.0(1)SR1", }, { status: "affected", version: "12.0(1)SR3", }, { status: "affected", version: "12.8(1)", }, { status: "affected", version: "12.8(1)SR1", }, { status: "affected", version: "12.8(1)SR2", }, { status: "affected", version: "11.0(5)SR3", }, { status: "affected", version: "11.0(6)", }, { status: "affected", version: "11.0(6)SR1", }, { status: "affected", version: "11.0(6)SR2", }, { status: "affected", version: "10.3(1)SR6", }, { status: "affected", version: "10.3(1)SR7", }, { status: "affected", version: "12.7(1)SR1", }, { status: "affected", version: "14.0(1)SR1", }, { status: "affected", version: "14.0(1)", }, { status: "affected", version: "14.0(1)SR2", }, { status: "affected", version: "14.0(1)SR3", }, { status: "affected", version: "14.1(1)", }, { status: "affected", version: "14.1(1)SR1", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Cisco IP Phone 7800 and 8800 Series Phones could allow an unauthenticated, remote attacker to bypass authentication on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to access certain parts of the web interface that would normally require authentication.", }, ], exploits: [ { lang: "en", value: "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.6, baseSeverity: "HIGH", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", version: "3.1", }, format: "cvssV3_1", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-288", description: "Authentication Bypass Using an Alternate Path or Channel", lang: "en", type: "cwe", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-25T16:57:31.975Z", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "cisco-sa-ip-phone-auth-bypass-pSqxZRPR", url: "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ip-phone-auth-bypass-pSqxZRPR", }, ], source: { advisory: "cisco-sa-ip-phone-auth-bypass-pSqxZRPR", defects: [ "CSCwc37223", "CSCwc37234", ], discovery: "EXTERNAL", }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2023-20018", datePublished: "2023-01-19T01:35:41.006Z", dateReserved: "2022-10-27T18:47:50.308Z", dateUpdated: "2024-08-02T08:57:35.086Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-24587
Vulnerability from cvelistv5
Published
2021-05-11 00:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:08.605Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { tags: [ "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", "x_transferred", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-01T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00473.html", }, { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { url: "https://www.fragattacks.com", }, { url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html", }, { name: "[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html", }, { url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, { name: "[debian-lts-announce] 20230401 [SECURITY] [DLA 3380-1] firmware-nonfree LTS new upstream version (security updates and newer firmware for Linux 5.10)", tags: [ "mailing-list", ], url: "https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-24587", datePublished: "2021-05-11T00:00:00", dateReserved: "2020-08-21T00:00:00", dateUpdated: "2024-08-04T15:19:08.605Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1764
Vulnerability from cvelistv5
Published
2019-03-22 20:05
Modified
2024-11-21 19:42
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Wireless IP Phone 8821 and 8821-EX |
Version: unspecified < 11.0(5) |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.512Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190320 Cisco IP Phone 8800 Series Cross-Site Request Forgery Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1764", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-21T18:59:54.512055Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-21T19:42:07.909Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Wireless IP Phone 8821 and 8821-EX", vendor: "Cisco", versions: [ { lessThan: "11.0(5)", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Cisco IP Conference Phone 8832 and the rest of the IP Phone 8800 Series", vendor: "Cisco", versions: [ { lessThan: "12.5(1)SR1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-03-20T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-352", description: "CWE-352", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-22T20:05:29", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190320 Cisco IP Phone 8800 Series Cross-Site Request Forgery Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf", }, ], source: { advisory: "cisco-sa-20190320-ip-phone-csrf", defect: [ [ "CSCvn56221", "CSCvo57629", ], ], discovery: "INTERNAL", }, title: "Cisco IP Phone 8800 Series Cross-Site Request Forgery Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-03-20T16:00:00-0700", ID: "CVE-2019-1764", STATE: "PUBLIC", TITLE: "Cisco IP Phone 8800 Series Cross-Site Request Forgery Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Wireless IP Phone 8821 and 8821-EX", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "11.0(5)", }, ], }, }, { product_name: "Cisco IP Conference Phone 8832 and the rest of the IP Phone 8800 Series", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "12.5(1)SR1", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an authenticated user of the interface to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on a targeted device via a web browser and with the privileges of the user. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "8.1", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-352", }, ], }, ], }, references: { reference_data: [ { name: "20190320 Cisco IP Phone 8800 Series Cross-Site Request Forgery Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-csrf", }, ], }, source: { advisory: "cisco-sa-20190320-ip-phone-csrf", defect: [ [ "CSCvn56221", "CSCvo57629", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1764", datePublished: "2019-03-22T20:05:29.129200Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-21T19:42:07.909Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-26140
Vulnerability from cvelistv5
Published
2021-05-11 19:34
Modified
2024-08-04 15:49
Severity ?
EPSS score ?
Summary
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu | vendor-advisory, x_refsource_CISCO | |
https://www.fragattacks.com | x_refsource_MISC | |
https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2021/05/11/12 | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf | x_refsource_CONFIRM | |
https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63 | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:49:07.137Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", "x_transferred", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-10-28T14:11:58", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { tags: [ "x_refsource_MISC", ], url: "https://www.fragattacks.com", }, { tags: [ "x_refsource_MISC", ], url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", tags: [ "mailing-list", "x_refsource_MLIST", ], url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { tags: [ "x_refsource_MISC", ], url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2020-26140", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu", }, { name: "https://www.fragattacks.com", refsource: "MISC", url: "https://www.fragattacks.com", }, { name: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", refsource: "MISC", url: "https://github.com/vanhoefm/fragattacks/blob/master/SUMMARY.md", }, { name: "[oss-security] 20210511 various 802.11 security issues - fragattacks.com", refsource: "MLIST", url: "http://www.openwall.com/lists/oss-security/2021/05/11/12", }, { name: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", refsource: "CONFIRM", url: "https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf", }, { name: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", refsource: "MISC", url: "https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2020-26140", datePublished: "2021-05-11T19:34:42", dateReserved: "2020-09-29T00:00:00", dateUpdated: "2024-08-04T15:49:07.137Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1716
Vulnerability from cvelistv5
Published
2019-03-22 20:05
Modified
2024-11-19 19:14
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability exists because the software improperly validates user-supplied input during user authentication. An attacker could exploit this vulnerability by connecting to an affected device using HTTP and supplying malicious user credentials. A successful exploit could allow the attacker to trigger a reload of an affected device, resulting in a DoS condition, or to execute arbitrary code with the privileges of the app user. Cisco fixed this vulnerability in the following SIP Software releases: 10.3(1)SR5 and later for Cisco Unified IP Conference Phone 8831; 11.0(4)SR3 and later for Cisco Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 and later for the rest of the Cisco IP Phone 7800 Series and 8800 Series.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-rce | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Unified IP Conference Phone 8831 |
Version: unspecified < 10.3(1)SR5 |
|||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.295Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190320 Cisco IP Phone 7800 Series and 8800 Series Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-rce", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1716", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:25:11.997153Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T19:14:27.600Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Unified IP Conference Phone 8831", vendor: "Cisco", versions: [ { lessThan: "10.3(1)SR5", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Cisco Wireless IP Phone 8821 and 8821-EX", vendor: "Cisco", versions: [ { lessThan: "11.0(4)SR3", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Cisco IP Phone 7800 Series and 8800 Series", vendor: "Cisco", versions: [ { lessThan: "12.5(1)SR1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-03-20T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability exists because the software improperly validates user-supplied input during user authentication. An attacker could exploit this vulnerability by connecting to an affected device using HTTP and supplying malicious user credentials. A successful exploit could allow the attacker to trigger a reload of an affected device, resulting in a DoS condition, or to execute arbitrary code with the privileges of the app user. Cisco fixed this vulnerability in the following SIP Software releases: 10.3(1)SR5 and later for Cisco Unified IP Conference Phone 8831; 11.0(4)SR3 and later for Cisco Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 and later for the rest of the Cisco IP Phone 7800 Series and 8800 Series.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-22T20:05:39", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190320 Cisco IP Phone 7800 Series and 8800 Series Remote Code Execution Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-rce", }, ], source: { advisory: "cisco-sa-20190320-ip-phone-rce", defect: [ [ "CSCvn56168", "CSCvn72540", "CSCvo05687", ], ], discovery: "INTERNAL", }, title: "Cisco IP Phone 7800 Series and 8800 Series Remote Code Execution Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-03-20T16:00:00-0700", ID: "CVE-2019-1716", STATE: "PUBLIC", TITLE: "Cisco IP Phone 7800 Series and 8800 Series Remote Code Execution Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Unified IP Conference Phone 8831", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "10.3(1)SR5", }, ], }, }, { product_name: "Cisco Wireless IP Phone 8821 and 8821-EX", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "11.0(4)SR3", }, ], }, }, { product_name: "Cisco IP Phone 7800 Series and 8800 Series", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "12.5(1)SR1", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability exists because the software improperly validates user-supplied input during user authentication. An attacker could exploit this vulnerability by connecting to an affected device using HTTP and supplying malicious user credentials. A successful exploit could allow the attacker to trigger a reload of an affected device, resulting in a DoS condition, or to execute arbitrary code with the privileges of the app user. Cisco fixed this vulnerability in the following SIP Software releases: 10.3(1)SR5 and later for Cisco Unified IP Conference Phone 8831; 11.0(4)SR3 and later for Cisco Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 and later for the rest of the Cisco IP Phone 7800 Series and 8800 Series.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.5", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-20", }, ], }, ], }, references: { reference_data: [ { name: "20190320 Cisco IP Phone 7800 Series and 8800 Series Remote Code Execution Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ip-phone-rce", }, ], }, source: { advisory: "cisco-sa-20190320-ip-phone-rce", defect: [ [ "CSCvn56168", "CSCvn72540", "CSCvo05687", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1716", datePublished: "2019-03-22T20:05:39.910639Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T19:14:27.600Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-1763
Vulnerability from cvelistv5
Published
2019-03-22 20:05
Modified
2024-11-19 19:14
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to critical services and cause a DoS condition. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab | vendor-advisory, x_refsource_CISCO |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco Wireless IP Phone 8821 and 8821-EX |
Version: unspecified < 11.0(5) |
||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T18:28:42.503Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "20190320 Cisco IP Phone 8800 Series Authorization Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2019-1763", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-19T17:25:13.352795Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-11-19T19:14:36.126Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco Wireless IP Phone 8821 and 8821-EX", vendor: "Cisco", versions: [ { lessThan: "11.0(5)", status: "affected", version: "unspecified", versionType: "custom", }, ], }, { product: "Cisco IP Conference Phone 8832 and the rest of the IP Phone 8800 Series", vendor: "Cisco", versions: [ { lessThan: "12.5(1)SR1", status: "affected", version: "unspecified", versionType: "custom", }, ], }, ], datePublic: "2019-03-20T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to critical services and cause a DoS condition. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.", }, ], exploits: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], metrics: [ { cvssV3_0: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2019-03-22T20:05:34", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "20190320 Cisco IP Phone 8800 Series Authorization Bypass Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab", }, ], source: { advisory: "cisco-sa-20190320-ipab", defect: [ [ "CSCvn56175", "CSCvo58414", ], ], discovery: "INTERNAL", }, title: "Cisco IP Phone 8800 Series Authorization Bypass Vulnerability", x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", DATE_PUBLIC: "2019-03-20T16:00:00-0700", ID: "CVE-2019-1763", STATE: "PUBLIC", TITLE: "Cisco IP Phone 8800 Series Authorization Bypass Vulnerability", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco Wireless IP Phone 8821 and 8821-EX", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "11.0(5)", }, ], }, }, { product_name: "Cisco IP Conference Phone 8832 and the rest of the IP Phone 8800 Series", version: { version_data: [ { affected: "<", version_affected: "<", version_value: "12.5(1)SR1", }, ], }, }, ], }, vendor_name: "Cisco", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to critical services and cause a DoS condition. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.", }, ], }, exploit: [ { lang: "en", value: "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.", }, ], impact: { cvss: { baseScore: "7.5", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-284", }, ], }, ], }, references: { reference_data: [ { name: "20190320 Cisco IP Phone 8800 Series Authorization Bypass Vulnerability", refsource: "CISCO", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190320-ipab", }, ], }, source: { advisory: "cisco-sa-20190320-ipab", defect: [ [ "CSCvn56175", "CSCvo58414", ], ], discovery: "INTERNAL", }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2019-1763", datePublished: "2019-03-22T20:05:34.687309Z", dateReserved: "2018-12-06T00:00:00", dateUpdated: "2024-11-19T19:14:36.126Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }