Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-3225 (GCVE-0-2020-3225)
Vulnerability from cvelistv5
URL | Tags | ||
---|---|---|---|
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco IOS 12.2(55)SE |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:30:56.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-3225", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-15T16:21:15.739618Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:14:57.556Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS 12.2(55)SE", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-03T17:42:04", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" } ], "source": { "advisory": "cisco-sa-cipdos-hkfTZXEx", "defect": [ [ "CSCvo17827", "CSCvp56319", "CSCvr47365", "CSCvr67776" ] ], "discovery": "INTERNAL" }, "title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-03T16:00:00", "ID": "CVE-2020-3225", "STATE": "PUBLIC", "TITLE": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS 12.2(55)SE", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" } ] }, "source": { "advisory": "cisco-sa-cipdos-hkfTZXEx", "defect": [ [ "CSCvo17827", "CSCvp56319", "CSCvr47365", "CSCvr67776" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2020-3225", "datePublished": "2020-06-03T17:42:04.855594Z", "dateReserved": "2019-12-12T00:00:00", "dateUpdated": "2024-11-15T17:14:57.556Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-3225\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2020-06-03T18:15:20.543\",\"lastModified\":\"2024-11-21T05:30:36.133\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades en la implementaci\u00f3n de la funcionalidad Common Industrial Protocol (CIP) de Cisco IOS Software y Cisco IOS XE Software, podr\u00edan permitir a un atacante remoto no autenticado causar la recarga de un dispositivo afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Las vulnerabilidades se deben a un procesamiento de entrada insuficiente del tr\u00e1fico CIP. Un atacante podr\u00eda explotar estas vulnerabilidades mediante el env\u00edo de tr\u00e1fico CIP dise\u00f1ado para ser procesado por un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo afectado se vuelva a cargar, resultando en una condici\u00f3n DoS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}],\"cvssMetricV30\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E632468F-4B62-4937-8CA6-5B8023451F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C853E612-2C4B-4595-AD6F-22E34B68C69A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E8D759-07E9-49DB-B8EB-A9C06A8D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7EF0685-7BEF-4F84-902C-DFE533CD2F34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F114FD7-F62C-4A24-9CE6-C9A7136465F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"892F72BE-B65F-4271-9042-3B459DFBB43C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7715D0D0-E8B2-444A-A590-7B5B0BFA713F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B526DE1-EEA7-47E4-B291-09C02F018A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5898745E-C1D3-4D0E-8476-2EEAA4327B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887C5632-F3F7-4EDB-A065-D81F64A9B15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C3DF8-2B59-41EB-A151-15E46348DF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700DDE2E-922C-426F-8751-BADD15055AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6CA171-4BE2-4204-BDAB-EA19BCD4842A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84766AF1-DC74-4D64-A4E1-56B377D6CE48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D4A0517-EF86-4655-B4B4-246ED3A84803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360F3E49-D75A-4ACE-B775-14055272C861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5362C676-5002-4ABC-9C60-97D4B65A399D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D14EB41-CD6A-483A-8F68-9072E436807D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC201905-7DBF-4E2B-B732-62641F51C170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"377669B9-952D-4527-9C24-E6713E749C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se13a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83236DB-AF3D-44F8-9B5A-7B35B05C3EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D38633-31AE-42E9-8FFA-77C8EFA9AABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D6D9CC-70F0-475C-8AB0-48980596BE47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEECEF97-EC6A-43C8-A7AB-5C48948183FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(60\\\\)ez16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2950C7F-EEB9-4956-937D-CD978AAC2E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF55C0A-768F-445A-AF40-2B553363AF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ek:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"114E5F13-3F15-418B-A0AF-038BEABF8445\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ek1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"694AA98F-2705-477E-B2EE-75D2CEDB263B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7760B1FF-BC56-49F4-8020-439EA2F53AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ABF12A-78BD-459D-BF53-065A56C385AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CA27BF-13BC-4C13-A049-FA50247ACE9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C8B101-CB42-43CF-98CE-44EE5FBC9BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054583DC-AAF8-4BF0-AC13-5A488476C161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A9B13E-8CF7-4879-8C33-8E690291335F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A634C47-2FD6-4106-86B6-DD465A5394E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05DDA3F8-7207-4FC9-B491-F49418975D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09AEBD6-56E7-4D22-B300-C904464FE75F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97525468-9E3E-4E34-8319-B4DFB51BC4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611A649F-161B-4683-98D5-4C8150838039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F414ABC6-B95C-48ED-BC15-817356248776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137D26AB-CA68-4CBC-91E8-8C0901D5BF19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"343F5C35-A0C0-4747-95BA-D4044C64508B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713C55A8-F24D-45FE-88AA-1D1EFEC88339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F7D280-D099-495F-B860-D96F485BAF81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62A7038-EBCF-4996-8795-3BF95CBDE6B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se13a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E212B3A0-5A20-40B7-BBF6-CC420B0C86AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg11a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAAC6B58-6FC4-459B-9663-4FDC6A6F8DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D601E90-6F2A-4C66-97A2-152031C88DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72782F95-948D-489B-A19A-9DAB825DFE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F904CD0-8609-47F7-988C-613DE26BDBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3A39FE-69F6-4BB9-A9CE-D516A3802538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B7058-3467-4CCE-B9A4-71CF8143FEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90447919-CC40-4CA5-A488-2FCF0F25ABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF74559-F418-48EA-9CA7-A9574CAFC97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A1ADB8-DF62-4CB6-8075-2F0956BB0126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB0F2B2A-F273-4166-826F-88B54A480BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194D54FC-F399-4C86-AE04-FB3FD828DDA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C85E0E-A920-4501-AC23-0F7534CF88EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CB7858-C857-41E2-9E5D-9368EEC2825E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10438F4B-281D-4C2F-B4C3-DC3D47B0033A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"681E360E-2287-4BE7-8228-77C235DFA901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81800178-449A-4B61-9611-5FB2FC4DBC75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7316ED4-FABD-49E0-AA21-394D327435F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A56EF3-4E88-4220-846A-A9BE1E496311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0687FD87-BAED-4776-9B94-3C9EA7CCE79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757000B2-A8EB-464A-9A2D-EC4D920A0569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42618DF-F118-41A7-96E5-24C229DA020E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F6FC68-BF4A-4511-8B46-A93C81E349B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7582DA8C-2360-4E8C-90F8-6194F269CD1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F908B0-7ECE-40F8-8549-29BD1A070606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378E67DD-779C-4852-BF29-38C2DFFB1BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF92BEC-AA46-46DF-8C1E-956F3E506E69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C226FE9-61A0-4873-B277-1B8ADB397B32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5BD905-75C3-47AE-8D19-6225BD808B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DE452A-6852-4879-9187-8A152E6E260E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3047E4-BCC3-41A7-9DCD-15C25D14EC44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7785E177-C04E-4170-9C35-B4259D14EA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CAE727E-E552-4222-8FF0-6146A813BDEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7850295-C728-4448-ABA7-D01397DBBE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65589A68-58A4-4BD4-8A26-C629AE610953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A64C8F-6380-47CA-8116-E3438B953F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jaz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE38B2F-F6AB-44E2-89BE-F71796FE1942\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jaz1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4358B9-F3DB-46AC-A3A8-114E25F676DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F112DE64-0042-4FB9-945D-3107468193E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E027FB12-862F-413E-AA2B-4BBD90AE3650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD28874B-148A-4299-9AA1-67A550B25F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B80CBC-961F-4EE8-A998-C0A827151EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7131776-5DEB-4B96-8483-B81B538E24FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE991877-18E0-4374-A441-C2316085CCA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757EB1A1-4764-4108-9AB1-F33CF9CEE574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199DCF1B-8A1E-47CC-87A6-64E6F21D8886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B78669-3B28-4F1D-993D-85282A7D0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD05109E-1183-419D-96A1-9CD5EA5ECC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7551128E-9E23-4C42-A681-6BE64D284C93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1758F264-96F9-4EE9-9CA9-AD5407885547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABE0470-E94A-4CAF-865D-73E2607A0DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CCD7E3-C62B-4151-96FF-1175D4896E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6437E689-A049-4D48-AB7A-49CA7EBDE8B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4C12918-E5BB-465E-9DA4-06B7351DD805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4862C453-8BD7-4D53-B2D6-CE3E44A4915A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7a\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1374E243-4EC2-4A81-991C-B5705135CAD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7b\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECA6101-94BA-4209-8243-A56AF02963EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71493AA2-49E9-4FF5-AC29-DC2426973EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DAE7DA-E0D3-4434-AD75-C8894D939A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F96295-2E72-4C23-B973-791B4A2B63F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8555124-BAFA-45D4-8208-ED1172D55F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A313DD0B-C9A9-4731-A486-EE1BCBA3B1F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B9D9B5-807F-494B-9ED2-7F4BDB32432A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6089D71A-8D46-4819-80E9-8A29BCA47EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21678FDA-D2B4-4041-A52D-C7AA562FD086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EB0CFF-88F5-4193-8896-B3E4BA8D1AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E532352-99A6-4E45-B0E7-7F04DA411820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jaa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jaa1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAE1AD0D-C3E9-488C-89CB-F2342CF6D5A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAC643B-AA58-42EA-A777-52FCF6065F9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFB57C3-6CDF-46D1-858D-D5234956653D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330125E6-3645-40B5-8E64-009B622090B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D874DF-54A1-47C7-B3D9-A9CE41A42418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1485E3A5-A586-408A-8325-7572779DD0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2244E538-6B35-44E0-B93E-60B773745A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9DB6B2A-19D2-4684-B07F-5D42EC850A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC1C381-4795-4992-BE3C-9615E005DE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80188F84-30DE-46AC-8E0C-984126B77CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECBF0A9-D84F-40A2-AC61-A9C59C819787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F129CF-FB92-49E9-BD86-90DDB8218FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C288D58-F765-4403-BF18-CC0A62B1AA60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27357CD7-3E9E-4EF2-A5D4-A6BC44952FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4246ACD7-DBCF-4CE6-B9B8-D44AAB2DEC8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1046E19B-DB53-418A-BFEC-5CD4492E6626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0062D992-D990-4EC9-BABD-2EFFF84254D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC81B74C-4F63-46E8-ACF4-EB707853580A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C779C9-3B83-4B26-8942-B8475FB3B5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ACA99D-5784-4F5F-AB83-F55DF8774E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB9F99-8751-442B-9419-C2AB522D2ADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E33FD88-8183-40EF-97A1-2766A4BBFBE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D7D48C-9FA1-45DB-B206-437E8ECBF53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3626B216-43E8-4E60-96E5-7CAA0CB67F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9B59D8B-E71A-4671-BA0B-00E56498E280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956C0089-E5AE-4289-B6D7-A8AB3C39AAA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333468BC-41F0-46ED-9561-D7D2CE6AC267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DBAA17-61D7-4EE4-A70D-A7200DF36C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF17EADC-5812-47FD-A243-287837CEC1E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE8CF99C-B097-4964-B07C-FBB28EB37681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA4B81F-7FCA-4666-8602-F6C77A4673E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2403659-B7AD-40CE-AF88-FE2BEF0929E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1F53B1-E9FA-4480-8314-C531073B25CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"498030A3-0AFF-4D74-98D6-74C9447E5B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDCBDB71-59D7-481E-84FF-8772930F857B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)je:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2955A319-04AC-4D0C-80B7-0C90503908C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0EF13B6-A743-41D1-BB31-F17C3586C8AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37875B18-434B-4218-BAAF-2B593E188180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26BAC234-D00C-4407-A1FE-E45A14D1BDAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C42E2869-F179-49B7-A4E8-0F4E8EA953CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A58711A-F8C9-4F25-97D7-AE8AE64F3912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE3ECC04-345F-4DAE-98F7-04E082BAEC3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A919122-DE62-4032-80DF-F77C1D80B387\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06216CEE-F15D-4B31-A5A3-B2C226E2D25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BDD2AB-E1DC-4DD3-93AD-EE6348942EE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB02DEB-81D4-4A05-BDD5-3B8BC7184159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18C3383-28B0-435E-AF08-9739DADAE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jh1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C9CA39-3515-4226-8453-0B5FC62546D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1658FFCF-7433-4AFB-9D59-BD6CC14A4D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2CA6116-2C6B-431B-BA88-63B180A00DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2377350-7B69-4C49-889A-D63A3E4C1002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD90F4A-2A86-4A98-A157-D93C382717A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jj1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1739E9AD-154D-40C2-A761-F7133BC06C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F1C76C-62EE-4D93-8730-E923E3FD413D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEB7B3E-4E91-477F-BD62-9A28578CCA80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8DF3B4-A424-4B70-9116-28E2C4DFB776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4677B840-6636-4D8C-9E1C-47FEB8F3116A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E97BD4E2-154B-4984-A094-EDC95726C760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E6CCE7-88BB-4F4F-9253-EC67B5076767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFD112AD-9D7D-45C1-80DE-96037B425F98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFFDA314-0FAA-4BF7-AEED-DF2509B74E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D6C6EE-CFD9-49A9-8784-498560847737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5187A9D2-A057-40E7-84E1-89BE32AFA95C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEE60A6-9E75-4B20-A06D-411E774511B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1451BB33-6BE0-4F4A-A193-14E13DECEE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0FC09E-8C60-4EAC-B729-3BE3524E6F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD355DC3-51F1-4CEA-98B1-E08EEE03BFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49B4A0C4-B0CF-4040-9EB0-1529BCAD0DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4071E320-789E-4E1D-982B-C265F4228FEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC38DE9-5D5D-452A-AC42-C1D24418FDB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC3CD43-F30A-484B-9285-D925C1262212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F807A36A-9363-40F1-9B20-E5C4D503EB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5200C1CD-DEAB-44FD-970D-098F3E01F36B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8E71841-512D-483C-A911-86EA745AC00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB655C5-2D7B-4ED5-89D6-4ED613CF3934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE556AB-093C-4992-8F5B-F240526AAA64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA0BCD1-4E75-4F39-B960-4B6B1B357442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17F3285-80E8-4BE5-8704-3379CF326601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9669DF61-DDC5-498D-906A-494D56BAE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B0502B-3363-4F3C-A147-8888B894635B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"689327CA-F302-49FC-9365-F09E4A60E8FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"571ECF0D-06C6-4371-891C-FB68A3093F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A38CF1F-37D9-4CBD-8B98-C24637FF7F56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0886F6DC-C590-48A0-BE27-6CD778EB37FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8552242D-0A93-4841-83F9-EA4D7F58938E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0667D1-B4EC-4FF0-AC5D-9C1B04D84099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F45D0EFD-784A-4CDB-8FDB-41F6869B4735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942CC01D-ED6E-4731-A61B-75CDF219F760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59CA018E-5160-40AE-953D-9559F23D2EAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBA595EF-8718-4477-8EEC-EA948C14F091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CDCADB1-EA01-41AF-9D96-A6EDE42D7A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13763901-2D7B-485D-A957-E30587BCEB88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B213166-77E2-4E13-8769-FA8AF6EEC33A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3C0371-223A-433C-B8A3-C24A499EB82F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A066A001-830B-4407-A5CD-AB99059C190E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83B45095-526D-4BC5-A16B-6B5741F07FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51AA5D4E-5236-44DA-AA1A-E5E7A9DC8E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4A9F7DF-BB18-46FC-B471-3FC41F4CCD01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E0326F-98A1-48B4-945D-D8603D5A8609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpi3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F06709E-F260-4E1A-A79D-DBD63F458CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F69B4F2-4A03-4383-8958-11EE154A7350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"930678B3-1527-4967-9D8F-27FC0DA060AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A34268-7618-48D2-8872-27B5B624543B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2017A75-CC29-4161-85CB-7A531E5ABB3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AD00E6-A155-4CCB-B329-7B536BEBC976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672B77C7-0E6B-496D-9ACC-6AD965319B35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA1D885-2270-4370-9F3F-CA80B0E96DD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20286676-70FF-471C-9612-74E5F0ECB8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F13F583-F645-4DF0-A075-B4F19D71D128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119A964D-ABC8-424D-8097-85B832A833BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF5214D-9257-498F-A3EB-C4EC18E2FEB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BF9829-F80E-4837-A420-39B291C4E17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07F9539-CFBE-46F7-9F5E-93A68169797D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5AB80E7-0714-44ED-9671-12C877B36A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10182B94-6831-461E-B0FC-9476EAB6EBEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6BD18B-B9BD-452F-986E-16A6668E46B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADED0D82-2A4D-4235-BFAC-5EE2D862B652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6EF98FA-6DF9-4935-9639-143E08462BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A443E93-6C4B-4F86-BA7C-7C2A929E795A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECEDD9D-6517-44BA-A95F-D1D5488C0E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314C7763-A64D-4023-9F3F-9A821AE4151F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5820D71D-FC93-45AA-BC58-A26A1A39C936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1C85DD-69CC-4AA8-B219-651D57FC3506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98DED36-D4B5-48D6-964E-EEEE97936700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD98C9E8-3EA6-4160-970D-37C389576516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9027A528-2588-4C06-810B-5BB313FE4323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7745ED34-D59D-49CC-B174-96BCA03B3374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AF4CF3-6E79-4EA3-974D-CD451A192BA9\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\", \"name\": \"20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T07:30:56.482Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-3225\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-15T16:21:15.739618Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-15T16:21:49.925Z\"}}], \"cna\": {\"title\": \"Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"source\": {\"defect\": [[\"CSCvo17827\", \"CSCvp56319\", \"CSCvr47365\", \"CSCvr67776\"]], \"advisory\": \"cisco-sa-cipdos-hkfTZXEx\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"CHANGED\", \"version\": \"3.0\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS 12.2(55)SE\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"datePublic\": \"2020-06-03T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\", \"name\": \"20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2020-06-03T17:42:04\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"8.6\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\"}}, \"source\": {\"defect\": [[\"CSCvo17827\", \"CSCvp56319\", \"CSCvr47365\", \"CSCvr67776\"]], \"advisory\": \"cisco-sa-cipdos-hkfTZXEx\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco IOS 12.2(55)SE\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\", \"name\": \"20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-20\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-3225\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2020-06-03T16:00:00\"}}}}", "cveMetadata": "{\"cveId\": \"CVE-2020-3225\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-15T17:14:57.556Z\", \"dateReserved\": \"2019-12-12T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2020-06-03T17:42:04.855594Z\", \"assignerShortName\": \"cisco\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2020-3225
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 12.2\(44\)ex | |
cisco | ios | 12.2\(44\)ex1 | |
cisco | ios | 12.2\(46\)se1 | |
cisco | ios | 12.2\(46\)se2 | |
cisco | ios | 12.2\(50\)se | |
cisco | ios | 12.2\(50\)se1 | |
cisco | ios | 12.2\(50\)se2 | |
cisco | ios | 12.2\(50\)se3 | |
cisco | ios | 12.2\(50\)se4 | |
cisco | ios | 12.2\(50\)se5 | |
cisco | ios | 12.2\(52\)se | |
cisco | ios | 12.2\(52\)se1 | |
cisco | ios | 12.2\(55\)se | |
cisco | ios | 12.2\(55\)se3 | |
cisco | ios | 12.2\(55\)se4 | |
cisco | ios | 12.2\(55\)se5 | |
cisco | ios | 12.2\(55\)se6 | |
cisco | ios | 12.2\(55\)se7 | |
cisco | ios | 12.2\(55\)se9 | |
cisco | ios | 12.2\(55\)se10 | |
cisco | ios | 12.2\(55\)se11 | |
cisco | ios | 12.2\(55\)se12 | |
cisco | ios | 12.2\(55\)se13 | |
cisco | ios | 12.2\(55\)se13a | |
cisco | ios | 12.2\(58\)se | |
cisco | ios | 12.2\(58\)se1 | |
cisco | ios | 12.2\(58\)se2 | |
cisco | ios | 12.2\(60\)ez16 | |
cisco | ios | 15.0\(1\)ey | |
cisco | ios | 15.0\(1\)ey1 | |
cisco | ios | 15.0\(1\)ey2 | |
cisco | ios | 15.0\(2\)ek | |
cisco | ios | 15.0\(2\)ek1 | |
cisco | ios | 15.0\(2\)ex2 | |
cisco | ios | 15.0\(2\)ex8 | |
cisco | ios | 15.0\(2\)ey | |
cisco | ios | 15.0\(2\)ey1 | |
cisco | ios | 15.0\(2\)ey2 | |
cisco | ios | 15.0\(2\)ey3 | |
cisco | ios | 15.0\(2\)se | |
cisco | ios | 15.0\(2\)se1 | |
cisco | ios | 15.0\(2\)se2 | |
cisco | ios | 15.0\(2\)se3 | |
cisco | ios | 15.0\(2\)se4 | |
cisco | ios | 15.0\(2\)se5 | |
cisco | ios | 15.0\(2\)se6 | |
cisco | ios | 15.0\(2\)se7 | |
cisco | ios | 15.0\(2\)se8 | |
cisco | ios | 15.0\(2\)se9 | |
cisco | ios | 15.0\(2\)se10 | |
cisco | ios | 15.0\(2\)se10a | |
cisco | ios | 15.0\(2\)se11 | |
cisco | ios | 15.0\(2\)se12 | |
cisco | ios | 15.0\(2\)se13 | |
cisco | ios | 15.0\(2\)se13a | |
cisco | ios | 15.0\(2\)sg11a | |
cisco | ios | 15.2\(1\)ey | |
cisco | ios | 15.2\(2\)e | |
cisco | ios | 15.2\(2\)e1 | |
cisco | ios | 15.2\(2\)e2 | |
cisco | ios | 15.2\(2\)e3 | |
cisco | ios | 15.2\(2\)e4 | |
cisco | ios | 15.2\(2\)e5 | |
cisco | ios | 15.2\(2\)e5a | |
cisco | ios | 15.2\(2\)e5b | |
cisco | ios | 15.2\(2\)e6 | |
cisco | ios | 15.2\(2\)e7 | |
cisco | ios | 15.2\(2\)e7b | |
cisco | ios | 15.2\(2\)e8 | |
cisco | ios | 15.2\(2\)e9 | |
cisco | ios | 15.2\(2\)e10 | |
cisco | ios | 15.2\(2\)ea | |
cisco | ios | 15.2\(2\)ea1 | |
cisco | ios | 15.2\(2\)ea2 | |
cisco | ios | 15.2\(2\)ea3 | |
cisco | ios | 15.2\(2\)eb | |
cisco | ios | 15.2\(2\)eb1 | |
cisco | ios | 15.2\(2\)eb2 | |
cisco | ios | 15.2\(2b\)e | |
cisco | ios | 15.2\(3\)e1 | |
cisco | ios | 15.2\(3\)e2 | |
cisco | ios | 15.2\(3\)e3 | |
cisco | ios | 15.2\(3\)e4 | |
cisco | ios | 15.2\(3\)e5 | |
cisco | ios | 15.2\(3\)ea | |
cisco | ios | 15.2\(4\)e9 | |
cisco | ios | 15.2\(4\)e10 | |
cisco | ios | 15.2\(4\)ea | |
cisco | ios | 15.2\(4\)ea1 | |
cisco | ios | 15.2\(4\)ea2 | |
cisco | ios | 15.2\(4\)ea3 | |
cisco | ios | 15.2\(4\)ea4 | |
cisco | ios | 15.2\(4\)ea5 | |
cisco | ios | 15.2\(4\)ea6 | |
cisco | ios | 15.2\(4\)ea7 | |
cisco | ios | 15.2\(4\)ea8 | |
cisco | ios | 15.2\(4\)ea9 | |
cisco | ios | 15.2\(4\)ec1 | |
cisco | ios | 15.2\(4\)ec2 | |
cisco | ios | 15.2\(4\)jaz | |
cisco | ios | 15.2\(4\)jaz1 | |
cisco | ios | 15.2\(5\)e | |
cisco | ios | 15.2\(5\)e1 | |
cisco | ios | 15.2\(5\)e2 | |
cisco | ios | 15.2\(5\)e2b | |
cisco | ios | 15.2\(5\)e2c | |
cisco | ios | 15.2\(5\)ea | |
cisco | ios | 15.2\(5a\)e1 | |
cisco | ios | 15.2\(6\)e | |
cisco | ios | 15.2\(6\)e0a | |
cisco | ios | 15.2\(6\)e0c | |
cisco | ios | 15.2\(6\)e1 | |
cisco | ios | 15.2\(6\)e1a | |
cisco | ios | 15.2\(6\)e1s | |
cisco | ios | 15.2\(6\)e2a | |
cisco | ios | 15.2\(6\)e3 | |
cisco | ios | 15.2\(6\)eb | |
cisco | ios | 15.2\(7\)e | |
cisco | ios | 15.2\(7\)e0b | |
cisco | ios | 15.2\(7\)e0s | |
cisco | ios | 15.2\(7a\)e0b | |
cisco | ios | 15.2\(7b\)e0b | |
cisco | ios | 15.3\(3\)ja1 | |
cisco | ios | 15.3\(3\)ja1n | |
cisco | ios | 15.3\(3\)ja4 | |
cisco | ios | 15.3\(3\)ja5 | |
cisco | ios | 15.3\(3\)ja6 | |
cisco | ios | 15.3\(3\)ja7 | |
cisco | ios | 15.3\(3\)ja8 | |
cisco | ios | 15.3\(3\)ja10 | |
cisco | ios | 15.3\(3\)ja11 | |
cisco | ios | 15.3\(3\)ja12 | |
cisco | ios | 15.3\(3\)jaa | |
cisco | ios | 15.3\(3\)jaa1 | |
cisco | ios | 15.3\(3\)jax | |
cisco | ios | 15.3\(3\)jax1 | |
cisco | ios | 15.3\(3\)jax2 | |
cisco | ios | 15.3\(3\)jb | |
cisco | ios | 15.3\(3\)jbb | |
cisco | ios | 15.3\(3\)jbb1 | |
cisco | ios | 15.3\(3\)jbb2 | |
cisco | ios | 15.3\(3\)jbb4 | |
cisco | ios | 15.3\(3\)jbb5 | |
cisco | ios | 15.3\(3\)jbb6 | |
cisco | ios | 15.3\(3\)jbb6a | |
cisco | ios | 15.3\(3\)jbb8 | |
cisco | ios | 15.3\(3\)jc | |
cisco | ios | 15.3\(3\)jc1 | |
cisco | ios | 15.3\(3\)jc2 | |
cisco | ios | 15.3\(3\)jc3 | |
cisco | ios | 15.3\(3\)jc4 | |
cisco | ios | 15.3\(3\)jc5 | |
cisco | ios | 15.3\(3\)jc6 | |
cisco | ios | 15.3\(3\)jc8 | |
cisco | ios | 15.3\(3\)jc9 | |
cisco | ios | 15.3\(3\)jc14 | |
cisco | ios | 15.3\(3\)jd | |
cisco | ios | 15.3\(3\)jd2 | |
cisco | ios | 15.3\(3\)jd3 | |
cisco | ios | 15.3\(3\)jd4 | |
cisco | ios | 15.3\(3\)jd5 | |
cisco | ios | 15.3\(3\)jd6 | |
cisco | ios | 15.3\(3\)jd7 | |
cisco | ios | 15.3\(3\)jd8 | |
cisco | ios | 15.3\(3\)jd9 | |
cisco | ios | 15.3\(3\)jd11 | |
cisco | ios | 15.3\(3\)jd12 | |
cisco | ios | 15.3\(3\)jd13 | |
cisco | ios | 15.3\(3\)jd14 | |
cisco | ios | 15.3\(3\)jd16 | |
cisco | ios | 15.3\(3\)jd17 | |
cisco | ios | 15.3\(3\)je | |
cisco | ios | 15.3\(3\)jf | |
cisco | ios | 15.3\(3\)jf1 | |
cisco | ios | 15.3\(3\)jf2 | |
cisco | ios | 15.3\(3\)jf4 | |
cisco | ios | 15.3\(3\)jf5 | |
cisco | ios | 15.3\(3\)jf6 | |
cisco | ios | 15.3\(3\)jf7 | |
cisco | ios | 15.3\(3\)jf8 | |
cisco | ios | 15.3\(3\)jf9 | |
cisco | ios | 15.3\(3\)jf10 | |
cisco | ios | 15.3\(3\)jf13 | |
cisco | ios | 15.3\(3\)jf99 | |
cisco | ios | 15.3\(3\)jg | |
cisco | ios | 15.3\(3\)jg1 | |
cisco | ios | 15.3\(3\)jh | |
cisco | ios | 15.3\(3\)jh1 | |
cisco | ios | 15.3\(3\)ji1 | |
cisco | ios | 15.3\(3\)ji3 | |
cisco | ios | 15.3\(3\)ji4 | |
cisco | ios | 15.3\(3\)ji5 | |
cisco | ios | 15.3\(3\)jj | |
cisco | ios | 15.3\(3\)jj1 | |
cisco | ios | 15.3\(3\)jk | |
cisco | ios | 15.3\(3\)jk1a | |
cisco | ios | 15.3\(3\)jk1t | |
cisco | ios | 15.3\(3\)jk2a | |
cisco | ios | 15.3\(3\)jk3 | |
cisco | ios | 15.3\(3\)jk99 | |
cisco | ios | 15.3\(3\)jn | |
cisco | ios | 15.3\(3\)jn1 | |
cisco | ios | 15.3\(3\)jn2 | |
cisco | ios | 15.3\(3\)jn3 | |
cisco | ios | 15.3\(3\)jn4 | |
cisco | ios | 15.3\(3\)jn6 | |
cisco | ios | 15.3\(3\)jn7 | |
cisco | ios | 15.3\(3\)jn8 | |
cisco | ios | 15.3\(3\)jn9 | |
cisco | ios | 15.3\(3\)jn11 | |
cisco | ios | 15.3\(3\)jn13 | |
cisco | ios | 15.3\(3\)jn14 | |
cisco | ios | 15.3\(3\)jn15 | |
cisco | ios | 15.3\(3\)jnb | |
cisco | ios | 15.3\(3\)jnb1 | |
cisco | ios | 15.3\(3\)jnb2 | |
cisco | ios | 15.3\(3\)jnb3 | |
cisco | ios | 15.3\(3\)jnb4 | |
cisco | ios | 15.3\(3\)jnb5 | |
cisco | ios | 15.3\(3\)jnb6 | |
cisco | ios | 15.3\(3\)jnc | |
cisco | ios | 15.3\(3\)jnc1 | |
cisco | ios | 15.3\(3\)jnc2 | |
cisco | ios | 15.3\(3\)jnc3 | |
cisco | ios | 15.3\(3\)jnc4 | |
cisco | ios | 15.3\(3\)jnd | |
cisco | ios | 15.3\(3\)jnd1 | |
cisco | ios | 15.3\(3\)jnd2 | |
cisco | ios | 15.3\(3\)jnd3 | |
cisco | ios | 15.3\(3\)jnp | |
cisco | ios | 15.3\(3\)jnp1 | |
cisco | ios | 15.3\(3\)jnp3 | |
cisco | ios | 15.3\(3\)jpb | |
cisco | ios | 15.3\(3\)jpb1 | |
cisco | ios | 15.3\(3\)jpc | |
cisco | ios | 15.3\(3\)jpc1 | |
cisco | ios | 15.3\(3\)jpc2 | |
cisco | ios | 15.3\(3\)jpc3 | |
cisco | ios | 15.3\(3\)jpc5 | |
cisco | ios | 15.3\(3\)jpc99 | |
cisco | ios | 15.3\(3\)jpd | |
cisco | ios | 15.3\(3\)jpi | |
cisco | ios | 15.3\(3\)jpi3 | |
cisco | ios | 15.3\(3\)jpj | |
cisco | ios_xe | 3.3.0xo | |
cisco | ios_xe | 3.3.1xo | |
cisco | ios_xe | 3.3.2xo | |
cisco | ios_xe | 3.6.5be | |
cisco | ios_xe | 3.8.9e | |
cisco | ios_xe | 3.8.10e | |
cisco | ios_xe | 3.10.3e | |
cisco | ios_xe | 16.3.9 | |
cisco | ios_xe | 16.3.10 | |
cisco | ios_xe | 16.6.7 | |
cisco | ios_xe | 16.6.7a | |
cisco | ios_xe | 16.6.8 | |
cisco | ios_xe | 16.9.1 | |
cisco | ios_xe | 16.9.1d | |
cisco | ios_xe | 16.9.4 | |
cisco | ios_xe | 16.9.4c | |
cisco | ios_xe | 16.9.5 | |
cisco | ios_xe | 16.9.5f | |
cisco | ios_xe | 16.10.1 | |
cisco | ios_xe | 16.10.1e | |
cisco | ios_xe | 16.10.1g | |
cisco | ios_xe | 16.10.2 | |
cisco | ios_xe | 16.10.3 | |
cisco | ios_xe | 16.11.1 | |
cisco | ios_xe | 16.11.1a | |
cisco | ios_xe | 16.11.1b | |
cisco | ios_xe | 16.11.1c | |
cisco | ios_xe | 16.11.1s | |
cisco | ios_xe | 16.12.1 | |
cisco | ios_xe | 16.12.1a | |
cisco | ios_xe | 16.12.1c | |
cisco | ios_xe | 16.12.1s | |
cisco | ios_xe | 16.12.1t | |
cisco | ios_xe | 16.12.1w |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*", "matchCriteriaId": "E632468F-4B62-4937-8CA6-5B8023451F80", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*", "matchCriteriaId": "C853E612-2C4B-4595-AD6F-22E34B68C69A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*", "matchCriteriaId": "A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*", "matchCriteriaId": "49E8D759-07E9-49DB-B8EB-A9C06A8D8031", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*", "matchCriteriaId": "D7EF0685-7BEF-4F84-902C-DFE533CD2F34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*", "matchCriteriaId": "0F114FD7-F62C-4A24-9CE6-C9A7136465F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*", "matchCriteriaId": "892F72BE-B65F-4271-9042-3B459DFBB43C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*", "matchCriteriaId": "7715D0D0-E8B2-444A-A590-7B5B0BFA713F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*", "matchCriteriaId": "1B526DE1-EEA7-47E4-B291-09C02F018A16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*", "matchCriteriaId": "5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*", "matchCriteriaId": "5898745E-C1D3-4D0E-8476-2EEAA4327B5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*", "matchCriteriaId": "887C5632-F3F7-4EDB-A065-D81F64A9B15C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*", "matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*", "matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*", "matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*", "matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*", "matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*", "matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*", "matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*", "matchCriteriaId": "5362C676-5002-4ABC-9C60-97D4B65A399D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*", "matchCriteriaId": "0D14EB41-CD6A-483A-8F68-9072E436807D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*", "matchCriteriaId": "DC201905-7DBF-4E2B-B732-62641F51C170", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*", "matchCriteriaId": "377669B9-952D-4527-9C24-E6713E749C1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13a:*:*:*:*:*:*:*", "matchCriteriaId": "A83236DB-AF3D-44F8-9B5A-7B35B05C3EDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*", "matchCriteriaId": "F9D38633-31AE-42E9-8FFA-77C8EFA9AABB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*", "matchCriteriaId": "A6D6D9CC-70F0-475C-8AB0-48980596BE47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*", "matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez16:*:*:*:*:*:*:*", "matchCriteriaId": "C2950C7F-EEB9-4956-937D-CD978AAC2E44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*", "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*", "matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*", "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*", "matchCriteriaId": "114E5F13-3F15-418B-A0AF-038BEABF8445", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*", "matchCriteriaId": "694AA98F-2705-477E-B2EE-75D2CEDB263B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*", "matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*", "matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*", "matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*", "matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*", "matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*", "matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*", "matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*", "matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*", "matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*", "matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*", "matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*", "matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*", "matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*", "matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*", "matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*", "matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*", "matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*", "matchCriteriaId": "343F5C35-A0C0-4747-95BA-D4044C64508B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*", "matchCriteriaId": "713C55A8-F24D-45FE-88AA-1D1EFEC88339", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*", "matchCriteriaId": "11F7D280-D099-495F-B860-D96F485BAF81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*", "matchCriteriaId": "B62A7038-EBCF-4996-8795-3BF95CBDE6B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13a:*:*:*:*:*:*:*", "matchCriteriaId": "E212B3A0-5A20-40B7-BBF6-CC420B0C86AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11a:*:*:*:*:*:*:*", "matchCriteriaId": "AAAC6B58-6FC4-459B-9663-4FDC6A6F8DE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*", "matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*", "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*", "matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*", "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*", "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*", "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*", "matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*", "matchCriteriaId": "10438F4B-281D-4C2F-B4C3-DC3D47B0033A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*", "matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*", "matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*", "matchCriteriaId": "F7316ED4-FABD-49E0-AA21-394D327435F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*", "matchCriteriaId": "24A56EF3-4E88-4220-846A-A9BE1E496311", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*", "matchCriteriaId": "DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "0687FD87-BAED-4776-9B94-3C9EA7CCE79A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*", "matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*", "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*", "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*", "matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*", "matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*", "matchCriteriaId": "2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*", "matchCriteriaId": "FD5BD905-75C3-47AE-8D19-6225BD808B37", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*", "matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*", "matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*", "matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*", "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*", "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*", "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", "matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", "matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz:*:*:*:*:*:*:*", "matchCriteriaId": "BAE38B2F-F6AB-44E2-89BE-F71796FE1942", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*", "matchCriteriaId": "6D4358B9-F3DB-46AC-A3A8-114E25F676DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", "matchCriteriaId": "45B80CBC-961F-4EE8-A998-C0A827151EDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", "matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*", "matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*", "matchCriteriaId": "7551128E-9E23-4C42-A681-6BE64D284C93", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*", "matchCriteriaId": "0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*", "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*", "matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*", "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*", "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*", "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*", "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1:*:*:*:*:*:*:*", "matchCriteriaId": "71493AA2-49E9-4FF5-AC29-DC2426973EC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1n:*:*:*:*:*:*:*", "matchCriteriaId": "49DAE7DA-E0D3-4434-AD75-C8894D939A83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja4:*:*:*:*:*:*:*", "matchCriteriaId": "85F96295-2E72-4C23-B973-791B4A2B63F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja5:*:*:*:*:*:*:*", "matchCriteriaId": "A8555124-BAFA-45D4-8208-ED1172D55F53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja6:*:*:*:*:*:*:*", "matchCriteriaId": "A313DD0B-C9A9-4731-A486-EE1BCBA3B1F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja7:*:*:*:*:*:*:*", "matchCriteriaId": "04B9D9B5-807F-494B-9ED2-7F4BDB32432A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja8:*:*:*:*:*:*:*", "matchCriteriaId": "6089D71A-8D46-4819-80E9-8A29BCA47EDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja10:*:*:*:*:*:*:*", "matchCriteriaId": "21678FDA-D2B4-4041-A52D-C7AA562FD086", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja11:*:*:*:*:*:*:*", "matchCriteriaId": "F6EB0CFF-88F5-4193-8896-B3E4BA8D1AD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja12:*:*:*:*:*:*:*", "matchCriteriaId": "4E532352-99A6-4E45-B0E7-7F04DA411820", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*", "matchCriteriaId": "D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa1:*:*:*:*:*:*:*", "matchCriteriaId": "EAE1AD0D-C3E9-488C-89CB-F2342CF6D5A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax:*:*:*:*:*:*:*", "matchCriteriaId": "1AAC643B-AA58-42EA-A777-52FCF6065F9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax1:*:*:*:*:*:*:*", "matchCriteriaId": "9CFB57C3-6CDF-46D1-858D-D5234956653D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax2:*:*:*:*:*:*:*", "matchCriteriaId": "330125E6-3645-40B5-8E64-009B622090B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jb:*:*:*:*:*:*:*", "matchCriteriaId": "02D874DF-54A1-47C7-B3D9-A9CE41A42418", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb:*:*:*:*:*:*:*", "matchCriteriaId": "1485E3A5-A586-408A-8325-7572779DD0E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb1:*:*:*:*:*:*:*", "matchCriteriaId": "2244E538-6B35-44E0-B93E-60B773745A99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb2:*:*:*:*:*:*:*", "matchCriteriaId": "F9DB6B2A-19D2-4684-B07F-5D42EC850A8E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb4:*:*:*:*:*:*:*", "matchCriteriaId": "DDC1C381-4795-4992-BE3C-9615E005DE46", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb5:*:*:*:*:*:*:*", "matchCriteriaId": "80188F84-30DE-46AC-8E0C-984126B77CC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6:*:*:*:*:*:*:*", "matchCriteriaId": "DECBF0A9-D84F-40A2-AC61-A9C59C819787", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*", "matchCriteriaId": "C9F129CF-FB92-49E9-BD86-90DDB8218FF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb8:*:*:*:*:*:*:*", "matchCriteriaId": "9C288D58-F765-4403-BF18-CC0A62B1AA60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc:*:*:*:*:*:*:*", "matchCriteriaId": "D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc1:*:*:*:*:*:*:*", "matchCriteriaId": "27357CD7-3E9E-4EF2-A5D4-A6BC44952FD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc2:*:*:*:*:*:*:*", "matchCriteriaId": "4246ACD7-DBCF-4CE6-B9B8-D44AAB2DEC8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc3:*:*:*:*:*:*:*", "matchCriteriaId": "1046E19B-DB53-418A-BFEC-5CD4492E6626", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc4:*:*:*:*:*:*:*", "matchCriteriaId": "0062D992-D990-4EC9-BABD-2EFFF84254D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc5:*:*:*:*:*:*:*", "matchCriteriaId": "CC81B74C-4F63-46E8-ACF4-EB707853580A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*", "matchCriteriaId": "A3C779C9-3B83-4B26-8942-B8475FB3B5D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*", "matchCriteriaId": "02ACA99D-5784-4F5F-AB83-F55DF8774E94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*", "matchCriteriaId": "DFFB9F99-8751-442B-9419-C2AB522D2ADC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*", "matchCriteriaId": "5E33FD88-8183-40EF-97A1-2766A4BBFBE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd:*:*:*:*:*:*:*", "matchCriteriaId": "34D7D48C-9FA1-45DB-B206-437E8ECBF53D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd2:*:*:*:*:*:*:*", "matchCriteriaId": "3626B216-43E8-4E60-96E5-7CAA0CB67F65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*", "matchCriteriaId": "D9B59D8B-E71A-4671-BA0B-00E56498E280", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*", "matchCriteriaId": "956C0089-E5AE-4289-B6D7-A8AB3C39AAA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*", "matchCriteriaId": "333468BC-41F0-46ED-9561-D7D2CE6AC267", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*", "matchCriteriaId": "09DBAA17-61D7-4EE4-A70D-A7200DF36C58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*", "matchCriteriaId": "DF17EADC-5812-47FD-A243-287837CEC1E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*", "matchCriteriaId": "5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*", "matchCriteriaId": "BE8CF99C-B097-4964-B07C-FBB28EB37681", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*", "matchCriteriaId": "79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd12:*:*:*:*:*:*:*", "matchCriteriaId": "CBA4B81F-7FCA-4666-8602-F6C77A4673E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*", "matchCriteriaId": "E2403659-B7AD-40CE-AF88-FE2BEF0929E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*", "matchCriteriaId": "7D1F53B1-E9FA-4480-8314-C531073B25CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*", "matchCriteriaId": "498030A3-0AFF-4D74-98D6-74C9447E5B79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*", "matchCriteriaId": "BDCBDB71-59D7-481E-84FF-8772930F857B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*", "matchCriteriaId": "2955A319-04AC-4D0C-80B7-0C90503908C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*", "matchCriteriaId": "B0EF13B6-A743-41D1-BB31-F17C3586C8AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*", "matchCriteriaId": "0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*", "matchCriteriaId": "37875B18-434B-4218-BAAF-2B593E188180", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*", "matchCriteriaId": "26BAC234-D00C-4407-A1FE-E45A14D1BDAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*", "matchCriteriaId": "C42E2869-F179-49B7-A4E8-0F4E8EA953CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*", "matchCriteriaId": "7A58711A-F8C9-4F25-97D7-AE8AE64F3912", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*", "matchCriteriaId": "BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*", "matchCriteriaId": "DE3ECC04-345F-4DAE-98F7-04E082BAEC3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*", "matchCriteriaId": "6A919122-DE62-4032-80DF-F77C1D80B387", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*", "matchCriteriaId": "9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf13:*:*:*:*:*:*:*", "matchCriteriaId": "06216CEE-F15D-4B31-A5A3-B2C226E2D25B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf99:*:*:*:*:*:*:*", "matchCriteriaId": "F1BDD2AB-E1DC-4DD3-93AD-EE6348942EE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*", "matchCriteriaId": "746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*", "matchCriteriaId": "8BB02DEB-81D4-4A05-BDD5-3B8BC7184159", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*", "matchCriteriaId": "B18C3383-28B0-435E-AF08-9739DADAE4E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*", "matchCriteriaId": "08C9CA39-3515-4226-8453-0B5FC62546D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*", "matchCriteriaId": "19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*", "matchCriteriaId": "1658FFCF-7433-4AFB-9D59-BD6CC14A4D28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*", "matchCriteriaId": "D2CA6116-2C6B-431B-BA88-63B180A00DA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*", "matchCriteriaId": "C2377350-7B69-4C49-889A-D63A3E4C1002", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*", "matchCriteriaId": "8AD90F4A-2A86-4A98-A157-D93C382717A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*", "matchCriteriaId": "B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*", "matchCriteriaId": "1739E9AD-154D-40C2-A761-F7133BC06C3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1a:*:*:*:*:*:*:*", "matchCriteriaId": "16F1C76C-62EE-4D93-8730-E923E3FD413D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB7B3E-4E91-477F-BD62-9A28578CCA80", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*", "matchCriteriaId": "7C8DF3B4-A424-4B70-9116-28E2C4DFB776", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*", "matchCriteriaId": "4677B840-6636-4D8C-9E1C-47FEB8F3116A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk99:*:*:*:*:*:*:*", "matchCriteriaId": "E97BD4E2-154B-4984-A094-EDC95726C760", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn:*:*:*:*:*:*:*", "matchCriteriaId": "32E6CCE7-88BB-4F4F-9253-EC67B5076767", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn1:*:*:*:*:*:*:*", "matchCriteriaId": "FFD112AD-9D7D-45C1-80DE-96037B425F98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn2:*:*:*:*:*:*:*", "matchCriteriaId": "AFFDA314-0FAA-4BF7-AEED-DF2509B74E09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn3:*:*:*:*:*:*:*", "matchCriteriaId": "2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn4:*:*:*:*:*:*:*", "matchCriteriaId": "A5D6C6EE-CFD9-49A9-8784-498560847737", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn6:*:*:*:*:*:*:*", "matchCriteriaId": "5187A9D2-A057-40E7-84E1-89BE32AFA95C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn7:*:*:*:*:*:*:*", "matchCriteriaId": "FFEE60A6-9E75-4B20-A06D-411E774511B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn8:*:*:*:*:*:*:*", "matchCriteriaId": "1451BB33-6BE0-4F4A-A193-14E13DECEE20", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn9:*:*:*:*:*:*:*", "matchCriteriaId": "5F0FC09E-8C60-4EAC-B729-3BE3524E6F08", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn11:*:*:*:*:*:*:*", "matchCriteriaId": "DD355DC3-51F1-4CEA-98B1-E08EEE03BFD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn13:*:*:*:*:*:*:*", "matchCriteriaId": "49B4A0C4-B0CF-4040-9EB0-1529BCAD0DF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn14:*:*:*:*:*:*:*", "matchCriteriaId": "4071E320-789E-4E1D-982B-C265F4228FEA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn15:*:*:*:*:*:*:*", "matchCriteriaId": "8EC38DE9-5D5D-452A-AC42-C1D24418FDB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*", "matchCriteriaId": "9BC3CD43-F30A-484B-9285-D925C1262212", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb1:*:*:*:*:*:*:*", "matchCriteriaId": "F807A36A-9363-40F1-9B20-E5C4D503EB1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb2:*:*:*:*:*:*:*", "matchCriteriaId": "5200C1CD-DEAB-44FD-970D-098F3E01F36B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb3:*:*:*:*:*:*:*", "matchCriteriaId": "E8E71841-512D-483C-A911-86EA745AC00E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb4:*:*:*:*:*:*:*", "matchCriteriaId": "BBB655C5-2D7B-4ED5-89D6-4ED613CF3934", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb5:*:*:*:*:*:*:*", "matchCriteriaId": "BAE556AB-093C-4992-8F5B-F240526AAA64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb6:*:*:*:*:*:*:*", "matchCriteriaId": "4BA0BCD1-4E75-4F39-B960-4B6B1B357442", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc:*:*:*:*:*:*:*", "matchCriteriaId": "F17F3285-80E8-4BE5-8704-3379CF326601", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc1:*:*:*:*:*:*:*", "matchCriteriaId": "9669DF61-DDC5-498D-906A-494D56BAE450", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc2:*:*:*:*:*:*:*", "matchCriteriaId": "00B0502B-3363-4F3C-A147-8888B894635B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc3:*:*:*:*:*:*:*", "matchCriteriaId": "689327CA-F302-49FC-9365-F09E4A60E8FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc4:*:*:*:*:*:*:*", "matchCriteriaId": "571ECF0D-06C6-4371-891C-FB68A3093F53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd:*:*:*:*:*:*:*", "matchCriteriaId": "8A38CF1F-37D9-4CBD-8B98-C24637FF7F56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd1:*:*:*:*:*:*:*", "matchCriteriaId": "0886F6DC-C590-48A0-BE27-6CD778EB37FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd2:*:*:*:*:*:*:*", "matchCriteriaId": "8552242D-0A93-4841-83F9-EA4D7F58938E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd3:*:*:*:*:*:*:*", "matchCriteriaId": "4D0667D1-B4EC-4FF0-AC5D-9C1B04D84099", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp:*:*:*:*:*:*:*", "matchCriteriaId": "F45D0EFD-784A-4CDB-8FDB-41F6869B4735", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp1:*:*:*:*:*:*:*", "matchCriteriaId": "942CC01D-ED6E-4731-A61B-75CDF219F760", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp3:*:*:*:*:*:*:*", "matchCriteriaId": "59CA018E-5160-40AE-953D-9559F23D2EAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb:*:*:*:*:*:*:*", "matchCriteriaId": "BBA595EF-8718-4477-8EEC-EA948C14F091", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb1:*:*:*:*:*:*:*", "matchCriteriaId": "4CDCADB1-EA01-41AF-9D96-A6EDE42D7A9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc:*:*:*:*:*:*:*", "matchCriteriaId": "13763901-2D7B-485D-A957-E30587BCEB88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc1:*:*:*:*:*:*:*", "matchCriteriaId": "8B213166-77E2-4E13-8769-FA8AF6EEC33A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc2:*:*:*:*:*:*:*", "matchCriteriaId": "7A3C0371-223A-433C-B8A3-C24A499EB82F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc3:*:*:*:*:*:*:*", "matchCriteriaId": "A066A001-830B-4407-A5CD-AB99059C190E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*", "matchCriteriaId": "83B45095-526D-4BC5-A16B-6B5741F07FD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc99:*:*:*:*:*:*:*", "matchCriteriaId": "51AA5D4E-5236-44DA-AA1A-E5E7A9DC8E64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpd:*:*:*:*:*:*:*", "matchCriteriaId": "C4A9F7DF-BB18-46FC-B471-3FC41F4CCD01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi:*:*:*:*:*:*:*", "matchCriteriaId": "20E0326F-98A1-48B4-945D-D8603D5A8609", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi3:*:*:*:*:*:*:*", "matchCriteriaId": "5F06709E-F260-4E1A-A79D-DBD63F458CC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj:*:*:*:*:*:*:*", "matchCriteriaId": "2F69B4F2-4A03-4383-8958-11EE154A7350", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*", "matchCriteriaId": "930678B3-1527-4967-9D8F-27FC0DA060AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*", "matchCriteriaId": "58A34268-7618-48D2-8872-27B5B624543B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*", "matchCriteriaId": "C2017A75-CC29-4161-85CB-7A531E5ABB3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", "matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*", "matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*", "matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*", "matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*", "matchCriteriaId": "3F13F583-F645-4DF0-A075-B4F19D71D128", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*", "matchCriteriaId": "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*", "matchCriteriaId": "D07F9539-CFBE-46F7-9F5E-93A68169797D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*", "matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades en la implementaci\u00f3n de la funcionalidad Common Industrial Protocol (CIP) de Cisco IOS Software y Cisco IOS XE Software, podr\u00edan permitir a un atacante remoto no autenticado causar la recarga de un dispositivo afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Las vulnerabilidades se deben a un procesamiento de entrada insuficiente del tr\u00e1fico CIP. Un atacante podr\u00eda explotar estas vulnerabilidades mediante el env\u00edo de tr\u00e1fico CIP dise\u00f1ado para ser procesado por un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo afectado se vuelva a cargar, resultando en una condici\u00f3n DoS." } ], "id": "CVE-2020-3225", "lastModified": "2024-11-21T05:30:36.133", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-03T18:15:20.543", "references": [ { "source": "psirt@cisco.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CERTFR-2020-AVI-340
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Cisco | N/A | Cisco IOx sans le dernier correctif de sécurité (voir le site du constructeur pour la liste des produits vulnérables) | ||
Cisco | IOS | Cisco IOS pour routeurs Cisco séries CGR1000 sans le dernier correctif de sécurité | ||
Cisco | NX-OS | Cisco NX-OS sans le dernier correctif de sécurité (voir le site du constructeur pour la liste des produits vulnérables) | ||
Cisco | IOS XE | Cisco IOS et IOS XE sans le dernier correctif de sécurité (voir le site du constructeur pour la liste des produits vulnérables) | ||
Cisco | IOS | Cisco IOS pour routeurs Cisco 809 et 829 (Industrial ISRs) sans le dernier correctif de sécurité | ||
Cisco | IOS XR | Cisco IOS XR versions 5.2 et 5.3 |
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Cisco IOx sans le dernier correctif de s\u00e9curit\u00e9 (voir le site du constructeur pour la liste des produits vuln\u00e9rables)", "product": { "name": "N/A", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS pour routeurs Cisco s\u00e9ries CGR1000 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "IOS", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco NX-OS sans le dernier correctif de s\u00e9curit\u00e9 (voir le site du constructeur pour la liste des produits vuln\u00e9rables)", "product": { "name": "NX-OS", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS et IOS XE sans le dernier correctif de s\u00e9curit\u00e9 (voir le site du constructeur pour la liste des produits vuln\u00e9rables)", "product": { "name": "IOS XE", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS pour routeurs Cisco 809 et 829 (Industrial ISRs) sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "IOS", "vendor": { "name": "Cisco", "scada": false } } }, { "description": "Cisco IOS XR versions 5.2 et 5.3", "product": { "name": "IOS XR", "vendor": { "name": "Cisco", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-3211", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3211" }, { "name": "CVE-2020-3257", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3257" }, { "name": "CVE-2020-3212", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3212" }, { "name": "CVE-2020-3205", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3205" }, { "name": "CVE-2020-3218", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3218" }, { "name": "CVE-2020-3200", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3200" }, { "name": "CVE-2020-3234", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3234" }, { "name": "CVE-2020-3229", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3229" }, { "name": "CVE-2020-3217", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3217" }, { "name": "CVE-2020-3208", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3208" }, { "name": "CVE-2020-3235", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3235" }, { "name": "CVE-2020-3219", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3219" }, { "name": "CVE-2020-3230", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3230" }, { "name": "CVE-2020-3209", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3209" }, { "name": "CVE-2020-3258", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3258" }, { "name": "CVE-2020-3199", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3199" }, { "name": "CVE-2020-3227", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3227" }, { "name": "CVE-2020-3203", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3203" }, { "name": "CVE-2020-3210", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3210" }, { "name": "CVE-2020-3198", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3198" }, { "name": "CVE-2020-3225", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3225" }, { "name": "CVE-2020-3224", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3224" }, { "name": "CVE-2020-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3238" }, { "name": "CVE-2020-3221", "url": "https://www.cve.org/CVERecord?id=CVE-2020-3221" } ], "initial_release_date": "2020-06-04T00:00:00", "last_revision_date": "2020-06-05T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-340", "revisions": [ { "description": "Version initiale", "revision_date": "2020-06-04T00:00:00.000000" }, { "description": "Correction de la date de certains avis.", "revision_date": "2020-06-05T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-vds-cmd-inj-VfJtqGhE du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cmd-inj-VfJtqGhE" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-digsig-bypass-FYQ3bmVq du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-digsig-bypass-FYQ3bmVq" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-vds-cred-uPMp9zbY du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cred-uPMp9zbY" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-fnfv9-dos-HND6Fc9u du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-fnfv9-dos-HND6Fc9u" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sip-Cv28sQw2 du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sip-Cv28sQw2" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-webui-cmdinj-zM283Zdw du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-zM283Zdw" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ioxPE-KgGvCAf9 du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxPE-KgGvCAf9" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-web-cmdinj2-fOnjk2LD du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj2-fOnjk2LD" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-caf-3dXM8exv du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-caf-3dXM8exv" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-snmp-dos-USxSyTk5 du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ngwc-cmdinj-KEwWVWR du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ngwc-cmdinj-KEwWVWR" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-webui-rce-uk8BXcUD du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-rce-uk8BXcUD" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cipdos-hkfTZXEx du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-web-cmdinj4-S2TmH7GA du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj4-S2TmH7GA" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-webui-PZgQxjfG du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-PZgQxjfG" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-ewlc-dos-TkuPVmZN du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-dos-TkuPVmZN" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-web-cmdinj3-44st5CcA du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj3-44st5CcA" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-gos-vuln-s9qS8kYL du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ssh-dos-Un22sd2A du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssh-dos-Un22sd2A" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ikev2-9p23Jj2a du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-9p23Jj2a" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-rce-xYRSeMNH du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-rce-xYRSeMNH" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-ir800-img-verif-wHhLYHjK du 03 juin 2020", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-ir800-img-verif-wHhLYHjK" } ] }
ghsa-h6c9-q6x7-9r7w
Vulnerability from github
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
{ "affected": [], "aliases": [ "CVE-2020-3225" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-06-03T18:15:00Z", "severity": "HIGH" }, "details": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.", "id": "GHSA-h6c9-q6x7-9r7w", "modified": "2024-04-04T02:52:42Z", "published": "2022-05-24T17:19:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3225" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
var-202006-1092
Vulnerability from variot
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco IOS and IOS XE The software contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-1092", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(58\\)se1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(52\\)se" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jk" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnd1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.11.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)ey3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd17" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jb" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)e10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se13" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnd" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(1\\)ey2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.3.1xo" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.3.0xo" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnp1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jk1a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn14" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnb1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jj" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnb4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se9" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.6.5be" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)ea" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se7" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.9.5f" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd12" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnp" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf8" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.10.3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn15" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e5b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)ex2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)ea2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.12.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpd" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ec2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(44\\)ex" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd13" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(50\\)se1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpc3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)ey2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnc4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc14" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)ea" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea9" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.3.10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(7\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpb" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2b\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jj1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jg" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.9.4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)eb2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.10.3e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5a\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jh1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(60\\)ez16" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd16" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se13" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.9e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb6a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.10.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ji3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e5a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(52\\)se1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jax2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.9.1d" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf99" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)sg11a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e7b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(7\\)e0b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jaa" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnb6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ec1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)eb" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ji4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)e0c" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se11" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(46\\)se1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea7" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.11.1a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.8.10e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jax" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jk99" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(7a\\)e0b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(50\\)se4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpc2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se9" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.12.1w" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)e1a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ji5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)ey1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.12.1a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)ex8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnc3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn13" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se12" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jk2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd7" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.6.7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e2c" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd11" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jk1t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnc" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnb3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(50\\)se5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jaa1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(7b\\)e0b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf13" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(1\\)ey" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)ey" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)e9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnc2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf5" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.6.8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)eb" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)e1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se10a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpc5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)e0a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(50\\)se3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)ea1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnd3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpc" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(3\\)e5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja7" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn3" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.11.1c" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn4" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnp3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnb2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "3.3.2xo" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)ek1" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.10.1g" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)e2a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jf2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)eb1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(50\\)se2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja1n" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)jaz1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd14" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.9.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(7\\)e0s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn11" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.3.9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e2b" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.6.7a" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.11.1b" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(58\\)se2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.9.4c" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd4" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.9.5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(50\\)se" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se11" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja10" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc8" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jg1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jk3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpj" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se13a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)e3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jbb" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.12.1c" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.12.1s" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(1\\)ey" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(6\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpi" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpi3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)ea6" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnb" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpc99" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jh" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(1\\)ey1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ji1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(44\\)ex1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se13a" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)je" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnc1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se12" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpb1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja12" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(4\\)jaz" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(58\\)se" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)ea" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)se" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.10.1e" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.12.1t" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(5\\)e2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)ja11" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(46\\)se2" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.10.2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.0\\(2\\)ek" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jax1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnb5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)ea3" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jnd2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e5" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.2\\(2\\)e" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jc9" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jn2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "12.2\\(55\\)se6" }, { "model": "ios xe", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.11.1" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jd2" }, { "model": "ios", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "15.3\\(3\\)jpc1" }, { "model": "ios", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ios xe", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "db": "NVD", "id": "CVE-2020-3225" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ios", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006135" } ] }, "cve": "CVE-2020-3225", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-3225", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-006135", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-181350", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-3225", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "ykramarz@cisco.com", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2020-3225", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.6, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-006135", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-3225", "trust": 1.0, "value": "HIGH" }, { "author": "ykramarz@cisco.com", "id": "CVE-2020-3225", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-006135", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202006-312", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-181350", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-3225", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-181350" }, { "db": "VULMON", "id": "CVE-2020-3225" }, { "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "db": "CNNVD", "id": "CNNVD-202006-312" }, { "db": "NVD", "id": "CVE-2020-3225" }, { "db": "NVD", "id": "CVE-2020-3225" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco IOS and IOS XE The software contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2020-3225" }, { "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "db": "VULHUB", "id": "VHN-181350" }, { "db": "VULMON", "id": "CVE-2020-3225" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-3225", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-006135", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202006-312", "trust": 0.7 }, { "db": "NSFOCUS", "id": "47284", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1940", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-181350", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-3225", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-181350" }, { "db": "VULMON", "id": "CVE-2020-3225" }, { "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "db": "CNNVD", "id": "CNNVD-202006-312" }, { "db": "NVD", "id": "CVE-2020-3225" } ] }, "id": "VAR-202006-1092", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-181350" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T23:11:24.531000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-cipdos-hkfTZXEx", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" }, { "title": "Cisco IOS and IOS XE Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=120219" }, { "title": "Cisco: Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-cipdos-hkfTZXEx" }, { "title": "CVE-2020-3225", "trust": 0.1, "url": "https://github.com/AlAIAL90/CVE-2020-3225 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-3225" }, { "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "db": "CNNVD", "id": "CNNVD-202006-312" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-181350" }, { "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "db": "NVD", "id": "CVE-2020-3225" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-cipdos-hkftzxex" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-3225" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3225" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/cisco-ios-ios-xe-denial-of-service-via-cip-32412" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/47284" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1940/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2020-3225" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-181350" }, { "db": "VULMON", "id": "CVE-2020-3225" }, { "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "db": "CNNVD", "id": "CNNVD-202006-312" }, { "db": "NVD", "id": "CVE-2020-3225" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-181350" }, { "db": "VULMON", "id": "CVE-2020-3225" }, { "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "db": "CNNVD", "id": "CNNVD-202006-312" }, { "db": "NVD", "id": "CVE-2020-3225" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-03T00:00:00", "db": "VULHUB", "id": "VHN-181350" }, { "date": "2020-06-03T00:00:00", "db": "VULMON", "id": "CVE-2020-3225" }, { "date": "2020-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "date": "2020-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-312" }, { "date": "2020-06-03T18:15:20.543000", "db": "NVD", "id": "CVE-2020-3225" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-17T00:00:00", "db": "VULHUB", "id": "VHN-181350" }, { "date": "2021-09-17T00:00:00", "db": "VULMON", "id": "CVE-2020-3225" }, { "date": "2020-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-006135" }, { "date": "2020-07-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202006-312" }, { "date": "2024-11-21T05:30:36.133000", "db": "NVD", "id": "CVE-2020-3225" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-312" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IOS and IOS XE Input verification vulnerabilities in software", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-006135" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202006-312" } ], "trust": 0.6 } }
gsd-2020-3225
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-3225", "description": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.", "id": "GSD-2020-3225" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-3225" ], "details": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.", "id": "GSD-2020-3225", "modified": "2023-12-13T01:22:09.341388Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2020-06-03T16:00:00", "ID": "CVE-2020-3225", "STATE": "PUBLIC", "TITLE": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS 12.2(55)SE", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition." } ] }, "exploit": [ { "lang": "eng", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" } ] }, "source": { "advisory": "cisco-sa-cipdos-hkfTZXEx", "defect": [ [ "CSCvo17827", "CSCvp56319", "CSCvr47365", "CSCvr67776" ] ], "discovery": "INTERNAL" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1n:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf99:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk99:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc99:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpd:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2020-3225" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "refsource": "CISCO", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.0 } }, "lastModifiedDate": "2021-09-17T18:42Z", "publishedDate": "2020-06-03T18:15Z" } } }
cnvd-2020-31975
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx
Name | ['Cisco IOS Software', 'Cisco IOS XE Software'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2020-3225" } }, "description": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nCisco IOS Software\u548cCisco IOS XE Software\u4e2d\u7684CIP\u529f\u80fd\u5b9e\u73b0\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u5904\u7406\u8f93\u5165\u7684CIP\u6d41\u91cf\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u7279\u5236\u7684CIP\u6d41\u91cf\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u8bbe\u5907\u91cd\u8f7d\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2020-31975", "openTime": "2020-06-09", "patchDescription": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS Software\u548cCisco IOS XE Software\u4e2d\u7684CIP\u529f\u80fd\u5b9e\u73b0\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u5904\u7406\u8f93\u5165\u7684CIP\u6d41\u91cf\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u7279\u5236\u7684CIP\u6d41\u91cf\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u8bbe\u5907\u91cd\u8f7d\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Cisco IOS\u548cIOS XE\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2020-31975\uff09\u7684\u8865\u4e01", "products": { "product": [ "Cisco IOS Software", "Cisco IOS XE Software" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-3225", "serverity": "\u9ad8", "submitTime": "2020-06-04", "title": "Cisco IOS\u548cIOS XE\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2020-31975\uff09" }
cisco-sa-cipdos-hkfTZXEx
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "These vulnerabilities were found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r\nThe vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\n\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\"]\r\n\r\n\r\nThis advisory is part of the June 3, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 23 Cisco Security Advisories that describe 25 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\" https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388\"].", "title": "Summary" }, { "category": "general", "text": "These vulnerabilities affect Cisco IOS and IOS XE Software if they are configured for CIP. CIP is not enabled by default.\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n Determine Whether CIP Is Enabled\r\nAn administrator can determine whether CIP is enabled on a device by issuing the show cip status command and checking the State: value.\r\n\r\nThe following show cip status output shows that CIP is enabled for VLAN 1:\r\n\r\n\r\nDevice\u003eshow cip status\r\nState : Enabled\r\nVlan : 1\r\n\r\nIf the command returns no output, the device is not affected by the vulnerabilities described in this advisory.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect Cisco IOS XR Software or Cisco NX-OS Software.", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "There are no workarounds that address these vulnerabilities.", "title": "Workarounds" }, { "category": "general", "text": "Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttps://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n\r\n\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to search advisories in the following ways:\r\n\r\nChoose the software and one or more releases\r\nUpload a .txt file that includes a list of specific releases\r\nEnter the output of the show version command\r\n\r\nAfter initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.\r\n\r\nCustomers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S:\r\n\r\n\r\n\r\nBy default, the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "These vulnerabilities were found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" }, { "category": "external", "summary": "Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" }, { "category": "external", "summary": "Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html", "url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories and Alerts page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html", "url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html" }, { "category": "external", "summary": "Cisco\u0026nbsp;Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" }, { "category": "external", "summary": "Cisco\u0026nbsp;Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" }, { "category": "external", "summary": "Cisco\u0026nbsp;Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 2 Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 3S Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 3SG Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "tracking": { "current_release_date": "2020-06-03T16:00:00+00:00", "generator": { "date": "2022-09-03T03:00:30+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-cipdos-hkfTZXEx", "initial_release_date": "2020-06-03T16:00:00+00:00", "revision_history": [ { "date": "2020-04-30T19:04:54+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "service_pack", "name": "12.2(55)SE", "product": { "name": "12.2(55)SE", "product_id": "CSAFPID-103763" } }, { "category": "service_pack", "name": "12.2(46)SE2", "product": { "name": "12.2(46)SE2", "product_id": "CSAFPID-104089" } }, { "category": "service_pack", "name": "12.2(50)SE2", "product": { "name": "12.2(50)SE2", "product_id": "CSAFPID-104101" } }, { "category": "service_pack", "name": "12.2(50)SE1", "product": { "name": "12.2(50)SE1", "product_id": "CSAFPID-104342" } }, { "category": "service_pack", "name": "12.2(50)SE5", "product": { "name": "12.2(50)SE5", "product_id": "CSAFPID-104855" } }, { "category": "service_pack", "name": "12.2(55)SE3", "product": { "name": "12.2(55)SE3", "product_id": "CSAFPID-105394" } }, { "category": "service_pack", "name": "12.2(52)SE", "product": { "name": "12.2(52)SE", "product_id": "CSAFPID-105973" } }, { "category": "service_pack", "name": "12.2(58)SE", "product": { "name": "12.2(58)SE", "product_id": "CSAFPID-105987" } }, { "category": "service_pack", "name": "12.2(50)SE3", "product": { "name": "12.2(50)SE3", "product_id": "CSAFPID-106016" } }, { "category": "service_pack", "name": "12.2(52)SE1", "product": { "name": "12.2(52)SE1", "product_id": "CSAFPID-106684" } }, { "category": "service_pack", "name": "12.2(46)SE1", "product": { "name": "12.2(46)SE1", "product_id": "CSAFPID-106997" } }, { "category": "service_pack", "name": "12.2(50)SE4", "product": { "name": "12.2(50)SE4", "product_id": "CSAFPID-107209" } }, { "category": "service_pack", "name": "12.2(50)SE", "product": { "name": "12.2(50)SE", "product_id": "CSAFPID-107630" } }, { "category": "service_pack", "name": "12.2(58)SE1", "product": { "name": "12.2(58)SE1", "product_id": "CSAFPID-109098" } }, { "category": "service_pack", "name": "12.2(55)SE4", "product": { "name": "12.2(55)SE4", "product_id": "CSAFPID-109439" } }, { "category": "service_pack", "name": "12.2(58)SE2", "product": { "name": "12.2(58)SE2", "product_id": "CSAFPID-109808" } }, { "category": "service_pack", "name": "12.2(55)SE5", "product": { "name": "12.2(55)SE5", "product_id": "CSAFPID-111674" } }, { "category": "service_pack", "name": "12.2(55)SE6", "product": { "name": "12.2(55)SE6", "product_id": "CSAFPID-114665" } }, { "category": "service_pack", "name": "12.2(55)SE7", "product": { "name": "12.2(55)SE7", "product_id": "CSAFPID-184125" } }, { "category": "service_pack", "name": "12.2(55)SE9", "product": { "name": "12.2(55)SE9", "product_id": "CSAFPID-192911" } }, { "category": "service_pack", "name": "12.2(55)SE10", "product": { "name": "12.2(55)SE10", "product_id": "CSAFPID-198542" } }, { "category": "service_pack", "name": "12.2(55)SE11", "product": { "name": "12.2(55)SE11", "product_id": "CSAFPID-210732" } }, { "category": "service_pack", "name": "12.2(55)SE12", "product": { "name": "12.2(55)SE12", "product_id": "CSAFPID-228057" } }, { "category": "service_pack", "name": "12.2(55)SE13", "product": { "name": "12.2(55)SE13", "product_id": "CSAFPID-230962" } } ], "category": "product_version", "name": "12.2SE" }, { "branches": [ { "category": "service_pack", "name": "12.2(44)EX", "product": { "name": "12.2(44)EX", "product_id": "CSAFPID-104061" } }, { "category": "service_pack", "name": "12.2(44)EX1", "product": { "name": "12.2(44)EX1", "product_id": "CSAFPID-105253" } } ], "category": "product_version", "name": "12.2EX" }, { "branches": [ { "category": "service_pack", "name": "12.2(60)EZ16", "product": { "name": "12.2(60)EZ16", "product_id": "CSAFPID-262536" } } ], "category": "product_version", "name": "12.2EZ" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)XO1", "product": { "name": "15.0(1)XO1", "product_id": "CSAFPID-103955" } }, { "category": "service_pack", "name": "15.0(1)XO", "product": { "name": "15.0(1)XO", "product_id": "CSAFPID-106072" } }, { "category": "service_pack", "name": "15.0(2)XO", "product": { "name": "15.0(2)XO", "product_id": "CSAFPID-111005" } } ], "category": "product_version", "name": "15.0XO" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)EY", "product": { "name": "15.0(1)EY", "product_id": "CSAFPID-104376" } }, { "category": "service_pack", "name": "15.0(1)EY1", "product": { "name": "15.0(1)EY1", "product_id": "CSAFPID-115969" } }, { "category": "service_pack", "name": "15.0(1)EY2", "product": { "name": "15.0(1)EY2", "product_id": "CSAFPID-187269" } }, { "category": "service_pack", "name": "15.0(2)EY", "product": { "name": "15.0(2)EY", "product_id": "CSAFPID-187932" } }, { "category": "service_pack", "name": "15.0(2)EY1", "product": { "name": "15.0(2)EY1", "product_id": "CSAFPID-190250" } }, { "category": "service_pack", "name": "15.0(2)EY2", "product": { "name": "15.0(2)EY2", "product_id": "CSAFPID-192831" } }, { "category": "service_pack", "name": "15.0(2)EY3", "product": { "name": "15.0(2)EY3", "product_id": "CSAFPID-195481" } } ], "category": "product_version", "name": "15.0EY" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SE", "product": { "name": "15.0(2)SE", "product_id": "CSAFPID-107852" } }, { "category": "service_pack", "name": "15.0(2)SE1", "product": { "name": "15.0(2)SE1", "product_id": "CSAFPID-115939" } }, { "category": "service_pack", "name": "15.0(2)SE2", "product": { "name": "15.0(2)SE2", "product_id": "CSAFPID-116083" } }, { "category": "service_pack", "name": "15.0(2)SE3", "product": { "name": "15.0(2)SE3", "product_id": "CSAFPID-189455" } }, { "category": "service_pack", "name": "15.0(2)SE4", "product": { "name": "15.0(2)SE4", "product_id": "CSAFPID-190635" } }, { "category": "service_pack", "name": "15.0(2)SE5", "product": { "name": "15.0(2)SE5", "product_id": "CSAFPID-192706" } }, { "category": "service_pack", "name": "15.0(2)SE6", "product": { "name": "15.0(2)SE6", "product_id": "CSAFPID-195770" } }, { "category": "service_pack", "name": "15.0(2)SE7", "product": { "name": "15.0(2)SE7", "product_id": "CSAFPID-204097" } }, { "category": "service_pack", "name": "15.0(2)SE8", "product": { "name": "15.0(2)SE8", "product_id": "CSAFPID-209028" } }, { "category": "service_pack", "name": "15.0(2)SE9", "product": { "name": "15.0(2)SE9", "product_id": "CSAFPID-209029" } }, { "category": "service_pack", "name": "15.0(2)SE10", "product": { "name": "15.0(2)SE10", "product_id": "CSAFPID-213788" } }, { "category": "service_pack", "name": "15.0(2)SE11", "product": { "name": "15.0(2)SE11", "product_id": "CSAFPID-220466" } }, { "category": "service_pack", "name": "15.0(2)SE10a", "product": { "name": "15.0(2)SE10a", "product_id": "CSAFPID-222342" } }, { "category": "service_pack", "name": "15.0(2)SE12", "product": { "name": "15.0(2)SE12", "product_id": "CSAFPID-234926" } }, { "category": "service_pack", "name": "15.0(2)SE13", "product": { "name": "15.0(2)SE13", "product_id": "CSAFPID-245380" } }, { "category": "service_pack", "name": "15.0(2)SE13a", "product": { "name": "15.0(2)SE13a", "product_id": "CSAFPID-274199" } }, { "category": "service_pack", "name": "15.0(2)SE13b", "product": { "name": "15.0(2)SE13b", "product_id": "CSAFPID-280778" } }, { "category": "service_pack", "name": "15.0(2)SE13c", "product": { "name": "15.0(2)SE13c", "product_id": "CSAFPID-286843" } } ], "category": "product_version", "name": "15.0SE" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SG11a", "product": { "name": "15.0(2)SG11a", "product_id": "CSAFPID-262335" } } ], "category": "product_version", "name": "15.0SG" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)EX", "product": { "name": "15.0(1)EX", "product_id": "CSAFPID-109442" } }, { "category": "service_pack", "name": "15.0(2)EX2", "product": { "name": "15.0(2)EX2", "product_id": "CSAFPID-192910" } }, { "category": "service_pack", "name": "15.0(2)EX8", "product": { "name": "15.0(2)EX8", "product_id": "CSAFPID-204831" } }, { "category": "service_pack", "name": "15.0(2)EX10", "product": { "name": "15.0(2)EX10", "product_id": "CSAFPID-211570" } }, { "category": "service_pack", "name": "15.0(2)EX11", "product": { "name": "15.0(2)EX11", "product_id": "CSAFPID-214797" } }, { "category": "service_pack", "name": "15.0(2)EX13", "product": { "name": "15.0(2)EX13", "product_id": "CSAFPID-225160" } }, { "category": "service_pack", "name": "15.0(2)EX12", "product": { "name": "15.0(2)EX12", "product_id": "CSAFPID-230965" } } ], "category": "product_version", "name": "15.0EX" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EA", "product": { "name": "15.0(2)EA", "product_id": "CSAFPID-117282" } }, { "category": "service_pack", "name": "15.0(2)EA1", "product": { "name": "15.0(2)EA1", "product_id": "CSAFPID-193033" } } ], "category": "product_version", "name": "15.0EA" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)E", "product": { "name": "15.2(2)E", "product_id": "CSAFPID-187057" } }, { "category": "service_pack", "name": "15.2(2)E1", "product": { "name": "15.2(2)E1", "product_id": "CSAFPID-201074" } }, { "category": "service_pack", "name": "15.2(2b)E", "product": { "name": "15.2(2b)E", "product_id": "CSAFPID-204102" } }, { "category": "service_pack", "name": "15.2(3)E1", "product": { "name": "15.2(3)E1", "product_id": "CSAFPID-204186" } }, { "category": "service_pack", "name": "15.2(2)E2", "product": { "name": "15.2(2)E2", "product_id": "CSAFPID-204228" } }, { "category": "service_pack", "name": "15.2(2)E3", "product": { "name": "15.2(2)E3", "product_id": "CSAFPID-205672" } }, { "category": "service_pack", "name": "15.2(2a)E2", "product": { "name": "15.2(2a)E2", "product_id": "CSAFPID-209045" } }, { "category": "service_pack", "name": "15.2(3)E2", "product": { "name": "15.2(3)E2", "product_id": "CSAFPID-209046" } }, { "category": "service_pack", "name": "15.2(3a)E", "product": { "name": "15.2(3a)E", "product_id": "CSAFPID-209047" } }, { "category": "service_pack", "name": "15.2(3)E3", "product": { "name": "15.2(3)E3", "product_id": "CSAFPID-209358" } }, { "category": "service_pack", "name": "15.2(3m)E2", "product": { "name": "15.2(3m)E2", "product_id": "CSAFPID-209359" } }, { "category": "service_pack", "name": "15.2(2)E4", "product": { "name": "15.2(2)E4", "product_id": "CSAFPID-210766" } }, { "category": "service_pack", "name": "15.2(2)E5", "product": { "name": "15.2(2)E5", "product_id": "CSAFPID-211296" } }, { "category": "service_pack", "name": "15.2(4m)E1", "product": { "name": "15.2(4m)E1", "product_id": "CSAFPID-214072" } }, { "category": "service_pack", "name": "15.2(3)E4", "product": { "name": "15.2(3)E4", "product_id": "CSAFPID-214078" } }, { "category": "service_pack", "name": "15.2(5)E", "product": { "name": "15.2(5)E", "product_id": "CSAFPID-214556" } }, { "category": "service_pack", "name": "15.2(3m)E7", "product": { "name": "15.2(3m)E7", "product_id": "CSAFPID-216295" } }, { "category": "service_pack", "name": "15.2(2)E6", "product": { "name": "15.2(2)E6", "product_id": "CSAFPID-218891" } }, { "category": "service_pack", "name": "15.2(5)E1", "product": { "name": "15.2(5)E1", "product_id": "CSAFPID-220441" } }, { "category": "service_pack", "name": "15.2(4m)E3", "product": { "name": "15.2(4m)E3", "product_id": "CSAFPID-220664" } }, { "category": "service_pack", "name": "15.2(3m)E8", "product": { "name": "15.2(3m)E8", "product_id": "CSAFPID-220689" } }, { "category": "service_pack", "name": "15.2(2)E5a", "product": { "name": "15.2(2)E5a", "product_id": "CSAFPID-221033" } }, { "category": "service_pack", "name": "15.2(2)E5b", "product": { "name": "15.2(2)E5b", "product_id": "CSAFPID-222436" } }, { "category": "service_pack", "name": "15.2(4n)E2", "product": { "name": "15.2(4n)E2", "product_id": "CSAFPID-222500" } }, { "category": "service_pack", "name": "15.2(4o)E2", "product": { "name": "15.2(4o)E2", "product_id": "CSAFPID-222924" } }, { "category": "service_pack", "name": "15.2(5a)E1", "product": { "name": "15.2(5a)E1", "product_id": "CSAFPID-223143" } }, { "category": "service_pack", "name": "15.2(2)E7", "product": { "name": "15.2(2)E7", "product_id": "CSAFPID-224868" } }, { "category": "service_pack", "name": "15.2(5)E2", "product": { "name": "15.2(5)E2", "product_id": "CSAFPID-225740" } }, { "category": "service_pack", "name": "15.2(4p)E1", "product": { "name": "15.2(4p)E1", "product_id": "CSAFPID-226077" } }, { "category": "service_pack", "name": "15.2(6)E", "product": { "name": "15.2(6)E", "product_id": "CSAFPID-227598" } }, { "category": "service_pack", "name": "15.2(5)E2c", "product": { "name": "15.2(5)E2c", "product_id": "CSAFPID-228151" } }, { "category": "service_pack", "name": "15.2(2)E8", "product": { "name": "15.2(2)E8", "product_id": "CSAFPID-230587" } }, { "category": "service_pack", "name": "15.2(4m)E2", "product": { "name": "15.2(4m)E2", "product_id": "CSAFPID-230588" } }, { "category": "service_pack", "name": "15.2(4o)E3", "product": { "name": "15.2(4o)E3", "product_id": "CSAFPID-230589" } }, { "category": "service_pack", "name": "15.2(4q)E1", "product": { "name": "15.2(4q)E1", "product_id": "CSAFPID-230590" } }, { "category": "service_pack", "name": "15.2(6)E0a", "product": { "name": "15.2(6)E0a", "product_id": "CSAFPID-230591" } }, { "category": "service_pack", "name": "15.2(6)E1", "product": { "name": "15.2(6)E1", "product_id": "CSAFPID-230592" } }, { "category": "service_pack", "name": "15.2(6)E0c", "product": { "name": "15.2(6)E0c", "product_id": "CSAFPID-231245" } }, { "category": "service_pack", "name": "15.2(2)E9", "product": { "name": "15.2(2)E9", "product_id": "CSAFPID-232765" } }, { "category": "service_pack", "name": "15.2(6)E1a", "product": { "name": "15.2(6)E1a", "product_id": "CSAFPID-238999" } }, { "category": "service_pack", "name": "15.2(6)E1s", "product": { "name": "15.2(6)E1s", "product_id": "CSAFPID-240186" } }, { "category": "service_pack", "name": "15.2(4s)E1", "product": { "name": "15.2(4s)E1", "product_id": "CSAFPID-241916" } }, { "category": "service_pack", "name": "15.2(7)E", "product": { "name": "15.2(7)E", "product_id": "CSAFPID-242313" } }, { "category": "service_pack", "name": "15.2(2)E10", "product": { "name": "15.2(2)E10", "product_id": "CSAFPID-244911" } }, { "category": "service_pack", "name": "15.2(6)E2a", "product": { "name": "15.2(6)E2a", "product_id": "CSAFPID-247630" } }, { "category": "service_pack", "name": "15.2(7)E0b", "product": { "name": "15.2(7)E0b", "product_id": "CSAFPID-260993" } }, { "category": "service_pack", "name": "15.2(7)E0s", "product": { "name": "15.2(7)E0s", "product_id": "CSAFPID-262300" } }, { "category": "service_pack", "name": "15.2(6)E3", "product": { "name": "15.2(6)E3", "product_id": "CSAFPID-262684" } }, { "category": "service_pack", "name": "15.2(2)E10a", "product": { "name": "15.2(2)E10a", "product_id": "CSAFPID-263981" } }, { "category": "service_pack", "name": "15.2(4)E9", "product": { "name": "15.2(4)E9", "product_id": "CSAFPID-264643" } }, { "category": "service_pack", "name": "15.2(7a)E0b", "product": { "name": "15.2(7a)E0b", "product_id": "CSAFPID-271140" } }, { "category": "service_pack", "name": "15.2(4)E10", "product": { "name": "15.2(4)E10", "product_id": "CSAFPID-271286" } }, { "category": "service_pack", "name": "15.2(7b)E0b", "product": { "name": "15.2(7b)E0b", "product_id": "CSAFPID-276903" } }, { "category": "service_pack", "name": "15.2(4)E10a", "product": { "name": "15.2(4)E10a", "product_id": "CSAFPID-278029" } }, { "category": "service_pack", "name": "15.2(4)E10b", "product": { "name": "15.2(4)E10b", "product_id": "CSAFPID-280779" } }, { "category": "service_pack", "name": "15.2(4)E10c", "product": { "name": "15.2(4)E10c", "product_id": "CSAFPID-284349" } }, { "category": "service_pack", "name": "15.2(2)E10b", "product": { "name": "15.2(2)E10b", "product_id": "CSAFPID-284567" } }, { "category": "service_pack", "name": "15.2(4)E10d", "product": { "name": "15.2(4)E10d", "product_id": "CSAFPID-286452" } }, { "category": "service_pack", "name": "15.2(2)E10c", "product": { "name": "15.2(2)E10c", "product_id": "CSAFPID-286860" } } ], "category": "product_version", "name": "15.2E" }, { "branches": [ { "category": "service_pack", "name": "15.2(1)EY", "product": { "name": "15.2(1)EY", "product_id": "CSAFPID-191928" } } ], "category": "product_version", "name": "15.2EY" }, { "branches": [ { "category": "service_pack", "name": "15.2(4)JAZ", "product": { "name": "15.2(4)JAZ", "product_id": "CSAFPID-195528" } }, { "category": "service_pack", "name": "15.2(4)JAZ1", "product": { "name": "15.2(4)JAZ1", "product_id": "CSAFPID-200503" } } ], "category": "product_version", "name": "15.2JAZ" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EK", "product": { "name": "15.0(2)EK", "product_id": "CSAFPID-195544" } }, { "category": "service_pack", "name": "15.0(2)EK1", "product": { "name": "15.0(2)EK1", "product_id": "CSAFPID-197468" } } ], "category": "product_version", "name": "15.0EK" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)EB", "product": { "name": "15.2(2)EB", "product_id": "CSAFPID-197462" } }, { "category": "service_pack", "name": "15.2(2)EB1", "product": { "name": "15.2(2)EB1", "product_id": "CSAFPID-209839" } }, { "category": "service_pack", "name": "15.2(2)EB2", "product": { "name": "15.2(2)EB2", "product_id": "CSAFPID-214218" } }, { "category": "service_pack", "name": "15.2(6)EB", "product": { "name": "15.2(6)EB", "product_id": "CSAFPID-251487" } } ], "category": "product_version", "name": "15.2EB" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)EA", "product": { "name": "15.2(2)EA", "product_id": "CSAFPID-198063" } }, { "category": "service_pack", "name": "15.2(2)EA1", "product": { "name": "15.2(2)EA1", "product_id": "CSAFPID-209049" } }, { "category": "service_pack", "name": "15.2(2)EA2", "product": { "name": "15.2(2)EA2", "product_id": "CSAFPID-209050" } }, { "category": "service_pack", "name": "15.2(3)EA", "product": { "name": "15.2(3)EA", "product_id": "CSAFPID-209051" } }, { "category": "service_pack", "name": "15.2(4)EA", "product": { "name": "15.2(4)EA", "product_id": "CSAFPID-210203" } }, { "category": "service_pack", "name": "15.2(4)EA1", "product": { "name": "15.2(4)EA1", "product_id": "CSAFPID-210958" } }, { "category": "service_pack", "name": "15.2(2)EA3", "product": { "name": "15.2(2)EA3", "product_id": "CSAFPID-214217" } }, { "category": "service_pack", "name": "15.2(4)EA3", "product": { "name": "15.2(4)EA3", "product_id": "CSAFPID-214965" } }, { "category": "service_pack", "name": "15.2(5)EA", "product": { "name": "15.2(5)EA", "product_id": "CSAFPID-220038" } }, { "category": "service_pack", "name": "15.2(4)EA4", "product": { "name": "15.2(4)EA4", "product_id": "CSAFPID-220460" } }, { "category": "service_pack", "name": "15.2(4)EA2", "product": { "name": "15.2(4)EA2", "product_id": "CSAFPID-220507" } }, { "category": "service_pack", "name": "15.2(4)EA5", "product": { "name": "15.2(4)EA5", "product_id": "CSAFPID-222419" } }, { "category": "service_pack", "name": "15.2(4)EA6", "product": { "name": "15.2(4)EA6", "product_id": "CSAFPID-228075" } }, { "category": "service_pack", "name": "15.2(4)EA7", "product": { "name": "15.2(4)EA7", "product_id": "CSAFPID-230992" } }, { "category": "service_pack", "name": "15.2(4)EA8", "product": { "name": "15.2(4)EA8", "product_id": "CSAFPID-241614" } }, { "category": "service_pack", "name": "15.2(4)EA9", "product": { "name": "15.2(4)EA9", "product_id": "CSAFPID-257830" } } ], "category": "product_version", "name": "15.2EA" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JN", "product": { "name": "15.3(3)JN", "product_id": "CSAFPID-200492" } }, { "category": "service_pack", "name": "15.3(3)JN1", "product": { "name": "15.3(3)JN1", "product_id": "CSAFPID-209083" } }, { "category": "service_pack", "name": "15.3(3)JN2", "product": { "name": "15.3(3)JN2", "product_id": "CSAFPID-209085" } }, { "category": "service_pack", "name": "15.3(3)JN3", "product": { "name": "15.3(3)JN3", "product_id": "CSAFPID-209086" } }, { "category": "service_pack", "name": "15.3(3)JN4", "product": { "name": "15.3(3)JN4", "product_id": "CSAFPID-209087" } }, { "category": "service_pack", "name": "15.3(3)JN6", "product": { "name": "15.3(3)JN6", "product_id": "CSAFPID-209930" } }, { "category": "service_pack", "name": "15.3(3)JN7", "product": { "name": "15.3(3)JN7", "product_id": "CSAFPID-209935" } }, { "category": "service_pack", "name": "15.3(3)JN8", "product": { "name": "15.3(3)JN8", "product_id": "CSAFPID-210410" } }, { "category": "service_pack", "name": "15.3(3)JN9", "product": { "name": "15.3(3)JN9", "product_id": "CSAFPID-213654" } }, { "category": "service_pack", "name": "15.3(3)JN11", "product": { "name": "15.3(3)JN11", "product_id": "CSAFPID-222537" } }, { "category": "service_pack", "name": "15.3(3)JN13", "product": { "name": "15.3(3)JN13", "product_id": "CSAFPID-230915" } }, { "category": "service_pack", "name": "15.3(3)JN14", "product": { "name": "15.3(3)JN14", "product_id": "CSAFPID-232122" } }, { "category": "service_pack", "name": "15.3(3)JN15", "product": { "name": "15.3(3)JN15", "product_id": "CSAFPID-239279" } } ], "category": "product_version", "name": "15.3JN" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JA1n", "product": { "name": "15.3(3)JA1n", "product_id": "CSAFPID-204310" } }, { "category": "service_pack", "name": "15.3(3)JA1", "product": { "name": "15.3(3)JA1", "product_id": "CSAFPID-204826" } }, { "category": "service_pack", "name": "15.3(3)JA4", "product": { "name": "15.3(3)JA4", "product_id": "CSAFPID-209067" } }, { "category": "service_pack", "name": "15.3(3)JA5", "product": { "name": "15.3(3)JA5", "product_id": "CSAFPID-209068" } }, { "category": "service_pack", "name": "15.3(3)JA6", "product": { "name": "15.3(3)JA6", "product_id": "CSAFPID-210937" } }, { "category": "service_pack", "name": "15.3(3)JA7", "product": { "name": "15.3(3)JA7", "product_id": "CSAFPID-214382" } }, { "category": "service_pack", "name": "15.3(3)JA8", "product": { "name": "15.3(3)JA8", "product_id": "CSAFPID-214764" } }, { "category": "service_pack", "name": "15.3(3)JA10", "product": { "name": "15.3(3)JA10", "product_id": "CSAFPID-217779" } }, { "category": "service_pack", "name": "15.3(3)JA11", "product": { "name": "15.3(3)JA11", "product_id": "CSAFPID-226174" } }, { "category": "service_pack", "name": "15.3(3)JA12", "product": { "name": "15.3(3)JA12", "product_id": "CSAFPID-230712" } } ], "category": "product_version", "name": "15.3JA" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JAA", "product": { "name": "15.3(3)JAA", "product_id": "CSAFPID-204103" } }, { "category": "service_pack", "name": "15.3(3)JAA1", "product": { "name": "15.3(3)JAA1", "product_id": "CSAFPID-230594" } } ], "category": "product_version", "name": "15.3JAA" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JB", "product": { "name": "15.3(3)JB", "product_id": "CSAFPID-209077" } } ], "category": "product_version", "name": "15.3JB" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SQD", "product": { "name": "15.0(2)SQD", "product_id": "CSAFPID-204324" } }, { "category": "service_pack", "name": "15.0(2)SQD1", "product": { "name": "15.0(2)SQD1", "product_id": "CSAFPID-209628" } }, { "category": "service_pack", "name": "15.0(2)SQD2", "product": { "name": "15.0(2)SQD2", "product_id": "CSAFPID-211290" } }, { "category": "service_pack", "name": "15.0(2)SQD3", "product": { "name": "15.0(2)SQD3", "product_id": "CSAFPID-217078" } }, { "category": "service_pack", "name": "15.0(2)SQD4", "product": { "name": "15.0(2)SQD4", "product_id": "CSAFPID-220670" } }, { "category": "service_pack", "name": "15.0(2)SQD5", "product": { "name": "15.0(2)SQD5", "product_id": "CSAFPID-225358" } }, { "category": "service_pack", "name": "15.0(2)SQD6", "product": { "name": "15.0(2)SQD6", "product_id": "CSAFPID-226038" } }, { "category": "service_pack", "name": "15.0(2)SQD7", "product": { "name": "15.0(2)SQD7", "product_id": "CSAFPID-227364" } }, { "category": "service_pack", "name": "15.0(2)SQD8", "product": { "name": "15.0(2)SQD8", "product_id": "CSAFPID-232850" } } ], "category": "product_version", "name": "15.0SQD" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JNB", "product": { "name": "15.3(3)JNB", "product_id": "CSAFPID-205723" } }, { "category": "service_pack", "name": "15.3(3)JNB1", "product": { "name": "15.3(3)JNB1", "product_id": "CSAFPID-209089" } }, { "category": "service_pack", "name": "15.3(3)JNB2", "product": { "name": "15.3(3)JNB2", "product_id": "CSAFPID-209090" } }, { "category": "service_pack", "name": "15.3(3)JNB3", "product": { "name": "15.3(3)JNB3", "product_id": "CSAFPID-210411" } }, { "category": "service_pack", "name": "15.3(3)JNB4", "product": { "name": "15.3(3)JNB4", "product_id": "CSAFPID-213655" } }, { "category": "service_pack", "name": "15.3(3)JNB6", "product": { "name": "15.3(3)JNB6", "product_id": "CSAFPID-224738" } }, { "category": "service_pack", "name": "15.3(3)JNB5", "product": { "name": "15.3(3)JNB5", "product_id": "CSAFPID-230606" } } ], "category": "product_version", "name": "15.3JNB" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JAX", "product": { "name": "15.3(3)JAX", "product_id": "CSAFPID-209073" } }, { "category": "service_pack", "name": "15.3(3)JAX1", "product": { "name": "15.3(3)JAX1", "product_id": "CSAFPID-209074" } }, { "category": "service_pack", "name": "15.3(3)JAX2", "product": { "name": "15.3(3)JAX2", "product_id": "CSAFPID-209075" } } ], "category": "product_version", "name": "15.3JAX" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JBB", "product": { "name": "15.3(3)JBB", "product_id": "CSAFPID-209080" } }, { "category": "service_pack", "name": "15.3(3)JBB1", "product": { "name": "15.3(3)JBB1", "product_id": "CSAFPID-209081" } }, { "category": "service_pack", "name": "15.3(3)JBB2", "product": { "name": "15.3(3)JBB2", "product_id": "CSAFPID-209419" } }, { "category": "service_pack", "name": "15.3(3)JBB4", "product": { "name": "15.3(3)JBB4", "product_id": "CSAFPID-210189" } }, { "category": "service_pack", "name": "15.3(3)JBB5", "product": { "name": "15.3(3)JBB5", "product_id": "CSAFPID-210262" } }, { "category": "service_pack", "name": "15.3(3)JBB6", "product": { "name": "15.3(3)JBB6", "product_id": "CSAFPID-210491" } }, { "category": "service_pack", "name": "15.3(3)JBB8", "product": { "name": "15.3(3)JBB8", "product_id": "CSAFPID-212266" } }, { "category": "service_pack", "name": "15.3(3)JBB6a", "product": { "name": "15.3(3)JBB6a", "product_id": "CSAFPID-213770" } } ], "category": "product_version", "name": "15.3JBB" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JC", "product": { "name": "15.3(3)JC", "product_id": "CSAFPID-209474" } }, { "category": "service_pack", "name": "15.3(3)JC1", "product": { "name": "15.3(3)JC1", "product_id": "CSAFPID-213089" } }, { "category": "service_pack", "name": "15.3(3)JC2", "product": { "name": "15.3(3)JC2", "product_id": "CSAFPID-216573" } }, { "category": "service_pack", "name": "15.3(3)JC3", "product": { "name": "15.3(3)JC3", "product_id": "CSAFPID-217803" } }, { "category": "service_pack", "name": "15.3(3)JC4", "product": { "name": "15.3(3)JC4", "product_id": "CSAFPID-220446" } }, { "category": "service_pack", "name": "15.3(3)JC5", "product": { "name": "15.3(3)JC5", "product_id": "CSAFPID-222258" } }, { "category": "service_pack", "name": "15.3(3)JC6", "product": { "name": "15.3(3)JC6", "product_id": "CSAFPID-224442" } }, { "category": "service_pack", "name": "15.3(3)JC8", "product": { "name": "15.3(3)JC8", "product_id": "CSAFPID-227791" } }, { "category": "service_pack", "name": "15.3(3)JC9", "product": { "name": "15.3(3)JC9", "product_id": "CSAFPID-230596" } }, { "category": "service_pack", "name": "15.3(3)JC14", "product": { "name": "15.3(3)JC14", "product_id": "CSAFPID-231017" } } ], "category": "product_version", "name": "15.3JC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JNC", "product": { "name": "15.3(3)JNC", "product_id": "CSAFPID-210137" } }, { "category": "service_pack", "name": "15.3(3)JNC1", "product": { "name": "15.3(3)JNC1", "product_id": "CSAFPID-212497" } }, { "category": "service_pack", "name": "15.3(3)JNC2", "product": { "name": "15.3(3)JNC2", "product_id": "CSAFPID-216632" } }, { "category": "service_pack", "name": "15.3(3)JNC3", "product": { "name": "15.3(3)JNC3", "product_id": "CSAFPID-222412" } }, { "category": "service_pack", "name": "15.3(3)JNC4", "product": { "name": "15.3(3)JNC4", "product_id": "CSAFPID-225662" } } ], "category": "product_version", "name": "15.3JNC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JNP", "product": { "name": "15.3(3)JNP", "product_id": "CSAFPID-211256" } }, { "category": "service_pack", "name": "15.3(3)JNP1", "product": { "name": "15.3(3)JNP1", "product_id": "CSAFPID-212686" } }, { "category": "service_pack", "name": "15.3(3)JNP3", "product": { "name": "15.3(3)JNP3", "product_id": "CSAFPID-220657" } } ], "category": "product_version", "name": "15.3JNP" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPB", "product": { "name": "15.3(3)JPB", "product_id": "CSAFPID-213843" } }, { "category": "service_pack", "name": "15.3(3)JPB1", "product": { "name": "15.3(3)JPB1", "product_id": "CSAFPID-216277" } } ], "category": "product_version", "name": "15.3JPB" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JD", "product": { "name": "15.3(3)JD", "product_id": "CSAFPID-213954" } }, { "category": "service_pack", "name": "15.3(3)JD2", "product": { "name": "15.3(3)JD2", "product_id": "CSAFPID-222630" } }, { "category": "service_pack", "name": "15.3(3)JD3", "product": { "name": "15.3(3)JD3", "product_id": "CSAFPID-222716" } }, { "category": "service_pack", "name": "15.3(3)JD4", "product": { "name": "15.3(3)JD4", "product_id": "CSAFPID-225790" } }, { "category": "service_pack", "name": "15.3(3)JD5", "product": { "name": "15.3(3)JD5", "product_id": "CSAFPID-226172" } }, { "category": "service_pack", "name": "15.3(3)JD6", "product": { "name": "15.3(3)JD6", "product_id": "CSAFPID-227789" } }, { "category": "service_pack", "name": "15.3(3)JD7", "product": { "name": "15.3(3)JD7", "product_id": "CSAFPID-228955" } }, { "category": "service_pack", "name": "15.3(3)JD8", "product": { "name": "15.3(3)JD8", "product_id": "CSAFPID-230598" } }, { "category": "service_pack", "name": "15.3(3)JD9", "product": { "name": "15.3(3)JD9", "product_id": "CSAFPID-230824" } }, { "category": "service_pack", "name": "15.3(3)JD11", "product": { "name": "15.3(3)JD11", "product_id": "CSAFPID-231000" } }, { "category": "service_pack", "name": "15.3(3)JD12", "product": { "name": "15.3(3)JD12", "product_id": "CSAFPID-231001" } }, { "category": "service_pack", "name": "15.3(3)JD13", "product": { "name": "15.3(3)JD13", "product_id": "CSAFPID-232852" } }, { "category": "service_pack", "name": "15.3(3)JD14", "product": { "name": "15.3(3)JD14", "product_id": "CSAFPID-234115" } }, { "category": "service_pack", "name": "15.3(3)JD16", "product": { "name": "15.3(3)JD16", "product_id": "CSAFPID-239225" } }, { "category": "service_pack", "name": "15.3(3)JD17", "product": { "name": "15.3(3)JD17", "product_id": "CSAFPID-259985" } } ], "category": "product_version", "name": "15.3JD" }, { "branches": [ { "category": "service_pack", "name": "15.2(4)EC1", "product": { "name": "15.2(4)EC1", "product_id": "CSAFPID-220461" } }, { "category": "service_pack", "name": "15.2(4)EC2", "product": { "name": "15.2(4)EC2", "product_id": "CSAFPID-223086" } } ], "category": "product_version", "name": "15.2EC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPC", "product": { "name": "15.3(3)JPC", "product_id": "CSAFPID-217048" } }, { "category": "service_pack", "name": "15.3(3)JPC1", "product": { "name": "15.3(3)JPC1", "product_id": "CSAFPID-220235" } }, { "category": "service_pack", "name": "15.3(3)JPC2", "product": { "name": "15.3(3)JPC2", "product_id": "CSAFPID-220658" } }, { "category": "service_pack", "name": "15.3(3)JPC3", "product": { "name": "15.3(3)JPC3", "product_id": "CSAFPID-225167" } }, { "category": "service_pack", "name": "15.3(3)JPC100", "product": { "name": "15.3(3)JPC100", "product_id": "CSAFPID-230994" } }, { "category": "service_pack", "name": "15.3(3)JPC5", "product": { "name": "15.3(3)JPC5", "product_id": "CSAFPID-230995" } }, { "category": "service_pack", "name": "15.3(3)JPC99", "product": { "name": "15.3(3)JPC99", "product_id": "CSAFPID-273510" } }, { "category": "service_pack", "name": "15.3(3)JPC97", "product": { "name": "15.3(3)JPC97", "product_id": "CSAFPID-278403" } } ], "category": "product_version", "name": "15.3JPC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JND", "product": { "name": "15.3(3)JND", "product_id": "CSAFPID-217194" } }, { "category": "service_pack", "name": "15.3(3)JND1", "product": { "name": "15.3(3)JND1", "product_id": "CSAFPID-222930" } }, { "category": "service_pack", "name": "15.3(3)JND2", "product": { "name": "15.3(3)JND2", "product_id": "CSAFPID-226202" } }, { "category": "service_pack", "name": "15.3(3)JND3", "product": { "name": "15.3(3)JND3", "product_id": "CSAFPID-227960" } } ], "category": "product_version", "name": "15.3JND" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JE", "product": { "name": "15.3(3)JE", "product_id": "CSAFPID-218946" } } ], "category": "product_version", "name": "15.3JE" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPD", "product": { "name": "15.3(3)JPD", "product_id": "CSAFPID-218948" } } ], "category": "product_version", "name": "15.3JPD" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JF", "product": { "name": "15.3(3)JF", "product_id": "CSAFPID-227048" } }, { "category": "service_pack", "name": "15.3(3)JF1", "product": { "name": "15.3(3)JF1", "product_id": "CSAFPID-228956" } }, { "category": "service_pack", "name": "15.3(3)JF2", "product": { "name": "15.3(3)JF2", "product_id": "CSAFPID-230826" } }, { "category": "service_pack", "name": "15.3(3)JF4", "product": { "name": "15.3(3)JF4", "product_id": "CSAFPID-231679" } }, { "category": "service_pack", "name": "15.3(3)JF5", "product": { "name": "15.3(3)JF5", "product_id": "CSAFPID-232061" } }, { "category": "service_pack", "name": "15.3(3)JF6", "product": { "name": "15.3(3)JF6", "product_id": "CSAFPID-236205" } }, { "category": "service_pack", "name": "15.3(3)JF7", "product": { "name": "15.3(3)JF7", "product_id": "CSAFPID-239361" } }, { "category": "service_pack", "name": "15.3(3)JF8", "product": { "name": "15.3(3)JF8", "product_id": "CSAFPID-241765" } }, { "category": "service_pack", "name": "15.3(3)JF9", "product": { "name": "15.3(3)JF9", "product_id": "CSAFPID-243525" } }, { "category": "service_pack", "name": "15.3(3)JF10", "product": { "name": "15.3(3)JF10", "product_id": "CSAFPID-259238" } }, { "category": "service_pack", "name": "15.3(3)JF15i", "product": { "name": "15.3(3)JF15i", "product_id": "CSAFPID-284786" } } ], "category": "product_version", "name": "15.3JF" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JG", "product": { "name": "15.3(3)JG", "product_id": "CSAFPID-230603" } }, { "category": "service_pack", "name": "15.3(3)JG1", "product": { "name": "15.3(3)JG1", "product_id": "CSAFPID-231796" } } ], "category": "product_version", "name": "15.3JG" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JH", "product": { "name": "15.3(3)JH", "product_id": "CSAFPID-230605" } }, { "category": "service_pack", "name": "15.3(3)JH1", "product": { "name": "15.3(3)JH1", "product_id": "CSAFPID-238504" } } ], "category": "product_version", "name": "15.3JH" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JI1", "product": { "name": "15.3(3)JI1", "product_id": "CSAFPID-244913" } }, { "category": "service_pack", "name": "15.3(3)JI3", "product": { "name": "15.3(3)JI3", "product_id": "CSAFPID-252156" } }, { "category": "service_pack", "name": "15.3(3)JI4", "product": { "name": "15.3(3)JI4", "product_id": "CSAFPID-257209" } }, { "category": "service_pack", "name": "15.3(3)JI5", "product": { "name": "15.3(3)JI5", "product_id": "CSAFPID-260691" } } ], "category": "product_version", "name": "15.3JI" }, { "branches": [ { "category": "service_pack", "name": "12.2(6)I1", "product": { "name": "12.2(6)I1", "product_id": "CSAFPID-243144" } } ], "category": "product_version", "name": "12.2I" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JK", "product": { "name": "15.3(3)JK", "product_id": "CSAFPID-255002" } }, { "category": "service_pack", "name": "15.3(3)JK99", "product": { "name": "15.3(3)JK99", "product_id": "CSAFPID-273350" } }, { "category": "service_pack", "name": "15.3(3)JK3", "product": { "name": "15.3(3)JK3", "product_id": "CSAFPID-277339" } }, { "category": "service_pack", "name": "15.3(3)JK1a", "product": { "name": "15.3(3)JK1a", "product_id": "CSAFPID-277340" } }, { "category": "service_pack", "name": "15.3(3)JK2a", "product": { "name": "15.3(3)JK2a", "product_id": "CSAFPID-277341" } }, { "category": "service_pack", "name": "15.3(3)JK1t", "product": { "name": "15.3(3)JK1t", "product_id": "CSAFPID-277352" } }, { "category": "service_pack", "name": "15.3(3)JK6", "product": { "name": "15.3(3)JK6", "product_id": "CSAFPID-282669" } }, { "category": "service_pack", "name": "15.3(3)JK7", "product": { "name": "15.3(3)JK7", "product_id": "CSAFPID-286111" } }, { "category": "service_pack", "name": "15.3(3)JK8", "product": { "name": "15.3(3)JK8", "product_id": "CSAFPID-287121" } }, { "category": "service_pack", "name": "15.3(3)JK8a", "product": { "name": "15.3(3)JK8a", "product_id": "CSAFPID-290656" } }, { "category": "service_pack", "name": "15.3(3)JK8b", "product": { "name": "15.3(3)JK8b", "product_id": "CSAFPID-292482" } }, { "category": "service_pack", "name": "15.3(3)JK9", "product": { "name": "15.3(3)JK9", "product_id": "CSAFPID-294801" } }, { "category": "service_pack", "name": "15.3(3)JK10", "product": { "name": "15.3(3)JK10", "product_id": "CSAFPID-299944" } }, { "category": "service_pack", "name": "15.3(3)JK11", "product": { "name": "15.3(3)JK11", "product_id": "CSAFPID-301233" } } ], "category": "product_version", "name": "15.3JK" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JJ", "product": { "name": "15.3(3)JJ", "product_id": "CSAFPID-259869" } }, { "category": "service_pack", "name": "15.3(3)JJ1", "product": { "name": "15.3(3)JJ1", "product_id": "CSAFPID-261487" } } ], "category": "product_version", "name": "15.3JJ" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVR1", "product": { "name": "15.1(3)SVR1", "product_id": "CSAFPID-277230" } }, { "category": "service_pack", "name": "15.1(3)SVR2", "product": { "name": "15.1(3)SVR2", "product_id": "CSAFPID-277253" } }, { "category": "service_pack", "name": "15.1(3)SVR3", "product": { "name": "15.1(3)SVR3", "product_id": "CSAFPID-279337" } }, { "category": "service_pack", "name": "15.1(3)SVR10", "product": { "name": "15.1(3)SVR10", "product_id": "CSAFPID-290618" } } ], "category": "product_version", "name": "15.1SVR" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPI", "product": { "name": "15.3(3)JPI", "product_id": "CSAFPID-274202" } }, { "category": "service_pack", "name": "15.3(3)JPI3", "product": { "name": "15.3(3)JPI3", "product_id": "CSAFPID-274203" } }, { "category": "service_pack", "name": "15.3(3)JPI7", "product": { "name": "15.3(3)JPI7", "product_id": "CSAFPID-278804" } }, { "category": "service_pack", "name": "15.3(3)JPI6a", "product": { "name": "15.3(3)JPI6a", "product_id": "CSAFPID-278884" } }, { "category": "service_pack", "name": "15.3(3)JPI8a", "product": { "name": "15.3(3)JPI8a", "product_id": "CSAFPID-285319" } }, { "category": "service_pack", "name": "15.3(3)JPI9", "product": { "name": "15.3(3)JPI9", "product_id": "CSAFPID-285320" } }, { "category": "service_pack", "name": "15.3(3)JPI10", "product": { "name": "15.3(3)JPI10", "product_id": "CSAFPID-286520" } } ], "category": "product_version", "name": "15.3JPI" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPJ", "product": { "name": "15.3(3)JPJ", "product_id": "CSAFPID-275845" } }, { "category": "service_pack", "name": "15.3(3)JPJ2t", "product": { "name": "15.3(3)JPJ2t", "product_id": "CSAFPID-277354" } }, { "category": "service_pack", "name": "15.3(3)JPJ3a", "product": { "name": "15.3(3)JPJ3a", "product_id": "CSAFPID-277355" } }, { "category": "service_pack", "name": "15.3(3)JPJ4", "product": { "name": "15.3(3)JPJ4", "product_id": "CSAFPID-278880" } }, { "category": "service_pack", "name": "15.3(3)JPJ5", "product": { "name": "15.3(3)JPJ5", "product_id": "CSAFPID-280472" } }, { "category": "service_pack", "name": "15.3(3)JPJ6", "product": { "name": "15.3(3)JPJ6", "product_id": "CSAFPID-280832" } }, { "category": "service_pack", "name": "15.3(3)JPJ7", "product": { "name": "15.3(3)JPJ7", "product_id": "CSAFPID-282651" } }, { "category": "service_pack", "name": "15.3(3)JPJ7c", "product": { "name": "15.3(3)JPJ7c", "product_id": "CSAFPID-285321" } }, { "category": "service_pack", "name": "15.3(3)JPJ8a", "product": { "name": "15.3(3)JPJ8a", "product_id": "CSAFPID-286497" } }, { "category": "service_pack", "name": "15.3(3)JPJ9", "product": { "name": "15.3(3)JPJ9", "product_id": "CSAFPID-290465" } }, { "category": "service_pack", "name": "15.3(3)JPJ10", "product": { "name": "15.3(3)JPJ10", "product_id": "CSAFPID-292769" } }, { "category": "service_pack", "name": "15.3(3)JPJ11", "product": { "name": "15.3(3)JPJ11", "product_id": "CSAFPID-299941" } } ], "category": "product_version", "name": "15.3JPJ" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVS", "product": { "name": "15.1(3)SVS", "product_id": "CSAFPID-277232" } }, { "category": "service_pack", "name": "15.1(3)SVS1", "product": { "name": "15.1(3)SVS1", "product_id": "CSAFPID-279335" } } ], "category": "product_version", "name": "15.1SVS" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPK", "product": { "name": "15.3(3)JPK", "product_id": "CSAFPID-280661" } }, { "category": "service_pack", "name": "15.3(3)JPK1", "product": { "name": "15.3(3)JPK1", "product_id": "CSAFPID-280833" } }, { "category": "service_pack", "name": "15.3(3)JPK2", "product": { "name": "15.3(3)JPK2", "product_id": "CSAFPID-282027" } }, { "category": "service_pack", "name": "15.3(3)JPK3", "product": { "name": "15.3(3)JPK3", "product_id": "CSAFPID-282114" } }, { "category": "service_pack", "name": "15.3(3)JPK4", "product": { "name": "15.3(3)JPK4", "product_id": "CSAFPID-286030" } }, { "category": "service_pack", "name": "15.3(3)JPK5", "product": { "name": "15.3(3)JPK5", "product_id": "CSAFPID-286559" } }, { "category": "service_pack", "name": "15.3(3)JPK6", "product": { "name": "15.3(3)JPK6", "product_id": "CSAFPID-289303" } }, { "category": "service_pack", "name": "15.3(3)JPK7", "product": { "name": "15.3(3)JPK7", "product_id": "CSAFPID-292655" } }, { "category": "service_pack", "name": "15.3(3)JPK8", "product": { "name": "15.3(3)JPK8", "product_id": "CSAFPID-300783" } }, { "category": "service_pack", "name": "15.3(3)JPK9", "product": { "name": "15.3(3)JPK9", "product_id": "CSAFPID-301579" } } ], "category": "product_version", "name": "15.3JPK" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVT1", "product": { "name": "15.1(3)SVT1", "product_id": "CSAFPID-280759" } }, { "category": "service_pack", "name": "15.1(3)SVT2", "product": { "name": "15.1(3)SVT2", "product_id": "CSAFPID-282026" } }, { "category": "service_pack", "name": "15.1(3)SVT3", "product": { "name": "15.1(3)SVT3", "product_id": "CSAFPID-284785" } }, { "category": "service_pack", "name": "15.1(3)SVT4", "product": { "name": "15.1(3)SVT4", "product_id": "CSAFPID-286399" } } ], "category": "product_version", "name": "15.1SVT" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVU1", "product": { "name": "15.1(3)SVU1", "product_id": "CSAFPID-283833" } }, { "category": "service_pack", "name": "15.1(3)SVU10", "product": { "name": "15.1(3)SVU10", "product_id": "CSAFPID-284291" } }, { "category": "service_pack", "name": "15.1(3)SVU2", "product": { "name": "15.1(3)SVU2", "product_id": "CSAFPID-284566" } }, { "category": "service_pack", "name": "15.1(3)SVU11", "product": { "name": "15.1(3)SVU11", "product_id": "CSAFPID-286400" } }, { "category": "service_pack", "name": "15.1(3)SVU20", "product": { "name": "15.1(3)SVU20", "product_id": "CSAFPID-289270" } }, { "category": "service_pack", "name": "15.1(3)SVU21", "product": { "name": "15.1(3)SVU21", "product_id": "CSAFPID-290557" } } ], "category": "product_version", "name": "15.1SVU" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVV1", "product": { "name": "15.1(3)SVV1", "product_id": "CSAFPID-284341" } }, { "category": "service_pack", "name": "15.1(3)SVV2", "product": { "name": "15.1(3)SVV2", "product_id": "CSAFPID-286029" } }, { "category": "service_pack", "name": "15.1(3)SVV3", "product": { "name": "15.1(3)SVV3", "product_id": "CSAFPID-286940" } }, { "category": "service_pack", "name": "15.1(3)SVV4", "product": { "name": "15.1(3)SVV4", "product_id": "CSAFPID-289371" } } ], "category": "product_version", "name": "15.1SVV" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPL", "product": { "name": "15.3(3)JPL", "product_id": "CSAFPID-285323" } } ], "category": "product_version", "name": "15.3JPL" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPM", "product": { "name": "15.3(3)JPM", "product_id": "CSAFPID-286352" } } ], "category": "product_version", "name": "15.3JPM" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVW", "product": { "name": "15.1(3)SVW", "product_id": "CSAFPID-286451" } }, { "category": "service_pack", "name": "15.1(3)SVW1", "product": { "name": "15.1(3)SVW1", "product_id": "CSAFPID-286844" } } ], "category": "product_version", "name": "15.1SVW" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVX", "product": { "name": "15.1(3)SVX", "product_id": "CSAFPID-286927" } }, { "category": "service_pack", "name": "15.1(3)SVX1", "product": { "name": "15.1(3)SVX1", "product_id": "CSAFPID-289301" } } ], "category": "product_version", "name": "15.1SVX" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPN", "product": { "name": "15.3(3)JPN", "product_id": "CSAFPID-287185" } }, { "category": "service_pack", "name": "15.3(3)JPN1", "product": { "name": "15.3(3)JPN1", "product_id": "CSAFPID-290587" } }, { "category": "service_pack", "name": "15.3(3)JPN2", "product": { "name": "15.3(3)JPN2", "product_id": "CSAFPID-292654" } }, { "category": "service_pack", "name": "15.3(3)JPN3", "product": { "name": "15.3(3)JPN3", "product_id": "CSAFPID-296664" } }, { "category": "service_pack", "name": "15.3(3)JPN4", "product": { "name": "15.3(3)JPN4", "product_id": "CSAFPID-300502" } }, { "category": "service_pack", "name": "15.3(3)JPN5", "product": { "name": "15.3(3)JPN5", "product_id": "CSAFPID-301721" } }, { "category": "service_pack", "name": "15.3(3)JPN6", "product": { "name": "15.3(3)JPN6", "product_id": "CSAFPID-302978" } } ], "category": "product_version", "name": "15.3JPN" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPO", "product": { "name": "15.3(3)JPO", "product_id": "CSAFPID-290479" } } ], "category": "product_version", "name": "15.3JPO" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPP", "product": { "name": "15.3(3)JPP", "product_id": "CSAFPID-294791" } } ], "category": "product_version", "name": "15.3JPP" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPQ", "product": { "name": "15.3(3)JPQ", "product_id": "CSAFPID-296759" } }, { "category": "service_pack", "name": "15.3(3)JPQ1", "product": { "name": "15.3(3)JPQ1", "product_id": "CSAFPID-300835" } }, { "category": "service_pack", "name": "15.3(3)JPQ2", "product": { "name": "15.3(3)JPQ2", "product_id": "CSAFPID-300949" } }, { "category": "service_pack", "name": "15.3(3)JPQ3", "product": { "name": "15.3(3)JPQ3", "product_id": "CSAFPID-301472" } }, { "category": "service_pack", "name": "15.3(3)JPQ4", "product": { "name": "15.3(3)JPQ4", "product_id": "CSAFPID-302624" } } ], "category": "product_version", "name": "15.3JPQ" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPR", "product": { "name": "15.3(3)JPR", "product_id": "CSAFPID-300837" } }, { "category": "service_pack", "name": "15.3(3)JPR1", "product": { "name": "15.3(3)JPR1", "product_id": "CSAFPID-300950" } } ], "category": "product_version", "name": "15.3JPR" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPS", "product": { "name": "15.3(3)JPS", "product_id": "CSAFPID-301223" } } ], "category": "product_version", "name": "15.3JPS" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPT", "product": { "name": "15.3(3)JPT", "product_id": "CSAFPID-301225" } }, { "category": "service_pack", "name": "15.3(3)JPT1", "product": { "name": "15.3(3)JPT1", "product_id": "CSAFPID-302781" } }, { "category": "service_pack", "name": "15.3(3)JPT2", "product": { "name": "15.3(3)JPT2", "product_id": "CSAFPID-303044" } } ], "category": "product_version", "name": "15.3JPT" } ], "category": "product_family", "name": "IOS" }, { "branches": [ { "branches": [ { "category": "service_pack", "name": "3.6.5bE", "product": { "name": "3.6.5bE", "product_id": "CSAFPID-222435" } } ], "category": "product_version", "name": "3.6E" }, { "branches": [ { "category": "service_pack", "name": "3.8.9E", "product": { "name": "3.8.9E", "product_id": "CSAFPID-264514" } }, { "category": "service_pack", "name": "3.8.10E", "product": { "name": "3.8.10E", "product_id": "CSAFPID-271633" } }, { "category": "service_pack", "name": "3.8.10cE", "product": { "name": "3.8.10cE", "product_id": "CSAFPID-284346" } }, { "category": "service_pack", "name": "3.8.10dE", "product": { "name": "3.8.10dE", "product_id": "CSAFPID-286453" } } ], "category": "product_version", "name": "3.8E" }, { "branches": [ { "category": "service_pack", "name": "16.3.9", "product": { "name": "16.3.9", "product_id": "CSAFPID-262389" } } ], "category": "product_version", "name": "16.3" }, { "branches": [ { "category": "service_pack", "name": "16.6.7", "product": { "name": "16.6.7", "product_id": "CSAFPID-261241" } }, { "category": "service_pack", "name": "16.6.7a", "product": { "name": "16.6.7a", "product_id": "CSAFPID-270097" } }, { "category": "service_pack", "name": "16.6.8", "product": { "name": "16.6.8", "product_id": "CSAFPID-277148" } }, { "category": "service_pack", "name": "16.6.9", "product": { "name": "16.6.9", "product_id": "CSAFPID-280801" } }, { "category": "service_pack", "name": "16.6.10", "product": { "name": "16.6.10", "product_id": "CSAFPID-283835" } } ], "category": "product_version", "name": "16.6" }, { "branches": [ { "category": "service_pack", "name": "16.9.1", "product": { "name": "16.9.1", "product_id": "CSAFPID-225856" } }, { "category": "service_pack", "name": "16.9.1d", "product": { "name": "16.9.1d", "product_id": "CSAFPID-248242" } }, { "category": "service_pack", "name": "16.9.4", "product": { "name": "16.9.4", "product_id": "CSAFPID-262390" } }, { "category": "service_pack", "name": "16.9.4c", "product": { "name": "16.9.4c", "product_id": "CSAFPID-268921" } }, { "category": "service_pack", "name": "16.9.5f", "product": { "name": "16.9.5f", "product_id": "CSAFPID-276837" } }, { "category": "service_pack", "name": "16.9.6", "product": { "name": "16.9.6", "product_id": "CSAFPID-277945" } }, { "category": "service_pack", "name": "16.9.7", "product": { "name": "16.9.7", "product_id": "CSAFPID-280651" } }, { "category": "service_pack", "name": "16.9.8", "product": { "name": "16.9.8", "product_id": "CSAFPID-280938" } }, { "category": "service_pack", "name": "16.9.8a", "product": { "name": "16.9.8a", "product_id": "CSAFPID-290562" } }, { "category": "service_pack", "name": "16.9.8b", "product": { "name": "16.9.8b", "product_id": "CSAFPID-290669" } } ], "category": "product_version", "name": "16.9" }, { "branches": [ { "category": "service_pack", "name": "16.10.1", "product": { "name": "16.10.1", "product_id": "CSAFPID-225858" } }, { "category": "service_pack", "name": "16.10.1e", "product": { "name": "16.10.1e", "product_id": "CSAFPID-257955" } }, { "category": "service_pack", "name": "16.10.2", "product": { "name": "16.10.2", "product_id": "CSAFPID-260917" } }, { "category": "service_pack", "name": "16.10.1g", "product": { "name": "16.10.1g", "product_id": "CSAFPID-266259" } } ], "category": "product_version", "name": "16.10" }, { "branches": [ { "category": "service_pack", "name": "3.10.3E", "product": { "name": "3.10.3E", "product_id": "CSAFPID-262994" } } ], "category": "product_version", "name": "3.10E" }, { "branches": [ { "category": "service_pack", "name": "16.11.1", "product": { "name": "16.11.1", "product_id": "CSAFPID-227918" } }, { "category": "service_pack", "name": "16.11.1a", "product": { "name": "16.11.1a", "product_id": "CSAFPID-252271" } }, { "category": "service_pack", "name": "16.11.1b", "product": { "name": "16.11.1b", "product_id": "CSAFPID-260741" } }, { "category": "service_pack", "name": "16.11.2", "product": { "name": "16.11.2", "product_id": "CSAFPID-261240" } }, { "category": "service_pack", "name": "16.11.1s", "product": { "name": "16.11.1s", "product_id": "CSAFPID-261465" } }, { "category": "service_pack", "name": "16.11.1c", "product": { "name": "16.11.1c", "product_id": "CSAFPID-264096" } } ], "category": "product_version", "name": "16.11" }, { "branches": [ { "category": "service_pack", "name": "16.12.1", "product": { "name": "16.12.1", "product_id": "CSAFPID-227920" } }, { "category": "service_pack", "name": "16.12.1s", "product": { "name": "16.12.1s", "product_id": "CSAFPID-265735" } }, { "category": "service_pack", "name": "16.12.1a", "product": { "name": "16.12.1a", "product_id": "CSAFPID-265841" } }, { "category": "service_pack", "name": "16.12.1c", "product": { "name": "16.12.1c", "product_id": "CSAFPID-267110" } }, { "category": "service_pack", "name": "16.12.1w", "product": { "name": "16.12.1w", "product_id": "CSAFPID-267240" } }, { "category": "service_pack", "name": "16.12.1y", "product": { "name": "16.12.1y", "product_id": "CSAFPID-271938" } }, { "category": "service_pack", "name": "16.12.1x", "product": { "name": "16.12.1x", "product_id": "CSAFPID-273649" } }, { "category": "service_pack", "name": "16.12.1t", "product": { "name": "16.12.1t", "product_id": "CSAFPID-274832" } } ], "category": "product_version", "name": "16.12" } ], "category": "product_family", "name": "Cisco IOS XE Software" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-3225", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvo17827" }, { "system_name": "Cisco Bug ID", "text": "CSCvp56319" }, { "system_name": "Cisco Bug ID", "text": "CSCvr47365" }, { "system_name": "Cisco Bug ID", "text": "CSCvr67776" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-103763", "CSAFPID-103955", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104101", "CSAFPID-104342", "CSAFPID-104376", "CSAFPID-104855", "CSAFPID-105253", "CSAFPID-105394", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106072", "CSAFPID-106684", "CSAFPID-106997", "CSAFPID-107209", "CSAFPID-107630", "CSAFPID-107852", "CSAFPID-109098", "CSAFPID-109439", "CSAFPID-109442", "CSAFPID-109808", "CSAFPID-111005", "CSAFPID-111674", "CSAFPID-114665", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117282", "CSAFPID-184125", "CSAFPID-187057", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-191928", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-195481", "CSAFPID-195528", "CSAFPID-195544", "CSAFPID-195770", "CSAFPID-197462", "CSAFPID-197468", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200492", "CSAFPID-200503", "CSAFPID-201074", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204103", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204310", "CSAFPID-204324", "CSAFPID-204826", "CSAFPID-204831", "CSAFPID-205672", "CSAFPID-205723", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209067", "CSAFPID-209068", "CSAFPID-209073", "CSAFPID-209074", "CSAFPID-209075", "CSAFPID-209077", "CSAFPID-209080", "CSAFPID-209081", "CSAFPID-209083", "CSAFPID-209085", "CSAFPID-209086", "CSAFPID-209087", "CSAFPID-209089", "CSAFPID-209090", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209419", "CSAFPID-209474", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209930", "CSAFPID-209935", "CSAFPID-210137", "CSAFPID-210189", "CSAFPID-210203", "CSAFPID-210262", "CSAFPID-210410", "CSAFPID-210411", "CSAFPID-210491", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210937", "CSAFPID-210958", "CSAFPID-211256", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212266", "CSAFPID-212497", "CSAFPID-212686", "CSAFPID-213089", "CSAFPID-213654", "CSAFPID-213655", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213843", "CSAFPID-213954", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214382", "CSAFPID-214556", "CSAFPID-214764", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-216277", "CSAFPID-216295", "CSAFPID-216573", "CSAFPID-216632", "CSAFPID-217048", "CSAFPID-217078", "CSAFPID-217194", "CSAFPID-217779", "CSAFPID-217803", "CSAFPID-218891", "CSAFPID-218946", "CSAFPID-218948", "CSAFPID-220038", "CSAFPID-220235", "CSAFPID-220441", "CSAFPID-220446", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220657", "CSAFPID-220658", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-222258", "CSAFPID-222342", "CSAFPID-222412", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222537", "CSAFPID-222630", "CSAFPID-222716", "CSAFPID-222924", "CSAFPID-222930", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-224442", "CSAFPID-224738", "CSAFPID-224868", "CSAFPID-225160", "CSAFPID-225167", "CSAFPID-225358", "CSAFPID-225662", "CSAFPID-225740", "CSAFPID-225790", "CSAFPID-226038", "CSAFPID-226077", "CSAFPID-226172", "CSAFPID-226174", "CSAFPID-226202", "CSAFPID-227048", "CSAFPID-227364", "CSAFPID-227598", "CSAFPID-227789", "CSAFPID-227791", "CSAFPID-227960", "CSAFPID-228057", "CSAFPID-228075", "CSAFPID-228151", "CSAFPID-228955", "CSAFPID-228956", "CSAFPID-230587", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230591", "CSAFPID-230592", "CSAFPID-230594", "CSAFPID-230596", "CSAFPID-230598", "CSAFPID-230603", "CSAFPID-230605", "CSAFPID-230606", "CSAFPID-230712", "CSAFPID-230824", "CSAFPID-230826", "CSAFPID-230915", "CSAFPID-230962", "CSAFPID-230965", "CSAFPID-230992", "CSAFPID-230994", "CSAFPID-230995", "CSAFPID-231000", "CSAFPID-231001", "CSAFPID-231017", "CSAFPID-231245", "CSAFPID-231679", "CSAFPID-231796", "CSAFPID-232061", "CSAFPID-232122", "CSAFPID-232765", "CSAFPID-232850", "CSAFPID-232852", "CSAFPID-234115", "CSAFPID-234926", "CSAFPID-236205", "CSAFPID-238504", "CSAFPID-238999", "CSAFPID-239225", "CSAFPID-239279", "CSAFPID-239361", "CSAFPID-240186", "CSAFPID-241614", "CSAFPID-241765", "CSAFPID-241916", "CSAFPID-242313", "CSAFPID-243144", "CSAFPID-243525", "CSAFPID-244911", "CSAFPID-244913", "CSAFPID-245380", "CSAFPID-247630", "CSAFPID-251487", "CSAFPID-252156", "CSAFPID-255002", "CSAFPID-257209", "CSAFPID-257830", "CSAFPID-259238", "CSAFPID-259869", "CSAFPID-259985", "CSAFPID-260691", "CSAFPID-260993", "CSAFPID-261487", "CSAFPID-262300", "CSAFPID-262335", "CSAFPID-262536", "CSAFPID-262684", "CSAFPID-263981", "CSAFPID-264643", "CSAFPID-271140", "CSAFPID-271286", "CSAFPID-273350", "CSAFPID-273510", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-274203", "CSAFPID-275845", "CSAFPID-276903", "CSAFPID-277230", "CSAFPID-277232", "CSAFPID-277253", "CSAFPID-277339", "CSAFPID-277340", "CSAFPID-277341", "CSAFPID-277352", "CSAFPID-277354", "CSAFPID-277355", "CSAFPID-278029", "CSAFPID-278403", "CSAFPID-278804", "CSAFPID-278880", "CSAFPID-278884", "CSAFPID-279335", "CSAFPID-279337", "CSAFPID-280472", "CSAFPID-280661", "CSAFPID-280759", "CSAFPID-280778", "CSAFPID-280779", "CSAFPID-280832", "CSAFPID-280833", "CSAFPID-282026", "CSAFPID-282027", "CSAFPID-282114", "CSAFPID-282651", "CSAFPID-282669", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284349", "CSAFPID-284566", "CSAFPID-284567", "CSAFPID-284785", "CSAFPID-284786", "CSAFPID-285319", "CSAFPID-285320", "CSAFPID-285321", "CSAFPID-285323", "CSAFPID-286029", "CSAFPID-286030", "CSAFPID-286111", "CSAFPID-286352", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286452", "CSAFPID-286497", "CSAFPID-286520", "CSAFPID-286559", "CSAFPID-286843", "CSAFPID-286844", "CSAFPID-286860", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-287121", "CSAFPID-287185", "CSAFPID-289270", "CSAFPID-289301", "CSAFPID-289303", "CSAFPID-289371", "CSAFPID-290465", "CSAFPID-290479", "CSAFPID-290557", "CSAFPID-290587", "CSAFPID-290618", "CSAFPID-290656", "CSAFPID-292482", "CSAFPID-292654", "CSAFPID-292655", "CSAFPID-292769", "CSAFPID-294791", "CSAFPID-294801", "CSAFPID-296664", "CSAFPID-296759", "CSAFPID-299941", "CSAFPID-299944", "CSAFPID-300502", "CSAFPID-300783", "CSAFPID-300835", "CSAFPID-300837", "CSAFPID-300949", "CSAFPID-300950", "CSAFPID-301223", "CSAFPID-301225", "CSAFPID-301233", "CSAFPID-301472", "CSAFPID-301579", "CSAFPID-301721", "CSAFPID-302624", "CSAFPID-302781", "CSAFPID-302978", "CSAFPID-303044", "CSAFPID-222435", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-248242", "CSAFPID-252271", "CSAFPID-257955", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262994", "CSAFPID-264096", "CSAFPID-264514", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271633", "CSAFPID-271938", "CSAFPID-273649", "CSAFPID-274832", "CSAFPID-276837", "CSAFPID-277148", "CSAFPID-277945", "CSAFPID-280651", "CSAFPID-280801", "CSAFPID-280938", "CSAFPID-283835", "CSAFPID-284346", "CSAFPID-286453", "CSAFPID-290562", "CSAFPID-290669" ] }, "release_date": "2020-06-03T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-222435", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-248242", "CSAFPID-252271", "CSAFPID-257955", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262994", "CSAFPID-264096", "CSAFPID-264514", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271633", "CSAFPID-271938", "CSAFPID-273649", "CSAFPID-274832", "CSAFPID-276837", "CSAFPID-277148", "CSAFPID-277945", "CSAFPID-280651", "CSAFPID-280801", "CSAFPID-280938", "CSAFPID-283835", "CSAFPID-284346", "CSAFPID-286453", "CSAFPID-290562", "CSAFPID-290669", "CSAFPID-103763", "CSAFPID-103955", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104101", "CSAFPID-104342", "CSAFPID-104376", "CSAFPID-104855", "CSAFPID-105253", "CSAFPID-105394", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106072", "CSAFPID-106684", "CSAFPID-106997", "CSAFPID-107209", "CSAFPID-107630", "CSAFPID-107852", "CSAFPID-109098", "CSAFPID-109439", "CSAFPID-109442", "CSAFPID-109808", "CSAFPID-111005", "CSAFPID-111674", "CSAFPID-114665", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117282", "CSAFPID-184125", "CSAFPID-187057", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-191928", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-195481", "CSAFPID-195528", "CSAFPID-195544", "CSAFPID-195770", "CSAFPID-197462", "CSAFPID-197468", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200492", "CSAFPID-200503", "CSAFPID-201074", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204103", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204310", "CSAFPID-204324", "CSAFPID-204826", "CSAFPID-204831", "CSAFPID-205672", "CSAFPID-205723", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209067", "CSAFPID-209068", "CSAFPID-209073", "CSAFPID-209074", "CSAFPID-209075", "CSAFPID-209077", "CSAFPID-209080", "CSAFPID-209081", "CSAFPID-209083", "CSAFPID-209085", "CSAFPID-209086", "CSAFPID-209087", "CSAFPID-209089", "CSAFPID-209090", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209419", "CSAFPID-209474", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209930", "CSAFPID-209935", "CSAFPID-210137", "CSAFPID-210189", "CSAFPID-210203", "CSAFPID-210262", "CSAFPID-210410", "CSAFPID-210411", "CSAFPID-210491", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210937", "CSAFPID-210958", "CSAFPID-211256", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212266", "CSAFPID-212497", "CSAFPID-212686", "CSAFPID-213089", "CSAFPID-213654", "CSAFPID-213655", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213843", "CSAFPID-213954", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214382", "CSAFPID-214556", "CSAFPID-214764", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-216277", "CSAFPID-216295", "CSAFPID-216573", "CSAFPID-216632", "CSAFPID-217048", "CSAFPID-217078", "CSAFPID-217194", "CSAFPID-217779", "CSAFPID-217803", "CSAFPID-218891", "CSAFPID-218946", "CSAFPID-218948", "CSAFPID-220038", "CSAFPID-220235", "CSAFPID-220441", "CSAFPID-220446", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220657", "CSAFPID-220658", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-222258", "CSAFPID-222342", "CSAFPID-222412", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222537", "CSAFPID-222630", "CSAFPID-222716", "CSAFPID-222924", "CSAFPID-222930", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-224442", "CSAFPID-224738", "CSAFPID-224868", "CSAFPID-225160", "CSAFPID-225167", "CSAFPID-225358", "CSAFPID-225662", "CSAFPID-225740", "CSAFPID-225790", "CSAFPID-226038", "CSAFPID-226077", "CSAFPID-226172", "CSAFPID-226174", "CSAFPID-226202", "CSAFPID-227048", "CSAFPID-227364", "CSAFPID-227598", "CSAFPID-227789", "CSAFPID-227791", "CSAFPID-227960", "CSAFPID-228057", "CSAFPID-228075", "CSAFPID-228151", "CSAFPID-228955", "CSAFPID-228956", "CSAFPID-230587", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230591", "CSAFPID-230592", "CSAFPID-230594", "CSAFPID-230596", "CSAFPID-230598", "CSAFPID-230603", "CSAFPID-230605", "CSAFPID-230606", "CSAFPID-230712", "CSAFPID-230824", "CSAFPID-230826", "CSAFPID-230915", "CSAFPID-230962", "CSAFPID-230965", "CSAFPID-230992", "CSAFPID-230994", "CSAFPID-230995", "CSAFPID-231000", "CSAFPID-231001", "CSAFPID-231017", "CSAFPID-231245", "CSAFPID-231679", "CSAFPID-231796", "CSAFPID-232061", "CSAFPID-232122", "CSAFPID-232765", "CSAFPID-232850", "CSAFPID-232852", "CSAFPID-234115", "CSAFPID-234926", "CSAFPID-236205", "CSAFPID-238504", "CSAFPID-238999", "CSAFPID-239225", "CSAFPID-239279", "CSAFPID-239361", "CSAFPID-240186", "CSAFPID-241614", "CSAFPID-241765", "CSAFPID-241916", "CSAFPID-242313", "CSAFPID-243144", "CSAFPID-243525", "CSAFPID-244911", "CSAFPID-244913", "CSAFPID-245380", "CSAFPID-247630", "CSAFPID-251487", "CSAFPID-252156", "CSAFPID-255002", "CSAFPID-257209", "CSAFPID-257830", "CSAFPID-259238", "CSAFPID-259869", "CSAFPID-259985", "CSAFPID-260691", "CSAFPID-260993", "CSAFPID-261487", "CSAFPID-262300", "CSAFPID-262335", "CSAFPID-262536", "CSAFPID-262684", "CSAFPID-263981", "CSAFPID-264643", "CSAFPID-271140", "CSAFPID-271286", "CSAFPID-273350", "CSAFPID-273510", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-274203", "CSAFPID-275845", "CSAFPID-276903", "CSAFPID-277230", "CSAFPID-277232", "CSAFPID-277253", "CSAFPID-277339", "CSAFPID-277340", "CSAFPID-277341", "CSAFPID-277352", "CSAFPID-277354", "CSAFPID-277355", "CSAFPID-278029", "CSAFPID-278403", "CSAFPID-278804", "CSAFPID-278880", "CSAFPID-278884", "CSAFPID-279335", "CSAFPID-279337", "CSAFPID-280472", "CSAFPID-280661", "CSAFPID-280759", "CSAFPID-280778", "CSAFPID-280779", "CSAFPID-280832", "CSAFPID-280833", "CSAFPID-282026", "CSAFPID-282027", "CSAFPID-282114", "CSAFPID-282651", "CSAFPID-282669", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284349", "CSAFPID-284566", "CSAFPID-284567", "CSAFPID-284785", "CSAFPID-284786", "CSAFPID-285319", "CSAFPID-285320", "CSAFPID-285321", "CSAFPID-285323", "CSAFPID-286029", "CSAFPID-286030", "CSAFPID-286111", "CSAFPID-286352", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286452", "CSAFPID-286497", "CSAFPID-286520", "CSAFPID-286559", "CSAFPID-286843", "CSAFPID-286844", "CSAFPID-286860", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-287121", "CSAFPID-287185", "CSAFPID-289270", "CSAFPID-289301", "CSAFPID-289303", "CSAFPID-289371", "CSAFPID-290465", "CSAFPID-290479", "CSAFPID-290557", "CSAFPID-290587", "CSAFPID-290618", "CSAFPID-290656", "CSAFPID-292482", "CSAFPID-292654", "CSAFPID-292655", "CSAFPID-292769", "CSAFPID-294791", "CSAFPID-294801", "CSAFPID-296664", "CSAFPID-296759", "CSAFPID-299941", "CSAFPID-299944", "CSAFPID-300502", "CSAFPID-300783", "CSAFPID-300835", "CSAFPID-300837", "CSAFPID-300949", "CSAFPID-300950", "CSAFPID-301223", "CSAFPID-301225", "CSAFPID-301233", "CSAFPID-301472", "CSAFPID-301579", "CSAFPID-301721", "CSAFPID-302624", "CSAFPID-302781", "CSAFPID-302978", "CSAFPID-303044" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-103763", "CSAFPID-103955", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104101", "CSAFPID-104342", "CSAFPID-104376", "CSAFPID-104855", "CSAFPID-105253", "CSAFPID-105394", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106072", "CSAFPID-106684", "CSAFPID-106997", "CSAFPID-107209", "CSAFPID-107630", "CSAFPID-107852", "CSAFPID-109098", "CSAFPID-109439", "CSAFPID-109442", "CSAFPID-109808", "CSAFPID-111005", "CSAFPID-111674", "CSAFPID-114665", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117282", "CSAFPID-184125", "CSAFPID-187057", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-191928", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-195481", "CSAFPID-195528", "CSAFPID-195544", "CSAFPID-195770", "CSAFPID-197462", "CSAFPID-197468", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200492", "CSAFPID-200503", "CSAFPID-201074", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204103", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204310", "CSAFPID-204324", "CSAFPID-204826", "CSAFPID-204831", "CSAFPID-205672", "CSAFPID-205723", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209067", "CSAFPID-209068", "CSAFPID-209073", "CSAFPID-209074", "CSAFPID-209075", "CSAFPID-209077", "CSAFPID-209080", "CSAFPID-209081", "CSAFPID-209083", "CSAFPID-209085", "CSAFPID-209086", "CSAFPID-209087", "CSAFPID-209089", "CSAFPID-209090", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209419", "CSAFPID-209474", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209930", "CSAFPID-209935", "CSAFPID-210137", "CSAFPID-210189", "CSAFPID-210203", "CSAFPID-210262", "CSAFPID-210410", "CSAFPID-210411", "CSAFPID-210491", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210937", "CSAFPID-210958", "CSAFPID-211256", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212266", "CSAFPID-212497", "CSAFPID-212686", "CSAFPID-213089", "CSAFPID-213654", "CSAFPID-213655", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213843", "CSAFPID-213954", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214382", "CSAFPID-214556", "CSAFPID-214764", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-216277", "CSAFPID-216295", "CSAFPID-216573", "CSAFPID-216632", "CSAFPID-217048", "CSAFPID-217078", "CSAFPID-217194", "CSAFPID-217779", "CSAFPID-217803", "CSAFPID-218891", "CSAFPID-218946", "CSAFPID-218948", "CSAFPID-220038", "CSAFPID-220235", "CSAFPID-220441", "CSAFPID-220446", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220657", "CSAFPID-220658", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-222258", "CSAFPID-222342", "CSAFPID-222412", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222537", "CSAFPID-222630", "CSAFPID-222716", "CSAFPID-222924", "CSAFPID-222930", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-224442", "CSAFPID-224738", "CSAFPID-224868", "CSAFPID-225160", "CSAFPID-225167", "CSAFPID-225358", "CSAFPID-225662", "CSAFPID-225740", "CSAFPID-225790", "CSAFPID-226038", "CSAFPID-226077", "CSAFPID-226172", "CSAFPID-226174", "CSAFPID-226202", "CSAFPID-227048", "CSAFPID-227364", "CSAFPID-227598", "CSAFPID-227789", "CSAFPID-227791", "CSAFPID-227960", "CSAFPID-228057", "CSAFPID-228075", "CSAFPID-228151", "CSAFPID-228955", "CSAFPID-228956", "CSAFPID-230587", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230591", "CSAFPID-230592", "CSAFPID-230594", "CSAFPID-230596", "CSAFPID-230598", "CSAFPID-230603", "CSAFPID-230605", "CSAFPID-230606", "CSAFPID-230712", "CSAFPID-230824", "CSAFPID-230826", "CSAFPID-230915", "CSAFPID-230962", "CSAFPID-230965", "CSAFPID-230992", "CSAFPID-230994", "CSAFPID-230995", "CSAFPID-231000", "CSAFPID-231001", "CSAFPID-231017", "CSAFPID-231245", "CSAFPID-231679", "CSAFPID-231796", "CSAFPID-232061", "CSAFPID-232122", "CSAFPID-232765", "CSAFPID-232850", "CSAFPID-232852", "CSAFPID-234115", "CSAFPID-234926", "CSAFPID-236205", "CSAFPID-238504", "CSAFPID-238999", "CSAFPID-239225", "CSAFPID-239279", "CSAFPID-239361", "CSAFPID-240186", "CSAFPID-241614", "CSAFPID-241765", "CSAFPID-241916", "CSAFPID-242313", "CSAFPID-243144", "CSAFPID-243525", "CSAFPID-244911", "CSAFPID-244913", "CSAFPID-245380", "CSAFPID-247630", "CSAFPID-251487", "CSAFPID-252156", "CSAFPID-255002", "CSAFPID-257209", "CSAFPID-257830", "CSAFPID-259238", "CSAFPID-259869", "CSAFPID-259985", "CSAFPID-260691", "CSAFPID-260993", "CSAFPID-261487", "CSAFPID-262300", "CSAFPID-262335", "CSAFPID-262536", "CSAFPID-262684", "CSAFPID-263981", "CSAFPID-264643", "CSAFPID-271140", "CSAFPID-271286", "CSAFPID-273350", "CSAFPID-273510", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-274203", "CSAFPID-275845", "CSAFPID-276903", "CSAFPID-277230", "CSAFPID-277232", "CSAFPID-277253", "CSAFPID-277339", "CSAFPID-277340", "CSAFPID-277341", "CSAFPID-277352", "CSAFPID-277354", "CSAFPID-277355", "CSAFPID-278029", "CSAFPID-278403", "CSAFPID-278804", "CSAFPID-278880", "CSAFPID-278884", "CSAFPID-279335", "CSAFPID-279337", "CSAFPID-280472", "CSAFPID-280661", "CSAFPID-280759", "CSAFPID-280778", "CSAFPID-280779", "CSAFPID-280832", "CSAFPID-280833", "CSAFPID-282026", "CSAFPID-282027", "CSAFPID-282114", "CSAFPID-282651", "CSAFPID-282669", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284349", "CSAFPID-284566", "CSAFPID-284567", "CSAFPID-284785", "CSAFPID-284786", "CSAFPID-285319", "CSAFPID-285320", "CSAFPID-285321", "CSAFPID-285323", "CSAFPID-286029", "CSAFPID-286030", "CSAFPID-286111", "CSAFPID-286352", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286452", "CSAFPID-286497", "CSAFPID-286520", "CSAFPID-286559", "CSAFPID-286843", "CSAFPID-286844", "CSAFPID-286860", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-287121", "CSAFPID-287185", "CSAFPID-289270", "CSAFPID-289301", "CSAFPID-289303", "CSAFPID-289371", "CSAFPID-290465", "CSAFPID-290479", "CSAFPID-290557", "CSAFPID-290587", "CSAFPID-290618", "CSAFPID-290656", "CSAFPID-292482", "CSAFPID-292654", "CSAFPID-292655", "CSAFPID-292769", "CSAFPID-294791", "CSAFPID-294801", "CSAFPID-296664", "CSAFPID-296759", "CSAFPID-299941", "CSAFPID-299944", "CSAFPID-300502", "CSAFPID-300783", "CSAFPID-300835", "CSAFPID-300837", "CSAFPID-300949", "CSAFPID-300950", "CSAFPID-301223", "CSAFPID-301225", "CSAFPID-301233", "CSAFPID-301472", "CSAFPID-301579", "CSAFPID-301721", "CSAFPID-302624", "CSAFPID-302781", "CSAFPID-302978", "CSAFPID-303044", "CSAFPID-222435", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-248242", "CSAFPID-252271", "CSAFPID-257955", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262994", "CSAFPID-264096", "CSAFPID-264514", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271633", "CSAFPID-271938", "CSAFPID-273649", "CSAFPID-274832", "CSAFPID-276837", "CSAFPID-277148", "CSAFPID-277945", "CSAFPID-280651", "CSAFPID-280801", "CSAFPID-280938", "CSAFPID-283835", "CSAFPID-284346", "CSAFPID-286453", "CSAFPID-290562", "CSAFPID-290669" ] } ], "title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities" } ] }
cisco-sa-cipdos-hkftzxex
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "These vulnerabilities were found during the resolution of a Cisco TAC support case." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r\nThe vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\n\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\"]\r\n\r\n\r\nThis advisory is part of the June 3, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 23 Cisco Security Advisories that describe 25 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\" https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388\"].", "title": "Summary" }, { "category": "general", "text": "These vulnerabilities affect Cisco IOS and IOS XE Software if they are configured for CIP. CIP is not enabled by default.\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n Determine Whether CIP Is Enabled\r\nAn administrator can determine whether CIP is enabled on a device by issuing the show cip status command and checking the State: value.\r\n\r\nThe following show cip status output shows that CIP is enabled for VLAN 1:\r\n\r\n\r\nDevice\u003eshow cip status\r\nState : Enabled\r\nVlan : 1\r\n\r\nIf the command returns no output, the device is not affected by the vulnerabilities described in this advisory.", "title": "Vulnerable Products" }, { "category": "general", "text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect Cisco IOS XR Software or Cisco NX-OS Software.", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "There are no workarounds that address these vulnerabilities.", "title": "Workarounds" }, { "category": "general", "text": "Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttps://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n\r\n\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to search advisories in the following ways:\r\n\r\nChoose the software and one or more releases\r\nUpload a .txt file that includes a list of specific releases\r\nEnter the output of the show version command\r\n\r\nAfter initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.\r\n\r\nCustomers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S:\r\n\r\n\r\n\r\nBy default, the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "These vulnerabilities were found during the resolution of a Cisco TAC support case.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" }, { "category": "external", "summary": "Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx" }, { "category": "external", "summary": "Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication", "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html", "url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html" }, { "category": "external", "summary": "considering software upgrades", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes" }, { "category": "external", "summary": "Cisco Security Advisories and Alerts page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html", "url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html" }, { "category": "external", "summary": "Cisco\u0026nbsp;Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" }, { "category": "external", "summary": "Cisco\u0026nbsp;Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" }, { "category": "external", "summary": "Cisco\u0026nbsp;Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 2 Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 3S Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 3SG Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities", "tracking": { "current_release_date": "2020-06-03T16:00:00+00:00", "generator": { "date": "2022-09-03T03:00:30+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-cipdos-hkfTZXEx", "initial_release_date": "2020-06-03T16:00:00+00:00", "revision_history": [ { "date": "2020-04-30T19:04:54+00:00", "number": "1.0.0", "summary": "Initial public release." } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "service_pack", "name": "12.2(55)SE", "product": { "name": "12.2(55)SE", "product_id": "CSAFPID-103763" } }, { "category": "service_pack", "name": "12.2(46)SE2", "product": { "name": "12.2(46)SE2", "product_id": "CSAFPID-104089" } }, { "category": "service_pack", "name": "12.2(50)SE2", "product": { "name": "12.2(50)SE2", "product_id": "CSAFPID-104101" } }, { "category": "service_pack", "name": "12.2(50)SE1", "product": { "name": "12.2(50)SE1", "product_id": "CSAFPID-104342" } }, { "category": "service_pack", "name": "12.2(50)SE5", "product": { "name": "12.2(50)SE5", "product_id": "CSAFPID-104855" } }, { "category": "service_pack", "name": "12.2(55)SE3", "product": { "name": "12.2(55)SE3", "product_id": "CSAFPID-105394" } }, { "category": "service_pack", "name": "12.2(52)SE", "product": { "name": "12.2(52)SE", "product_id": "CSAFPID-105973" } }, { "category": "service_pack", "name": "12.2(58)SE", "product": { "name": "12.2(58)SE", "product_id": "CSAFPID-105987" } }, { "category": "service_pack", "name": "12.2(50)SE3", "product": { "name": "12.2(50)SE3", "product_id": "CSAFPID-106016" } }, { "category": "service_pack", "name": "12.2(52)SE1", "product": { "name": "12.2(52)SE1", "product_id": "CSAFPID-106684" } }, { "category": "service_pack", "name": "12.2(46)SE1", "product": { "name": "12.2(46)SE1", "product_id": "CSAFPID-106997" } }, { "category": "service_pack", "name": "12.2(50)SE4", "product": { "name": "12.2(50)SE4", "product_id": "CSAFPID-107209" } }, { "category": "service_pack", "name": "12.2(50)SE", "product": { "name": "12.2(50)SE", "product_id": "CSAFPID-107630" } }, { "category": "service_pack", "name": "12.2(58)SE1", "product": { "name": "12.2(58)SE1", "product_id": "CSAFPID-109098" } }, { "category": "service_pack", "name": "12.2(55)SE4", "product": { "name": "12.2(55)SE4", "product_id": "CSAFPID-109439" } }, { "category": "service_pack", "name": "12.2(58)SE2", "product": { "name": "12.2(58)SE2", "product_id": "CSAFPID-109808" } }, { "category": "service_pack", "name": "12.2(55)SE5", "product": { "name": "12.2(55)SE5", "product_id": "CSAFPID-111674" } }, { "category": "service_pack", "name": "12.2(55)SE6", "product": { "name": "12.2(55)SE6", "product_id": "CSAFPID-114665" } }, { "category": "service_pack", "name": "12.2(55)SE7", "product": { "name": "12.2(55)SE7", "product_id": "CSAFPID-184125" } }, { "category": "service_pack", "name": "12.2(55)SE9", "product": { "name": "12.2(55)SE9", "product_id": "CSAFPID-192911" } }, { "category": "service_pack", "name": "12.2(55)SE10", "product": { "name": "12.2(55)SE10", "product_id": "CSAFPID-198542" } }, { "category": "service_pack", "name": "12.2(55)SE11", "product": { "name": "12.2(55)SE11", "product_id": "CSAFPID-210732" } }, { "category": "service_pack", "name": "12.2(55)SE12", "product": { "name": "12.2(55)SE12", "product_id": "CSAFPID-228057" } }, { "category": "service_pack", "name": "12.2(55)SE13", "product": { "name": "12.2(55)SE13", "product_id": "CSAFPID-230962" } } ], "category": "product_version", "name": "12.2SE" }, { "branches": [ { "category": "service_pack", "name": "12.2(44)EX", "product": { "name": "12.2(44)EX", "product_id": "CSAFPID-104061" } }, { "category": "service_pack", "name": "12.2(44)EX1", "product": { "name": "12.2(44)EX1", "product_id": "CSAFPID-105253" } } ], "category": "product_version", "name": "12.2EX" }, { "branches": [ { "category": "service_pack", "name": "12.2(60)EZ16", "product": { "name": "12.2(60)EZ16", "product_id": "CSAFPID-262536" } } ], "category": "product_version", "name": "12.2EZ" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)XO1", "product": { "name": "15.0(1)XO1", "product_id": "CSAFPID-103955" } }, { "category": "service_pack", "name": "15.0(1)XO", "product": { "name": "15.0(1)XO", "product_id": "CSAFPID-106072" } }, { "category": "service_pack", "name": "15.0(2)XO", "product": { "name": "15.0(2)XO", "product_id": "CSAFPID-111005" } } ], "category": "product_version", "name": "15.0XO" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)EY", "product": { "name": "15.0(1)EY", "product_id": "CSAFPID-104376" } }, { "category": "service_pack", "name": "15.0(1)EY1", "product": { "name": "15.0(1)EY1", "product_id": "CSAFPID-115969" } }, { "category": "service_pack", "name": "15.0(1)EY2", "product": { "name": "15.0(1)EY2", "product_id": "CSAFPID-187269" } }, { "category": "service_pack", "name": "15.0(2)EY", "product": { "name": "15.0(2)EY", "product_id": "CSAFPID-187932" } }, { "category": "service_pack", "name": "15.0(2)EY1", "product": { "name": "15.0(2)EY1", "product_id": "CSAFPID-190250" } }, { "category": "service_pack", "name": "15.0(2)EY2", "product": { "name": "15.0(2)EY2", "product_id": "CSAFPID-192831" } }, { "category": "service_pack", "name": "15.0(2)EY3", "product": { "name": "15.0(2)EY3", "product_id": "CSAFPID-195481" } } ], "category": "product_version", "name": "15.0EY" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SE", "product": { "name": "15.0(2)SE", "product_id": "CSAFPID-107852" } }, { "category": "service_pack", "name": "15.0(2)SE1", "product": { "name": "15.0(2)SE1", "product_id": "CSAFPID-115939" } }, { "category": "service_pack", "name": "15.0(2)SE2", "product": { "name": "15.0(2)SE2", "product_id": "CSAFPID-116083" } }, { "category": "service_pack", "name": "15.0(2)SE3", "product": { "name": "15.0(2)SE3", "product_id": "CSAFPID-189455" } }, { "category": "service_pack", "name": "15.0(2)SE4", "product": { "name": "15.0(2)SE4", "product_id": "CSAFPID-190635" } }, { "category": "service_pack", "name": "15.0(2)SE5", "product": { "name": "15.0(2)SE5", "product_id": "CSAFPID-192706" } }, { "category": "service_pack", "name": "15.0(2)SE6", "product": { "name": "15.0(2)SE6", "product_id": "CSAFPID-195770" } }, { "category": "service_pack", "name": "15.0(2)SE7", "product": { "name": "15.0(2)SE7", "product_id": "CSAFPID-204097" } }, { "category": "service_pack", "name": "15.0(2)SE8", "product": { "name": "15.0(2)SE8", "product_id": "CSAFPID-209028" } }, { "category": "service_pack", "name": "15.0(2)SE9", "product": { "name": "15.0(2)SE9", "product_id": "CSAFPID-209029" } }, { "category": "service_pack", "name": "15.0(2)SE10", "product": { "name": "15.0(2)SE10", "product_id": "CSAFPID-213788" } }, { "category": "service_pack", "name": "15.0(2)SE11", "product": { "name": "15.0(2)SE11", "product_id": "CSAFPID-220466" } }, { "category": "service_pack", "name": "15.0(2)SE10a", "product": { "name": "15.0(2)SE10a", "product_id": "CSAFPID-222342" } }, { "category": "service_pack", "name": "15.0(2)SE12", "product": { "name": "15.0(2)SE12", "product_id": "CSAFPID-234926" } }, { "category": "service_pack", "name": "15.0(2)SE13", "product": { "name": "15.0(2)SE13", "product_id": "CSAFPID-245380" } }, { "category": "service_pack", "name": "15.0(2)SE13a", "product": { "name": "15.0(2)SE13a", "product_id": "CSAFPID-274199" } }, { "category": "service_pack", "name": "15.0(2)SE13b", "product": { "name": "15.0(2)SE13b", "product_id": "CSAFPID-280778" } }, { "category": "service_pack", "name": "15.0(2)SE13c", "product": { "name": "15.0(2)SE13c", "product_id": "CSAFPID-286843" } } ], "category": "product_version", "name": "15.0SE" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SG11a", "product": { "name": "15.0(2)SG11a", "product_id": "CSAFPID-262335" } } ], "category": "product_version", "name": "15.0SG" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)EX", "product": { "name": "15.0(1)EX", "product_id": "CSAFPID-109442" } }, { "category": "service_pack", "name": "15.0(2)EX2", "product": { "name": "15.0(2)EX2", "product_id": "CSAFPID-192910" } }, { "category": "service_pack", "name": "15.0(2)EX8", "product": { "name": "15.0(2)EX8", "product_id": "CSAFPID-204831" } }, { "category": "service_pack", "name": "15.0(2)EX10", "product": { "name": "15.0(2)EX10", "product_id": "CSAFPID-211570" } }, { "category": "service_pack", "name": "15.0(2)EX11", "product": { "name": "15.0(2)EX11", "product_id": "CSAFPID-214797" } }, { "category": "service_pack", "name": "15.0(2)EX13", "product": { "name": "15.0(2)EX13", "product_id": "CSAFPID-225160" } }, { "category": "service_pack", "name": "15.0(2)EX12", "product": { "name": "15.0(2)EX12", "product_id": "CSAFPID-230965" } } ], "category": "product_version", "name": "15.0EX" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EA", "product": { "name": "15.0(2)EA", "product_id": "CSAFPID-117282" } }, { "category": "service_pack", "name": "15.0(2)EA1", "product": { "name": "15.0(2)EA1", "product_id": "CSAFPID-193033" } } ], "category": "product_version", "name": "15.0EA" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)E", "product": { "name": "15.2(2)E", "product_id": "CSAFPID-187057" } }, { "category": "service_pack", "name": "15.2(2)E1", "product": { "name": "15.2(2)E1", "product_id": "CSAFPID-201074" } }, { "category": "service_pack", "name": "15.2(2b)E", "product": { "name": "15.2(2b)E", "product_id": "CSAFPID-204102" } }, { "category": "service_pack", "name": "15.2(3)E1", "product": { "name": "15.2(3)E1", "product_id": "CSAFPID-204186" } }, { "category": "service_pack", "name": "15.2(2)E2", "product": { "name": "15.2(2)E2", "product_id": "CSAFPID-204228" } }, { "category": "service_pack", "name": "15.2(2)E3", "product": { "name": "15.2(2)E3", "product_id": "CSAFPID-205672" } }, { "category": "service_pack", "name": "15.2(2a)E2", "product": { "name": "15.2(2a)E2", "product_id": "CSAFPID-209045" } }, { "category": "service_pack", "name": "15.2(3)E2", "product": { "name": "15.2(3)E2", "product_id": "CSAFPID-209046" } }, { "category": "service_pack", "name": "15.2(3a)E", "product": { "name": "15.2(3a)E", "product_id": "CSAFPID-209047" } }, { "category": "service_pack", "name": "15.2(3)E3", "product": { "name": "15.2(3)E3", "product_id": "CSAFPID-209358" } }, { "category": "service_pack", "name": "15.2(3m)E2", "product": { "name": "15.2(3m)E2", "product_id": "CSAFPID-209359" } }, { "category": "service_pack", "name": "15.2(2)E4", "product": { "name": "15.2(2)E4", "product_id": "CSAFPID-210766" } }, { "category": "service_pack", "name": "15.2(2)E5", "product": { "name": "15.2(2)E5", "product_id": "CSAFPID-211296" } }, { "category": "service_pack", "name": "15.2(4m)E1", "product": { "name": "15.2(4m)E1", "product_id": "CSAFPID-214072" } }, { "category": "service_pack", "name": "15.2(3)E4", "product": { "name": "15.2(3)E4", "product_id": "CSAFPID-214078" } }, { "category": "service_pack", "name": "15.2(5)E", "product": { "name": "15.2(5)E", "product_id": "CSAFPID-214556" } }, { "category": "service_pack", "name": "15.2(3m)E7", "product": { "name": "15.2(3m)E7", "product_id": "CSAFPID-216295" } }, { "category": "service_pack", "name": "15.2(2)E6", "product": { "name": "15.2(2)E6", "product_id": "CSAFPID-218891" } }, { "category": "service_pack", "name": "15.2(5)E1", "product": { "name": "15.2(5)E1", "product_id": "CSAFPID-220441" } }, { "category": "service_pack", "name": "15.2(4m)E3", "product": { "name": "15.2(4m)E3", "product_id": "CSAFPID-220664" } }, { "category": "service_pack", "name": "15.2(3m)E8", "product": { "name": "15.2(3m)E8", "product_id": "CSAFPID-220689" } }, { "category": "service_pack", "name": "15.2(2)E5a", "product": { "name": "15.2(2)E5a", "product_id": "CSAFPID-221033" } }, { "category": "service_pack", "name": "15.2(2)E5b", "product": { "name": "15.2(2)E5b", "product_id": "CSAFPID-222436" } }, { "category": "service_pack", "name": "15.2(4n)E2", "product": { "name": "15.2(4n)E2", "product_id": "CSAFPID-222500" } }, { "category": "service_pack", "name": "15.2(4o)E2", "product": { "name": "15.2(4o)E2", "product_id": "CSAFPID-222924" } }, { "category": "service_pack", "name": "15.2(5a)E1", "product": { "name": "15.2(5a)E1", "product_id": "CSAFPID-223143" } }, { "category": "service_pack", "name": "15.2(2)E7", "product": { "name": "15.2(2)E7", "product_id": "CSAFPID-224868" } }, { "category": "service_pack", "name": "15.2(5)E2", "product": { "name": "15.2(5)E2", "product_id": "CSAFPID-225740" } }, { "category": "service_pack", "name": "15.2(4p)E1", "product": { "name": "15.2(4p)E1", "product_id": "CSAFPID-226077" } }, { "category": "service_pack", "name": "15.2(6)E", "product": { "name": "15.2(6)E", "product_id": "CSAFPID-227598" } }, { "category": "service_pack", "name": "15.2(5)E2c", "product": { "name": "15.2(5)E2c", "product_id": "CSAFPID-228151" } }, { "category": "service_pack", "name": "15.2(2)E8", "product": { "name": "15.2(2)E8", "product_id": "CSAFPID-230587" } }, { "category": "service_pack", "name": "15.2(4m)E2", "product": { "name": "15.2(4m)E2", "product_id": "CSAFPID-230588" } }, { "category": "service_pack", "name": "15.2(4o)E3", "product": { "name": "15.2(4o)E3", "product_id": "CSAFPID-230589" } }, { "category": "service_pack", "name": "15.2(4q)E1", "product": { "name": "15.2(4q)E1", "product_id": "CSAFPID-230590" } }, { "category": "service_pack", "name": "15.2(6)E0a", "product": { "name": "15.2(6)E0a", "product_id": "CSAFPID-230591" } }, { "category": "service_pack", "name": "15.2(6)E1", "product": { "name": "15.2(6)E1", "product_id": "CSAFPID-230592" } }, { "category": "service_pack", "name": "15.2(6)E0c", "product": { "name": "15.2(6)E0c", "product_id": "CSAFPID-231245" } }, { "category": "service_pack", "name": "15.2(2)E9", "product": { "name": "15.2(2)E9", "product_id": "CSAFPID-232765" } }, { "category": "service_pack", "name": "15.2(6)E1a", "product": { "name": "15.2(6)E1a", "product_id": "CSAFPID-238999" } }, { "category": "service_pack", "name": "15.2(6)E1s", "product": { "name": "15.2(6)E1s", "product_id": "CSAFPID-240186" } }, { "category": "service_pack", "name": "15.2(4s)E1", "product": { "name": "15.2(4s)E1", "product_id": "CSAFPID-241916" } }, { "category": "service_pack", "name": "15.2(7)E", "product": { "name": "15.2(7)E", "product_id": "CSAFPID-242313" } }, { "category": "service_pack", "name": "15.2(2)E10", "product": { "name": "15.2(2)E10", "product_id": "CSAFPID-244911" } }, { "category": "service_pack", "name": "15.2(6)E2a", "product": { "name": "15.2(6)E2a", "product_id": "CSAFPID-247630" } }, { "category": "service_pack", "name": "15.2(7)E0b", "product": { "name": "15.2(7)E0b", "product_id": "CSAFPID-260993" } }, { "category": "service_pack", "name": "15.2(7)E0s", "product": { "name": "15.2(7)E0s", "product_id": "CSAFPID-262300" } }, { "category": "service_pack", "name": "15.2(6)E3", "product": { "name": "15.2(6)E3", "product_id": "CSAFPID-262684" } }, { "category": "service_pack", "name": "15.2(2)E10a", "product": { "name": "15.2(2)E10a", "product_id": "CSAFPID-263981" } }, { "category": "service_pack", "name": "15.2(4)E9", "product": { "name": "15.2(4)E9", "product_id": "CSAFPID-264643" } }, { "category": "service_pack", "name": "15.2(7a)E0b", "product": { "name": "15.2(7a)E0b", "product_id": "CSAFPID-271140" } }, { "category": "service_pack", "name": "15.2(4)E10", "product": { "name": "15.2(4)E10", "product_id": "CSAFPID-271286" } }, { "category": "service_pack", "name": "15.2(7b)E0b", "product": { "name": "15.2(7b)E0b", "product_id": "CSAFPID-276903" } }, { "category": "service_pack", "name": "15.2(4)E10a", "product": { "name": "15.2(4)E10a", "product_id": "CSAFPID-278029" } }, { "category": "service_pack", "name": "15.2(4)E10b", "product": { "name": "15.2(4)E10b", "product_id": "CSAFPID-280779" } }, { "category": "service_pack", "name": "15.2(4)E10c", "product": { "name": "15.2(4)E10c", "product_id": "CSAFPID-284349" } }, { "category": "service_pack", "name": "15.2(2)E10b", "product": { "name": "15.2(2)E10b", "product_id": "CSAFPID-284567" } }, { "category": "service_pack", "name": "15.2(4)E10d", "product": { "name": "15.2(4)E10d", "product_id": "CSAFPID-286452" } }, { "category": "service_pack", "name": "15.2(2)E10c", "product": { "name": "15.2(2)E10c", "product_id": "CSAFPID-286860" } } ], "category": "product_version", "name": "15.2E" }, { "branches": [ { "category": "service_pack", "name": "15.2(1)EY", "product": { "name": "15.2(1)EY", "product_id": "CSAFPID-191928" } } ], "category": "product_version", "name": "15.2EY" }, { "branches": [ { "category": "service_pack", "name": "15.2(4)JAZ", "product": { "name": "15.2(4)JAZ", "product_id": "CSAFPID-195528" } }, { "category": "service_pack", "name": "15.2(4)JAZ1", "product": { "name": "15.2(4)JAZ1", "product_id": "CSAFPID-200503" } } ], "category": "product_version", "name": "15.2JAZ" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EK", "product": { "name": "15.0(2)EK", "product_id": "CSAFPID-195544" } }, { "category": "service_pack", "name": "15.0(2)EK1", "product": { "name": "15.0(2)EK1", "product_id": "CSAFPID-197468" } } ], "category": "product_version", "name": "15.0EK" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)EB", "product": { "name": "15.2(2)EB", "product_id": "CSAFPID-197462" } }, { "category": "service_pack", "name": "15.2(2)EB1", "product": { "name": "15.2(2)EB1", "product_id": "CSAFPID-209839" } }, { "category": "service_pack", "name": "15.2(2)EB2", "product": { "name": "15.2(2)EB2", "product_id": "CSAFPID-214218" } }, { "category": "service_pack", "name": "15.2(6)EB", "product": { "name": "15.2(6)EB", "product_id": "CSAFPID-251487" } } ], "category": "product_version", "name": "15.2EB" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)EA", "product": { "name": "15.2(2)EA", "product_id": "CSAFPID-198063" } }, { "category": "service_pack", "name": "15.2(2)EA1", "product": { "name": "15.2(2)EA1", "product_id": "CSAFPID-209049" } }, { "category": "service_pack", "name": "15.2(2)EA2", "product": { "name": "15.2(2)EA2", "product_id": "CSAFPID-209050" } }, { "category": "service_pack", "name": "15.2(3)EA", "product": { "name": "15.2(3)EA", "product_id": "CSAFPID-209051" } }, { "category": "service_pack", "name": "15.2(4)EA", "product": { "name": "15.2(4)EA", "product_id": "CSAFPID-210203" } }, { "category": "service_pack", "name": "15.2(4)EA1", "product": { "name": "15.2(4)EA1", "product_id": "CSAFPID-210958" } }, { "category": "service_pack", "name": "15.2(2)EA3", "product": { "name": "15.2(2)EA3", "product_id": "CSAFPID-214217" } }, { "category": "service_pack", "name": "15.2(4)EA3", "product": { "name": "15.2(4)EA3", "product_id": "CSAFPID-214965" } }, { "category": "service_pack", "name": "15.2(5)EA", "product": { "name": "15.2(5)EA", "product_id": "CSAFPID-220038" } }, { "category": "service_pack", "name": "15.2(4)EA4", "product": { "name": "15.2(4)EA4", "product_id": "CSAFPID-220460" } }, { "category": "service_pack", "name": "15.2(4)EA2", "product": { "name": "15.2(4)EA2", "product_id": "CSAFPID-220507" } }, { "category": "service_pack", "name": "15.2(4)EA5", "product": { "name": "15.2(4)EA5", "product_id": "CSAFPID-222419" } }, { "category": "service_pack", "name": "15.2(4)EA6", "product": { "name": "15.2(4)EA6", "product_id": "CSAFPID-228075" } }, { "category": "service_pack", "name": "15.2(4)EA7", "product": { "name": "15.2(4)EA7", "product_id": "CSAFPID-230992" } }, { "category": "service_pack", "name": "15.2(4)EA8", "product": { "name": "15.2(4)EA8", "product_id": "CSAFPID-241614" } }, { "category": "service_pack", "name": "15.2(4)EA9", "product": { "name": "15.2(4)EA9", "product_id": "CSAFPID-257830" } } ], "category": "product_version", "name": "15.2EA" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JN", "product": { "name": "15.3(3)JN", "product_id": "CSAFPID-200492" } }, { "category": "service_pack", "name": "15.3(3)JN1", "product": { "name": "15.3(3)JN1", "product_id": "CSAFPID-209083" } }, { "category": "service_pack", "name": "15.3(3)JN2", "product": { "name": "15.3(3)JN2", "product_id": "CSAFPID-209085" } }, { "category": "service_pack", "name": "15.3(3)JN3", "product": { "name": "15.3(3)JN3", "product_id": "CSAFPID-209086" } }, { "category": "service_pack", "name": "15.3(3)JN4", "product": { "name": "15.3(3)JN4", "product_id": "CSAFPID-209087" } }, { "category": "service_pack", "name": "15.3(3)JN6", "product": { "name": "15.3(3)JN6", "product_id": "CSAFPID-209930" } }, { "category": "service_pack", "name": "15.3(3)JN7", "product": { "name": "15.3(3)JN7", "product_id": "CSAFPID-209935" } }, { "category": "service_pack", "name": "15.3(3)JN8", "product": { "name": "15.3(3)JN8", "product_id": "CSAFPID-210410" } }, { "category": "service_pack", "name": "15.3(3)JN9", "product": { "name": "15.3(3)JN9", "product_id": "CSAFPID-213654" } }, { "category": "service_pack", "name": "15.3(3)JN11", "product": { "name": "15.3(3)JN11", "product_id": "CSAFPID-222537" } }, { "category": "service_pack", "name": "15.3(3)JN13", "product": { "name": "15.3(3)JN13", "product_id": "CSAFPID-230915" } }, { "category": "service_pack", "name": "15.3(3)JN14", "product": { "name": "15.3(3)JN14", "product_id": "CSAFPID-232122" } }, { "category": "service_pack", "name": "15.3(3)JN15", "product": { "name": "15.3(3)JN15", "product_id": "CSAFPID-239279" } } ], "category": "product_version", "name": "15.3JN" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JA1n", "product": { "name": "15.3(3)JA1n", "product_id": "CSAFPID-204310" } }, { "category": "service_pack", "name": "15.3(3)JA1", "product": { "name": "15.3(3)JA1", "product_id": "CSAFPID-204826" } }, { "category": "service_pack", "name": "15.3(3)JA4", "product": { "name": "15.3(3)JA4", "product_id": "CSAFPID-209067" } }, { "category": "service_pack", "name": "15.3(3)JA5", "product": { "name": "15.3(3)JA5", "product_id": "CSAFPID-209068" } }, { "category": "service_pack", "name": "15.3(3)JA6", "product": { "name": "15.3(3)JA6", "product_id": "CSAFPID-210937" } }, { "category": "service_pack", "name": "15.3(3)JA7", "product": { "name": "15.3(3)JA7", "product_id": "CSAFPID-214382" } }, { "category": "service_pack", "name": "15.3(3)JA8", "product": { "name": "15.3(3)JA8", "product_id": "CSAFPID-214764" } }, { "category": "service_pack", "name": "15.3(3)JA10", "product": { "name": "15.3(3)JA10", "product_id": "CSAFPID-217779" } }, { "category": "service_pack", "name": "15.3(3)JA11", "product": { "name": "15.3(3)JA11", "product_id": "CSAFPID-226174" } }, { "category": "service_pack", "name": "15.3(3)JA12", "product": { "name": "15.3(3)JA12", "product_id": "CSAFPID-230712" } } ], "category": "product_version", "name": "15.3JA" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JAA", "product": { "name": "15.3(3)JAA", "product_id": "CSAFPID-204103" } }, { "category": "service_pack", "name": "15.3(3)JAA1", "product": { "name": "15.3(3)JAA1", "product_id": "CSAFPID-230594" } } ], "category": "product_version", "name": "15.3JAA" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JB", "product": { "name": "15.3(3)JB", "product_id": "CSAFPID-209077" } } ], "category": "product_version", "name": "15.3JB" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SQD", "product": { "name": "15.0(2)SQD", "product_id": "CSAFPID-204324" } }, { "category": "service_pack", "name": "15.0(2)SQD1", "product": { "name": "15.0(2)SQD1", "product_id": "CSAFPID-209628" } }, { "category": "service_pack", "name": "15.0(2)SQD2", "product": { "name": "15.0(2)SQD2", "product_id": "CSAFPID-211290" } }, { "category": "service_pack", "name": "15.0(2)SQD3", "product": { "name": "15.0(2)SQD3", "product_id": "CSAFPID-217078" } }, { "category": "service_pack", "name": "15.0(2)SQD4", "product": { "name": "15.0(2)SQD4", "product_id": "CSAFPID-220670" } }, { "category": "service_pack", "name": "15.0(2)SQD5", "product": { "name": "15.0(2)SQD5", "product_id": "CSAFPID-225358" } }, { "category": "service_pack", "name": "15.0(2)SQD6", "product": { "name": "15.0(2)SQD6", "product_id": "CSAFPID-226038" } }, { "category": "service_pack", "name": "15.0(2)SQD7", "product": { "name": "15.0(2)SQD7", "product_id": "CSAFPID-227364" } }, { "category": "service_pack", "name": "15.0(2)SQD8", "product": { "name": "15.0(2)SQD8", "product_id": "CSAFPID-232850" } } ], "category": "product_version", "name": "15.0SQD" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JNB", "product": { "name": "15.3(3)JNB", "product_id": "CSAFPID-205723" } }, { "category": "service_pack", "name": "15.3(3)JNB1", "product": { "name": "15.3(3)JNB1", "product_id": "CSAFPID-209089" } }, { "category": "service_pack", "name": "15.3(3)JNB2", "product": { "name": "15.3(3)JNB2", "product_id": "CSAFPID-209090" } }, { "category": "service_pack", "name": "15.3(3)JNB3", "product": { "name": "15.3(3)JNB3", "product_id": "CSAFPID-210411" } }, { "category": "service_pack", "name": "15.3(3)JNB4", "product": { "name": "15.3(3)JNB4", "product_id": "CSAFPID-213655" } }, { "category": "service_pack", "name": "15.3(3)JNB6", "product": { "name": "15.3(3)JNB6", "product_id": "CSAFPID-224738" } }, { "category": "service_pack", "name": "15.3(3)JNB5", "product": { "name": "15.3(3)JNB5", "product_id": "CSAFPID-230606" } } ], "category": "product_version", "name": "15.3JNB" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JAX", "product": { "name": "15.3(3)JAX", "product_id": "CSAFPID-209073" } }, { "category": "service_pack", "name": "15.3(3)JAX1", "product": { "name": "15.3(3)JAX1", "product_id": "CSAFPID-209074" } }, { "category": "service_pack", "name": "15.3(3)JAX2", "product": { "name": "15.3(3)JAX2", "product_id": "CSAFPID-209075" } } ], "category": "product_version", "name": "15.3JAX" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JBB", "product": { "name": "15.3(3)JBB", "product_id": "CSAFPID-209080" } }, { "category": "service_pack", "name": "15.3(3)JBB1", "product": { "name": "15.3(3)JBB1", "product_id": "CSAFPID-209081" } }, { "category": "service_pack", "name": "15.3(3)JBB2", "product": { "name": "15.3(3)JBB2", "product_id": "CSAFPID-209419" } }, { "category": "service_pack", "name": "15.3(3)JBB4", "product": { "name": "15.3(3)JBB4", "product_id": "CSAFPID-210189" } }, { "category": "service_pack", "name": "15.3(3)JBB5", "product": { "name": "15.3(3)JBB5", "product_id": "CSAFPID-210262" } }, { "category": "service_pack", "name": "15.3(3)JBB6", "product": { "name": "15.3(3)JBB6", "product_id": "CSAFPID-210491" } }, { "category": "service_pack", "name": "15.3(3)JBB8", "product": { "name": "15.3(3)JBB8", "product_id": "CSAFPID-212266" } }, { "category": "service_pack", "name": "15.3(3)JBB6a", "product": { "name": "15.3(3)JBB6a", "product_id": "CSAFPID-213770" } } ], "category": "product_version", "name": "15.3JBB" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JC", "product": { "name": "15.3(3)JC", "product_id": "CSAFPID-209474" } }, { "category": "service_pack", "name": "15.3(3)JC1", "product": { "name": "15.3(3)JC1", "product_id": "CSAFPID-213089" } }, { "category": "service_pack", "name": "15.3(3)JC2", "product": { "name": "15.3(3)JC2", "product_id": "CSAFPID-216573" } }, { "category": "service_pack", "name": "15.3(3)JC3", "product": { "name": "15.3(3)JC3", "product_id": "CSAFPID-217803" } }, { "category": "service_pack", "name": "15.3(3)JC4", "product": { "name": "15.3(3)JC4", "product_id": "CSAFPID-220446" } }, { "category": "service_pack", "name": "15.3(3)JC5", "product": { "name": "15.3(3)JC5", "product_id": "CSAFPID-222258" } }, { "category": "service_pack", "name": "15.3(3)JC6", "product": { "name": "15.3(3)JC6", "product_id": "CSAFPID-224442" } }, { "category": "service_pack", "name": "15.3(3)JC8", "product": { "name": "15.3(3)JC8", "product_id": "CSAFPID-227791" } }, { "category": "service_pack", "name": "15.3(3)JC9", "product": { "name": "15.3(3)JC9", "product_id": "CSAFPID-230596" } }, { "category": "service_pack", "name": "15.3(3)JC14", "product": { "name": "15.3(3)JC14", "product_id": "CSAFPID-231017" } } ], "category": "product_version", "name": "15.3JC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JNC", "product": { "name": "15.3(3)JNC", "product_id": "CSAFPID-210137" } }, { "category": "service_pack", "name": "15.3(3)JNC1", "product": { "name": "15.3(3)JNC1", "product_id": "CSAFPID-212497" } }, { "category": "service_pack", "name": "15.3(3)JNC2", "product": { "name": "15.3(3)JNC2", "product_id": "CSAFPID-216632" } }, { "category": "service_pack", "name": "15.3(3)JNC3", "product": { "name": "15.3(3)JNC3", "product_id": "CSAFPID-222412" } }, { "category": "service_pack", "name": "15.3(3)JNC4", "product": { "name": "15.3(3)JNC4", "product_id": "CSAFPID-225662" } } ], "category": "product_version", "name": "15.3JNC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JNP", "product": { "name": "15.3(3)JNP", "product_id": "CSAFPID-211256" } }, { "category": "service_pack", "name": "15.3(3)JNP1", "product": { "name": "15.3(3)JNP1", "product_id": "CSAFPID-212686" } }, { "category": "service_pack", "name": "15.3(3)JNP3", "product": { "name": "15.3(3)JNP3", "product_id": "CSAFPID-220657" } } ], "category": "product_version", "name": "15.3JNP" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPB", "product": { "name": "15.3(3)JPB", "product_id": "CSAFPID-213843" } }, { "category": "service_pack", "name": "15.3(3)JPB1", "product": { "name": "15.3(3)JPB1", "product_id": "CSAFPID-216277" } } ], "category": "product_version", "name": "15.3JPB" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JD", "product": { "name": "15.3(3)JD", "product_id": "CSAFPID-213954" } }, { "category": "service_pack", "name": "15.3(3)JD2", "product": { "name": "15.3(3)JD2", "product_id": "CSAFPID-222630" } }, { "category": "service_pack", "name": "15.3(3)JD3", "product": { "name": "15.3(3)JD3", "product_id": "CSAFPID-222716" } }, { "category": "service_pack", "name": "15.3(3)JD4", "product": { "name": "15.3(3)JD4", "product_id": "CSAFPID-225790" } }, { "category": "service_pack", "name": "15.3(3)JD5", "product": { "name": "15.3(3)JD5", "product_id": "CSAFPID-226172" } }, { "category": "service_pack", "name": "15.3(3)JD6", "product": { "name": "15.3(3)JD6", "product_id": "CSAFPID-227789" } }, { "category": "service_pack", "name": "15.3(3)JD7", "product": { "name": "15.3(3)JD7", "product_id": "CSAFPID-228955" } }, { "category": "service_pack", "name": "15.3(3)JD8", "product": { "name": "15.3(3)JD8", "product_id": "CSAFPID-230598" } }, { "category": "service_pack", "name": "15.3(3)JD9", "product": { "name": "15.3(3)JD9", "product_id": "CSAFPID-230824" } }, { "category": "service_pack", "name": "15.3(3)JD11", "product": { "name": "15.3(3)JD11", "product_id": "CSAFPID-231000" } }, { "category": "service_pack", "name": "15.3(3)JD12", "product": { "name": "15.3(3)JD12", "product_id": "CSAFPID-231001" } }, { "category": "service_pack", "name": "15.3(3)JD13", "product": { "name": "15.3(3)JD13", "product_id": "CSAFPID-232852" } }, { "category": "service_pack", "name": "15.3(3)JD14", "product": { "name": "15.3(3)JD14", "product_id": "CSAFPID-234115" } }, { "category": "service_pack", "name": "15.3(3)JD16", "product": { "name": "15.3(3)JD16", "product_id": "CSAFPID-239225" } }, { "category": "service_pack", "name": "15.3(3)JD17", "product": { "name": "15.3(3)JD17", "product_id": "CSAFPID-259985" } } ], "category": "product_version", "name": "15.3JD" }, { "branches": [ { "category": "service_pack", "name": "15.2(4)EC1", "product": { "name": "15.2(4)EC1", "product_id": "CSAFPID-220461" } }, { "category": "service_pack", "name": "15.2(4)EC2", "product": { "name": "15.2(4)EC2", "product_id": "CSAFPID-223086" } } ], "category": "product_version", "name": "15.2EC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPC", "product": { "name": "15.3(3)JPC", "product_id": "CSAFPID-217048" } }, { "category": "service_pack", "name": "15.3(3)JPC1", "product": { "name": "15.3(3)JPC1", "product_id": "CSAFPID-220235" } }, { "category": "service_pack", "name": "15.3(3)JPC2", "product": { "name": "15.3(3)JPC2", "product_id": "CSAFPID-220658" } }, { "category": "service_pack", "name": "15.3(3)JPC3", "product": { "name": "15.3(3)JPC3", "product_id": "CSAFPID-225167" } }, { "category": "service_pack", "name": "15.3(3)JPC100", "product": { "name": "15.3(3)JPC100", "product_id": "CSAFPID-230994" } }, { "category": "service_pack", "name": "15.3(3)JPC5", "product": { "name": "15.3(3)JPC5", "product_id": "CSAFPID-230995" } }, { "category": "service_pack", "name": "15.3(3)JPC99", "product": { "name": "15.3(3)JPC99", "product_id": "CSAFPID-273510" } }, { "category": "service_pack", "name": "15.3(3)JPC97", "product": { "name": "15.3(3)JPC97", "product_id": "CSAFPID-278403" } } ], "category": "product_version", "name": "15.3JPC" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JND", "product": { "name": "15.3(3)JND", "product_id": "CSAFPID-217194" } }, { "category": "service_pack", "name": "15.3(3)JND1", "product": { "name": "15.3(3)JND1", "product_id": "CSAFPID-222930" } }, { "category": "service_pack", "name": "15.3(3)JND2", "product": { "name": "15.3(3)JND2", "product_id": "CSAFPID-226202" } }, { "category": "service_pack", "name": "15.3(3)JND3", "product": { "name": "15.3(3)JND3", "product_id": "CSAFPID-227960" } } ], "category": "product_version", "name": "15.3JND" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JE", "product": { "name": "15.3(3)JE", "product_id": "CSAFPID-218946" } } ], "category": "product_version", "name": "15.3JE" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPD", "product": { "name": "15.3(3)JPD", "product_id": "CSAFPID-218948" } } ], "category": "product_version", "name": "15.3JPD" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JF", "product": { "name": "15.3(3)JF", "product_id": "CSAFPID-227048" } }, { "category": "service_pack", "name": "15.3(3)JF1", "product": { "name": "15.3(3)JF1", "product_id": "CSAFPID-228956" } }, { "category": "service_pack", "name": "15.3(3)JF2", "product": { "name": "15.3(3)JF2", "product_id": "CSAFPID-230826" } }, { "category": "service_pack", "name": "15.3(3)JF4", "product": { "name": "15.3(3)JF4", "product_id": "CSAFPID-231679" } }, { "category": "service_pack", "name": "15.3(3)JF5", "product": { "name": "15.3(3)JF5", "product_id": "CSAFPID-232061" } }, { "category": "service_pack", "name": "15.3(3)JF6", "product": { "name": "15.3(3)JF6", "product_id": "CSAFPID-236205" } }, { "category": "service_pack", "name": "15.3(3)JF7", "product": { "name": "15.3(3)JF7", "product_id": "CSAFPID-239361" } }, { "category": "service_pack", "name": "15.3(3)JF8", "product": { "name": "15.3(3)JF8", "product_id": "CSAFPID-241765" } }, { "category": "service_pack", "name": "15.3(3)JF9", "product": { "name": "15.3(3)JF9", "product_id": "CSAFPID-243525" } }, { "category": "service_pack", "name": "15.3(3)JF10", "product": { "name": "15.3(3)JF10", "product_id": "CSAFPID-259238" } }, { "category": "service_pack", "name": "15.3(3)JF15i", "product": { "name": "15.3(3)JF15i", "product_id": "CSAFPID-284786" } } ], "category": "product_version", "name": "15.3JF" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JG", "product": { "name": "15.3(3)JG", "product_id": "CSAFPID-230603" } }, { "category": "service_pack", "name": "15.3(3)JG1", "product": { "name": "15.3(3)JG1", "product_id": "CSAFPID-231796" } } ], "category": "product_version", "name": "15.3JG" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JH", "product": { "name": "15.3(3)JH", "product_id": "CSAFPID-230605" } }, { "category": "service_pack", "name": "15.3(3)JH1", "product": { "name": "15.3(3)JH1", "product_id": "CSAFPID-238504" } } ], "category": "product_version", "name": "15.3JH" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JI1", "product": { "name": "15.3(3)JI1", "product_id": "CSAFPID-244913" } }, { "category": "service_pack", "name": "15.3(3)JI3", "product": { "name": "15.3(3)JI3", "product_id": "CSAFPID-252156" } }, { "category": "service_pack", "name": "15.3(3)JI4", "product": { "name": "15.3(3)JI4", "product_id": "CSAFPID-257209" } }, { "category": "service_pack", "name": "15.3(3)JI5", "product": { "name": "15.3(3)JI5", "product_id": "CSAFPID-260691" } } ], "category": "product_version", "name": "15.3JI" }, { "branches": [ { "category": "service_pack", "name": "12.2(6)I1", "product": { "name": "12.2(6)I1", "product_id": "CSAFPID-243144" } } ], "category": "product_version", "name": "12.2I" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JK", "product": { "name": "15.3(3)JK", "product_id": "CSAFPID-255002" } }, { "category": "service_pack", "name": "15.3(3)JK99", "product": { "name": "15.3(3)JK99", "product_id": "CSAFPID-273350" } }, { "category": "service_pack", "name": "15.3(3)JK3", "product": { "name": "15.3(3)JK3", "product_id": "CSAFPID-277339" } }, { "category": "service_pack", "name": "15.3(3)JK1a", "product": { "name": "15.3(3)JK1a", "product_id": "CSAFPID-277340" } }, { "category": "service_pack", "name": "15.3(3)JK2a", "product": { "name": "15.3(3)JK2a", "product_id": "CSAFPID-277341" } }, { "category": "service_pack", "name": "15.3(3)JK1t", "product": { "name": "15.3(3)JK1t", "product_id": "CSAFPID-277352" } }, { "category": "service_pack", "name": "15.3(3)JK6", "product": { "name": "15.3(3)JK6", "product_id": "CSAFPID-282669" } }, { "category": "service_pack", "name": "15.3(3)JK7", "product": { "name": "15.3(3)JK7", "product_id": "CSAFPID-286111" } }, { "category": "service_pack", "name": "15.3(3)JK8", "product": { "name": "15.3(3)JK8", "product_id": "CSAFPID-287121" } }, { "category": "service_pack", "name": "15.3(3)JK8a", "product": { "name": "15.3(3)JK8a", "product_id": "CSAFPID-290656" } }, { "category": "service_pack", "name": "15.3(3)JK8b", "product": { "name": "15.3(3)JK8b", "product_id": "CSAFPID-292482" } }, { "category": "service_pack", "name": "15.3(3)JK9", "product": { "name": "15.3(3)JK9", "product_id": "CSAFPID-294801" } }, { "category": "service_pack", "name": "15.3(3)JK10", "product": { "name": "15.3(3)JK10", "product_id": "CSAFPID-299944" } }, { "category": "service_pack", "name": "15.3(3)JK11", "product": { "name": "15.3(3)JK11", "product_id": "CSAFPID-301233" } } ], "category": "product_version", "name": "15.3JK" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JJ", "product": { "name": "15.3(3)JJ", "product_id": "CSAFPID-259869" } }, { "category": "service_pack", "name": "15.3(3)JJ1", "product": { "name": "15.3(3)JJ1", "product_id": "CSAFPID-261487" } } ], "category": "product_version", "name": "15.3JJ" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVR1", "product": { "name": "15.1(3)SVR1", "product_id": "CSAFPID-277230" } }, { "category": "service_pack", "name": "15.1(3)SVR2", "product": { "name": "15.1(3)SVR2", "product_id": "CSAFPID-277253" } }, { "category": "service_pack", "name": "15.1(3)SVR3", "product": { "name": "15.1(3)SVR3", "product_id": "CSAFPID-279337" } }, { "category": "service_pack", "name": "15.1(3)SVR10", "product": { "name": "15.1(3)SVR10", "product_id": "CSAFPID-290618" } } ], "category": "product_version", "name": "15.1SVR" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPI", "product": { "name": "15.3(3)JPI", "product_id": "CSAFPID-274202" } }, { "category": "service_pack", "name": "15.3(3)JPI3", "product": { "name": "15.3(3)JPI3", "product_id": "CSAFPID-274203" } }, { "category": "service_pack", "name": "15.3(3)JPI7", "product": { "name": "15.3(3)JPI7", "product_id": "CSAFPID-278804" } }, { "category": "service_pack", "name": "15.3(3)JPI6a", "product": { "name": "15.3(3)JPI6a", "product_id": "CSAFPID-278884" } }, { "category": "service_pack", "name": "15.3(3)JPI8a", "product": { "name": "15.3(3)JPI8a", "product_id": "CSAFPID-285319" } }, { "category": "service_pack", "name": "15.3(3)JPI9", "product": { "name": "15.3(3)JPI9", "product_id": "CSAFPID-285320" } }, { "category": "service_pack", "name": "15.3(3)JPI10", "product": { "name": "15.3(3)JPI10", "product_id": "CSAFPID-286520" } } ], "category": "product_version", "name": "15.3JPI" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPJ", "product": { "name": "15.3(3)JPJ", "product_id": "CSAFPID-275845" } }, { "category": "service_pack", "name": "15.3(3)JPJ2t", "product": { "name": "15.3(3)JPJ2t", "product_id": "CSAFPID-277354" } }, { "category": "service_pack", "name": "15.3(3)JPJ3a", "product": { "name": "15.3(3)JPJ3a", "product_id": "CSAFPID-277355" } }, { "category": "service_pack", "name": "15.3(3)JPJ4", "product": { "name": "15.3(3)JPJ4", "product_id": "CSAFPID-278880" } }, { "category": "service_pack", "name": "15.3(3)JPJ5", "product": { "name": "15.3(3)JPJ5", "product_id": "CSAFPID-280472" } }, { "category": "service_pack", "name": "15.3(3)JPJ6", "product": { "name": "15.3(3)JPJ6", "product_id": "CSAFPID-280832" } }, { "category": "service_pack", "name": "15.3(3)JPJ7", "product": { "name": "15.3(3)JPJ7", "product_id": "CSAFPID-282651" } }, { "category": "service_pack", "name": "15.3(3)JPJ7c", "product": { "name": "15.3(3)JPJ7c", "product_id": "CSAFPID-285321" } }, { "category": "service_pack", "name": "15.3(3)JPJ8a", "product": { "name": "15.3(3)JPJ8a", "product_id": "CSAFPID-286497" } }, { "category": "service_pack", "name": "15.3(3)JPJ9", "product": { "name": "15.3(3)JPJ9", "product_id": "CSAFPID-290465" } }, { "category": "service_pack", "name": "15.3(3)JPJ10", "product": { "name": "15.3(3)JPJ10", "product_id": "CSAFPID-292769" } }, { "category": "service_pack", "name": "15.3(3)JPJ11", "product": { "name": "15.3(3)JPJ11", "product_id": "CSAFPID-299941" } } ], "category": "product_version", "name": "15.3JPJ" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVS", "product": { "name": "15.1(3)SVS", "product_id": "CSAFPID-277232" } }, { "category": "service_pack", "name": "15.1(3)SVS1", "product": { "name": "15.1(3)SVS1", "product_id": "CSAFPID-279335" } } ], "category": "product_version", "name": "15.1SVS" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPK", "product": { "name": "15.3(3)JPK", "product_id": "CSAFPID-280661" } }, { "category": "service_pack", "name": "15.3(3)JPK1", "product": { "name": "15.3(3)JPK1", "product_id": "CSAFPID-280833" } }, { "category": "service_pack", "name": "15.3(3)JPK2", "product": { "name": "15.3(3)JPK2", "product_id": "CSAFPID-282027" } }, { "category": "service_pack", "name": "15.3(3)JPK3", "product": { "name": "15.3(3)JPK3", "product_id": "CSAFPID-282114" } }, { "category": "service_pack", "name": "15.3(3)JPK4", "product": { "name": "15.3(3)JPK4", "product_id": "CSAFPID-286030" } }, { "category": "service_pack", "name": "15.3(3)JPK5", "product": { "name": "15.3(3)JPK5", "product_id": "CSAFPID-286559" } }, { "category": "service_pack", "name": "15.3(3)JPK6", "product": { "name": "15.3(3)JPK6", "product_id": "CSAFPID-289303" } }, { "category": "service_pack", "name": "15.3(3)JPK7", "product": { "name": "15.3(3)JPK7", "product_id": "CSAFPID-292655" } }, { "category": "service_pack", "name": "15.3(3)JPK8", "product": { "name": "15.3(3)JPK8", "product_id": "CSAFPID-300783" } }, { "category": "service_pack", "name": "15.3(3)JPK9", "product": { "name": "15.3(3)JPK9", "product_id": "CSAFPID-301579" } } ], "category": "product_version", "name": "15.3JPK" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVT1", "product": { "name": "15.1(3)SVT1", "product_id": "CSAFPID-280759" } }, { "category": "service_pack", "name": "15.1(3)SVT2", "product": { "name": "15.1(3)SVT2", "product_id": "CSAFPID-282026" } }, { "category": "service_pack", "name": "15.1(3)SVT3", "product": { "name": "15.1(3)SVT3", "product_id": "CSAFPID-284785" } }, { "category": "service_pack", "name": "15.1(3)SVT4", "product": { "name": "15.1(3)SVT4", "product_id": "CSAFPID-286399" } } ], "category": "product_version", "name": "15.1SVT" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVU1", "product": { "name": "15.1(3)SVU1", "product_id": "CSAFPID-283833" } }, { "category": "service_pack", "name": "15.1(3)SVU10", "product": { "name": "15.1(3)SVU10", "product_id": "CSAFPID-284291" } }, { "category": "service_pack", "name": "15.1(3)SVU2", "product": { "name": "15.1(3)SVU2", "product_id": "CSAFPID-284566" } }, { "category": "service_pack", "name": "15.1(3)SVU11", "product": { "name": "15.1(3)SVU11", "product_id": "CSAFPID-286400" } }, { "category": "service_pack", "name": "15.1(3)SVU20", "product": { "name": "15.1(3)SVU20", "product_id": "CSAFPID-289270" } }, { "category": "service_pack", "name": "15.1(3)SVU21", "product": { "name": "15.1(3)SVU21", "product_id": "CSAFPID-290557" } } ], "category": "product_version", "name": "15.1SVU" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVV1", "product": { "name": "15.1(3)SVV1", "product_id": "CSAFPID-284341" } }, { "category": "service_pack", "name": "15.1(3)SVV2", "product": { "name": "15.1(3)SVV2", "product_id": "CSAFPID-286029" } }, { "category": "service_pack", "name": "15.1(3)SVV3", "product": { "name": "15.1(3)SVV3", "product_id": "CSAFPID-286940" } }, { "category": "service_pack", "name": "15.1(3)SVV4", "product": { "name": "15.1(3)SVV4", "product_id": "CSAFPID-289371" } } ], "category": "product_version", "name": "15.1SVV" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPL", "product": { "name": "15.3(3)JPL", "product_id": "CSAFPID-285323" } } ], "category": "product_version", "name": "15.3JPL" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPM", "product": { "name": "15.3(3)JPM", "product_id": "CSAFPID-286352" } } ], "category": "product_version", "name": "15.3JPM" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVW", "product": { "name": "15.1(3)SVW", "product_id": "CSAFPID-286451" } }, { "category": "service_pack", "name": "15.1(3)SVW1", "product": { "name": "15.1(3)SVW1", "product_id": "CSAFPID-286844" } } ], "category": "product_version", "name": "15.1SVW" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVX", "product": { "name": "15.1(3)SVX", "product_id": "CSAFPID-286927" } }, { "category": "service_pack", "name": "15.1(3)SVX1", "product": { "name": "15.1(3)SVX1", "product_id": "CSAFPID-289301" } } ], "category": "product_version", "name": "15.1SVX" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPN", "product": { "name": "15.3(3)JPN", "product_id": "CSAFPID-287185" } }, { "category": "service_pack", "name": "15.3(3)JPN1", "product": { "name": "15.3(3)JPN1", "product_id": "CSAFPID-290587" } }, { "category": "service_pack", "name": "15.3(3)JPN2", "product": { "name": "15.3(3)JPN2", "product_id": "CSAFPID-292654" } }, { "category": "service_pack", "name": "15.3(3)JPN3", "product": { "name": "15.3(3)JPN3", "product_id": "CSAFPID-296664" } }, { "category": "service_pack", "name": "15.3(3)JPN4", "product": { "name": "15.3(3)JPN4", "product_id": "CSAFPID-300502" } }, { "category": "service_pack", "name": "15.3(3)JPN5", "product": { "name": "15.3(3)JPN5", "product_id": "CSAFPID-301721" } }, { "category": "service_pack", "name": "15.3(3)JPN6", "product": { "name": "15.3(3)JPN6", "product_id": "CSAFPID-302978" } } ], "category": "product_version", "name": "15.3JPN" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPO", "product": { "name": "15.3(3)JPO", "product_id": "CSAFPID-290479" } } ], "category": "product_version", "name": "15.3JPO" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPP", "product": { "name": "15.3(3)JPP", "product_id": "CSAFPID-294791" } } ], "category": "product_version", "name": "15.3JPP" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPQ", "product": { "name": "15.3(3)JPQ", "product_id": "CSAFPID-296759" } }, { "category": "service_pack", "name": "15.3(3)JPQ1", "product": { "name": "15.3(3)JPQ1", "product_id": "CSAFPID-300835" } }, { "category": "service_pack", "name": "15.3(3)JPQ2", "product": { "name": "15.3(3)JPQ2", "product_id": "CSAFPID-300949" } }, { "category": "service_pack", "name": "15.3(3)JPQ3", "product": { "name": "15.3(3)JPQ3", "product_id": "CSAFPID-301472" } }, { "category": "service_pack", "name": "15.3(3)JPQ4", "product": { "name": "15.3(3)JPQ4", "product_id": "CSAFPID-302624" } } ], "category": "product_version", "name": "15.3JPQ" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPR", "product": { "name": "15.3(3)JPR", "product_id": "CSAFPID-300837" } }, { "category": "service_pack", "name": "15.3(3)JPR1", "product": { "name": "15.3(3)JPR1", "product_id": "CSAFPID-300950" } } ], "category": "product_version", "name": "15.3JPR" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPS", "product": { "name": "15.3(3)JPS", "product_id": "CSAFPID-301223" } } ], "category": "product_version", "name": "15.3JPS" }, { "branches": [ { "category": "service_pack", "name": "15.3(3)JPT", "product": { "name": "15.3(3)JPT", "product_id": "CSAFPID-301225" } }, { "category": "service_pack", "name": "15.3(3)JPT1", "product": { "name": "15.3(3)JPT1", "product_id": "CSAFPID-302781" } }, { "category": "service_pack", "name": "15.3(3)JPT2", "product": { "name": "15.3(3)JPT2", "product_id": "CSAFPID-303044" } } ], "category": "product_version", "name": "15.3JPT" } ], "category": "product_family", "name": "IOS" }, { "branches": [ { "branches": [ { "category": "service_pack", "name": "3.6.5bE", "product": { "name": "3.6.5bE", "product_id": "CSAFPID-222435" } } ], "category": "product_version", "name": "3.6E" }, { "branches": [ { "category": "service_pack", "name": "3.8.9E", "product": { "name": "3.8.9E", "product_id": "CSAFPID-264514" } }, { "category": "service_pack", "name": "3.8.10E", "product": { "name": "3.8.10E", "product_id": "CSAFPID-271633" } }, { "category": "service_pack", "name": "3.8.10cE", "product": { "name": "3.8.10cE", "product_id": "CSAFPID-284346" } }, { "category": "service_pack", "name": "3.8.10dE", "product": { "name": "3.8.10dE", "product_id": "CSAFPID-286453" } } ], "category": "product_version", "name": "3.8E" }, { "branches": [ { "category": "service_pack", "name": "16.3.9", "product": { "name": "16.3.9", "product_id": "CSAFPID-262389" } } ], "category": "product_version", "name": "16.3" }, { "branches": [ { "category": "service_pack", "name": "16.6.7", "product": { "name": "16.6.7", "product_id": "CSAFPID-261241" } }, { "category": "service_pack", "name": "16.6.7a", "product": { "name": "16.6.7a", "product_id": "CSAFPID-270097" } }, { "category": "service_pack", "name": "16.6.8", "product": { "name": "16.6.8", "product_id": "CSAFPID-277148" } }, { "category": "service_pack", "name": "16.6.9", "product": { "name": "16.6.9", "product_id": "CSAFPID-280801" } }, { "category": "service_pack", "name": "16.6.10", "product": { "name": "16.6.10", "product_id": "CSAFPID-283835" } } ], "category": "product_version", "name": "16.6" }, { "branches": [ { "category": "service_pack", "name": "16.9.1", "product": { "name": "16.9.1", "product_id": "CSAFPID-225856" } }, { "category": "service_pack", "name": "16.9.1d", "product": { "name": "16.9.1d", "product_id": "CSAFPID-248242" } }, { "category": "service_pack", "name": "16.9.4", "product": { "name": "16.9.4", "product_id": "CSAFPID-262390" } }, { "category": "service_pack", "name": "16.9.4c", "product": { "name": "16.9.4c", "product_id": "CSAFPID-268921" } }, { "category": "service_pack", "name": "16.9.5f", "product": { "name": "16.9.5f", "product_id": "CSAFPID-276837" } }, { "category": "service_pack", "name": "16.9.6", "product": { "name": "16.9.6", "product_id": "CSAFPID-277945" } }, { "category": "service_pack", "name": "16.9.7", "product": { "name": "16.9.7", "product_id": "CSAFPID-280651" } }, { "category": "service_pack", "name": "16.9.8", "product": { "name": "16.9.8", "product_id": "CSAFPID-280938" } }, { "category": "service_pack", "name": "16.9.8a", "product": { "name": "16.9.8a", "product_id": "CSAFPID-290562" } }, { "category": "service_pack", "name": "16.9.8b", "product": { "name": "16.9.8b", "product_id": "CSAFPID-290669" } } ], "category": "product_version", "name": "16.9" }, { "branches": [ { "category": "service_pack", "name": "16.10.1", "product": { "name": "16.10.1", "product_id": "CSAFPID-225858" } }, { "category": "service_pack", "name": "16.10.1e", "product": { "name": "16.10.1e", "product_id": "CSAFPID-257955" } }, { "category": "service_pack", "name": "16.10.2", "product": { "name": "16.10.2", "product_id": "CSAFPID-260917" } }, { "category": "service_pack", "name": "16.10.1g", "product": { "name": "16.10.1g", "product_id": "CSAFPID-266259" } } ], "category": "product_version", "name": "16.10" }, { "branches": [ { "category": "service_pack", "name": "3.10.3E", "product": { "name": "3.10.3E", "product_id": "CSAFPID-262994" } } ], "category": "product_version", "name": "3.10E" }, { "branches": [ { "category": "service_pack", "name": "16.11.1", "product": { "name": "16.11.1", "product_id": "CSAFPID-227918" } }, { "category": "service_pack", "name": "16.11.1a", "product": { "name": "16.11.1a", "product_id": "CSAFPID-252271" } }, { "category": "service_pack", "name": "16.11.1b", "product": { "name": "16.11.1b", "product_id": "CSAFPID-260741" } }, { "category": "service_pack", "name": "16.11.2", "product": { "name": "16.11.2", "product_id": "CSAFPID-261240" } }, { "category": "service_pack", "name": "16.11.1s", "product": { "name": "16.11.1s", "product_id": "CSAFPID-261465" } }, { "category": "service_pack", "name": "16.11.1c", "product": { "name": "16.11.1c", "product_id": "CSAFPID-264096" } } ], "category": "product_version", "name": "16.11" }, { "branches": [ { "category": "service_pack", "name": "16.12.1", "product": { "name": "16.12.1", "product_id": "CSAFPID-227920" } }, { "category": "service_pack", "name": "16.12.1s", "product": { "name": "16.12.1s", "product_id": "CSAFPID-265735" } }, { "category": "service_pack", "name": "16.12.1a", "product": { "name": "16.12.1a", "product_id": "CSAFPID-265841" } }, { "category": "service_pack", "name": "16.12.1c", "product": { "name": "16.12.1c", "product_id": "CSAFPID-267110" } }, { "category": "service_pack", "name": "16.12.1w", "product": { "name": "16.12.1w", "product_id": "CSAFPID-267240" } }, { "category": "service_pack", "name": "16.12.1y", "product": { "name": "16.12.1y", "product_id": "CSAFPID-271938" } }, { "category": "service_pack", "name": "16.12.1x", "product": { "name": "16.12.1x", "product_id": "CSAFPID-273649" } }, { "category": "service_pack", "name": "16.12.1t", "product": { "name": "16.12.1t", "product_id": "CSAFPID-274832" } } ], "category": "product_version", "name": "16.12" } ], "category": "product_family", "name": "Cisco IOS XE Software" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-3225", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvo17827" }, { "system_name": "Cisco Bug ID", "text": "CSCvp56319" }, { "system_name": "Cisco Bug ID", "text": "CSCvr47365" }, { "system_name": "Cisco Bug ID", "text": "CSCvr67776" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-103763", "CSAFPID-103955", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104101", "CSAFPID-104342", "CSAFPID-104376", "CSAFPID-104855", "CSAFPID-105253", "CSAFPID-105394", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106072", "CSAFPID-106684", "CSAFPID-106997", "CSAFPID-107209", "CSAFPID-107630", "CSAFPID-107852", "CSAFPID-109098", "CSAFPID-109439", "CSAFPID-109442", "CSAFPID-109808", "CSAFPID-111005", "CSAFPID-111674", "CSAFPID-114665", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117282", "CSAFPID-184125", "CSAFPID-187057", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-191928", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-195481", "CSAFPID-195528", "CSAFPID-195544", "CSAFPID-195770", "CSAFPID-197462", "CSAFPID-197468", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200492", "CSAFPID-200503", "CSAFPID-201074", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204103", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204310", "CSAFPID-204324", "CSAFPID-204826", "CSAFPID-204831", "CSAFPID-205672", "CSAFPID-205723", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209067", "CSAFPID-209068", "CSAFPID-209073", "CSAFPID-209074", "CSAFPID-209075", "CSAFPID-209077", "CSAFPID-209080", "CSAFPID-209081", "CSAFPID-209083", "CSAFPID-209085", "CSAFPID-209086", "CSAFPID-209087", "CSAFPID-209089", "CSAFPID-209090", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209419", "CSAFPID-209474", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209930", "CSAFPID-209935", "CSAFPID-210137", "CSAFPID-210189", "CSAFPID-210203", "CSAFPID-210262", "CSAFPID-210410", "CSAFPID-210411", "CSAFPID-210491", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210937", "CSAFPID-210958", "CSAFPID-211256", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212266", "CSAFPID-212497", "CSAFPID-212686", "CSAFPID-213089", "CSAFPID-213654", "CSAFPID-213655", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213843", "CSAFPID-213954", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214382", "CSAFPID-214556", "CSAFPID-214764", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-216277", "CSAFPID-216295", "CSAFPID-216573", "CSAFPID-216632", "CSAFPID-217048", "CSAFPID-217078", "CSAFPID-217194", "CSAFPID-217779", "CSAFPID-217803", "CSAFPID-218891", "CSAFPID-218946", "CSAFPID-218948", "CSAFPID-220038", "CSAFPID-220235", "CSAFPID-220441", "CSAFPID-220446", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220657", "CSAFPID-220658", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-222258", "CSAFPID-222342", "CSAFPID-222412", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222537", "CSAFPID-222630", "CSAFPID-222716", "CSAFPID-222924", "CSAFPID-222930", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-224442", "CSAFPID-224738", "CSAFPID-224868", "CSAFPID-225160", "CSAFPID-225167", "CSAFPID-225358", "CSAFPID-225662", "CSAFPID-225740", "CSAFPID-225790", "CSAFPID-226038", "CSAFPID-226077", "CSAFPID-226172", "CSAFPID-226174", "CSAFPID-226202", "CSAFPID-227048", "CSAFPID-227364", "CSAFPID-227598", "CSAFPID-227789", "CSAFPID-227791", "CSAFPID-227960", "CSAFPID-228057", "CSAFPID-228075", "CSAFPID-228151", "CSAFPID-228955", "CSAFPID-228956", "CSAFPID-230587", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230591", "CSAFPID-230592", "CSAFPID-230594", "CSAFPID-230596", "CSAFPID-230598", "CSAFPID-230603", "CSAFPID-230605", "CSAFPID-230606", "CSAFPID-230712", "CSAFPID-230824", "CSAFPID-230826", "CSAFPID-230915", "CSAFPID-230962", "CSAFPID-230965", "CSAFPID-230992", "CSAFPID-230994", "CSAFPID-230995", "CSAFPID-231000", "CSAFPID-231001", "CSAFPID-231017", "CSAFPID-231245", "CSAFPID-231679", "CSAFPID-231796", "CSAFPID-232061", "CSAFPID-232122", "CSAFPID-232765", "CSAFPID-232850", "CSAFPID-232852", "CSAFPID-234115", "CSAFPID-234926", "CSAFPID-236205", "CSAFPID-238504", "CSAFPID-238999", "CSAFPID-239225", "CSAFPID-239279", "CSAFPID-239361", "CSAFPID-240186", "CSAFPID-241614", "CSAFPID-241765", "CSAFPID-241916", "CSAFPID-242313", "CSAFPID-243144", "CSAFPID-243525", "CSAFPID-244911", "CSAFPID-244913", "CSAFPID-245380", "CSAFPID-247630", "CSAFPID-251487", "CSAFPID-252156", "CSAFPID-255002", "CSAFPID-257209", "CSAFPID-257830", "CSAFPID-259238", "CSAFPID-259869", "CSAFPID-259985", "CSAFPID-260691", "CSAFPID-260993", "CSAFPID-261487", "CSAFPID-262300", "CSAFPID-262335", "CSAFPID-262536", "CSAFPID-262684", "CSAFPID-263981", "CSAFPID-264643", "CSAFPID-271140", "CSAFPID-271286", "CSAFPID-273350", "CSAFPID-273510", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-274203", "CSAFPID-275845", "CSAFPID-276903", "CSAFPID-277230", "CSAFPID-277232", "CSAFPID-277253", "CSAFPID-277339", "CSAFPID-277340", "CSAFPID-277341", "CSAFPID-277352", "CSAFPID-277354", "CSAFPID-277355", "CSAFPID-278029", "CSAFPID-278403", "CSAFPID-278804", "CSAFPID-278880", "CSAFPID-278884", "CSAFPID-279335", "CSAFPID-279337", "CSAFPID-280472", "CSAFPID-280661", "CSAFPID-280759", "CSAFPID-280778", "CSAFPID-280779", "CSAFPID-280832", "CSAFPID-280833", "CSAFPID-282026", "CSAFPID-282027", "CSAFPID-282114", "CSAFPID-282651", "CSAFPID-282669", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284349", "CSAFPID-284566", "CSAFPID-284567", "CSAFPID-284785", "CSAFPID-284786", "CSAFPID-285319", "CSAFPID-285320", "CSAFPID-285321", "CSAFPID-285323", "CSAFPID-286029", "CSAFPID-286030", "CSAFPID-286111", "CSAFPID-286352", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286452", "CSAFPID-286497", "CSAFPID-286520", "CSAFPID-286559", "CSAFPID-286843", "CSAFPID-286844", "CSAFPID-286860", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-287121", "CSAFPID-287185", "CSAFPID-289270", "CSAFPID-289301", "CSAFPID-289303", "CSAFPID-289371", "CSAFPID-290465", "CSAFPID-290479", "CSAFPID-290557", "CSAFPID-290587", "CSAFPID-290618", "CSAFPID-290656", "CSAFPID-292482", "CSAFPID-292654", "CSAFPID-292655", "CSAFPID-292769", "CSAFPID-294791", "CSAFPID-294801", "CSAFPID-296664", "CSAFPID-296759", "CSAFPID-299941", "CSAFPID-299944", "CSAFPID-300502", "CSAFPID-300783", "CSAFPID-300835", "CSAFPID-300837", "CSAFPID-300949", "CSAFPID-300950", "CSAFPID-301223", "CSAFPID-301225", "CSAFPID-301233", "CSAFPID-301472", "CSAFPID-301579", "CSAFPID-301721", "CSAFPID-302624", "CSAFPID-302781", "CSAFPID-302978", "CSAFPID-303044", "CSAFPID-222435", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-248242", "CSAFPID-252271", "CSAFPID-257955", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262994", "CSAFPID-264096", "CSAFPID-264514", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271633", "CSAFPID-271938", "CSAFPID-273649", "CSAFPID-274832", "CSAFPID-276837", "CSAFPID-277148", "CSAFPID-277945", "CSAFPID-280651", "CSAFPID-280801", "CSAFPID-280938", "CSAFPID-283835", "CSAFPID-284346", "CSAFPID-286453", "CSAFPID-290562", "CSAFPID-290669" ] }, "release_date": "2020-06-03T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-222435", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-248242", "CSAFPID-252271", "CSAFPID-257955", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262994", "CSAFPID-264096", "CSAFPID-264514", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271633", "CSAFPID-271938", "CSAFPID-273649", "CSAFPID-274832", "CSAFPID-276837", "CSAFPID-277148", "CSAFPID-277945", "CSAFPID-280651", "CSAFPID-280801", "CSAFPID-280938", "CSAFPID-283835", "CSAFPID-284346", "CSAFPID-286453", "CSAFPID-290562", "CSAFPID-290669", "CSAFPID-103763", "CSAFPID-103955", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104101", "CSAFPID-104342", "CSAFPID-104376", "CSAFPID-104855", "CSAFPID-105253", "CSAFPID-105394", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106072", "CSAFPID-106684", "CSAFPID-106997", "CSAFPID-107209", "CSAFPID-107630", "CSAFPID-107852", "CSAFPID-109098", "CSAFPID-109439", "CSAFPID-109442", "CSAFPID-109808", "CSAFPID-111005", "CSAFPID-111674", "CSAFPID-114665", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117282", "CSAFPID-184125", "CSAFPID-187057", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-191928", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-195481", "CSAFPID-195528", "CSAFPID-195544", "CSAFPID-195770", "CSAFPID-197462", "CSAFPID-197468", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200492", "CSAFPID-200503", "CSAFPID-201074", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204103", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204310", "CSAFPID-204324", "CSAFPID-204826", "CSAFPID-204831", "CSAFPID-205672", "CSAFPID-205723", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209067", "CSAFPID-209068", "CSAFPID-209073", "CSAFPID-209074", "CSAFPID-209075", "CSAFPID-209077", "CSAFPID-209080", "CSAFPID-209081", "CSAFPID-209083", "CSAFPID-209085", "CSAFPID-209086", "CSAFPID-209087", "CSAFPID-209089", "CSAFPID-209090", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209419", "CSAFPID-209474", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209930", "CSAFPID-209935", "CSAFPID-210137", "CSAFPID-210189", "CSAFPID-210203", "CSAFPID-210262", "CSAFPID-210410", "CSAFPID-210411", "CSAFPID-210491", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210937", "CSAFPID-210958", "CSAFPID-211256", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212266", "CSAFPID-212497", "CSAFPID-212686", "CSAFPID-213089", "CSAFPID-213654", "CSAFPID-213655", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213843", "CSAFPID-213954", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214382", "CSAFPID-214556", "CSAFPID-214764", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-216277", "CSAFPID-216295", "CSAFPID-216573", "CSAFPID-216632", "CSAFPID-217048", "CSAFPID-217078", "CSAFPID-217194", "CSAFPID-217779", "CSAFPID-217803", "CSAFPID-218891", "CSAFPID-218946", "CSAFPID-218948", "CSAFPID-220038", "CSAFPID-220235", "CSAFPID-220441", "CSAFPID-220446", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220657", "CSAFPID-220658", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-222258", "CSAFPID-222342", "CSAFPID-222412", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222537", "CSAFPID-222630", "CSAFPID-222716", "CSAFPID-222924", "CSAFPID-222930", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-224442", "CSAFPID-224738", "CSAFPID-224868", "CSAFPID-225160", "CSAFPID-225167", "CSAFPID-225358", "CSAFPID-225662", "CSAFPID-225740", "CSAFPID-225790", "CSAFPID-226038", "CSAFPID-226077", "CSAFPID-226172", "CSAFPID-226174", "CSAFPID-226202", "CSAFPID-227048", "CSAFPID-227364", "CSAFPID-227598", "CSAFPID-227789", "CSAFPID-227791", "CSAFPID-227960", "CSAFPID-228057", "CSAFPID-228075", "CSAFPID-228151", "CSAFPID-228955", "CSAFPID-228956", "CSAFPID-230587", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230591", "CSAFPID-230592", "CSAFPID-230594", "CSAFPID-230596", "CSAFPID-230598", "CSAFPID-230603", "CSAFPID-230605", "CSAFPID-230606", "CSAFPID-230712", "CSAFPID-230824", "CSAFPID-230826", "CSAFPID-230915", "CSAFPID-230962", "CSAFPID-230965", "CSAFPID-230992", "CSAFPID-230994", "CSAFPID-230995", "CSAFPID-231000", "CSAFPID-231001", "CSAFPID-231017", "CSAFPID-231245", "CSAFPID-231679", "CSAFPID-231796", "CSAFPID-232061", "CSAFPID-232122", "CSAFPID-232765", "CSAFPID-232850", "CSAFPID-232852", "CSAFPID-234115", "CSAFPID-234926", "CSAFPID-236205", "CSAFPID-238504", "CSAFPID-238999", "CSAFPID-239225", "CSAFPID-239279", "CSAFPID-239361", "CSAFPID-240186", "CSAFPID-241614", "CSAFPID-241765", "CSAFPID-241916", "CSAFPID-242313", "CSAFPID-243144", "CSAFPID-243525", "CSAFPID-244911", "CSAFPID-244913", "CSAFPID-245380", "CSAFPID-247630", "CSAFPID-251487", "CSAFPID-252156", "CSAFPID-255002", "CSAFPID-257209", "CSAFPID-257830", "CSAFPID-259238", "CSAFPID-259869", "CSAFPID-259985", "CSAFPID-260691", "CSAFPID-260993", "CSAFPID-261487", "CSAFPID-262300", "CSAFPID-262335", "CSAFPID-262536", "CSAFPID-262684", "CSAFPID-263981", "CSAFPID-264643", "CSAFPID-271140", "CSAFPID-271286", "CSAFPID-273350", "CSAFPID-273510", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-274203", "CSAFPID-275845", "CSAFPID-276903", "CSAFPID-277230", "CSAFPID-277232", "CSAFPID-277253", "CSAFPID-277339", "CSAFPID-277340", "CSAFPID-277341", "CSAFPID-277352", "CSAFPID-277354", "CSAFPID-277355", "CSAFPID-278029", "CSAFPID-278403", "CSAFPID-278804", "CSAFPID-278880", "CSAFPID-278884", "CSAFPID-279335", "CSAFPID-279337", "CSAFPID-280472", "CSAFPID-280661", "CSAFPID-280759", "CSAFPID-280778", "CSAFPID-280779", "CSAFPID-280832", "CSAFPID-280833", "CSAFPID-282026", "CSAFPID-282027", "CSAFPID-282114", "CSAFPID-282651", "CSAFPID-282669", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284349", "CSAFPID-284566", "CSAFPID-284567", "CSAFPID-284785", "CSAFPID-284786", "CSAFPID-285319", "CSAFPID-285320", "CSAFPID-285321", "CSAFPID-285323", "CSAFPID-286029", "CSAFPID-286030", "CSAFPID-286111", "CSAFPID-286352", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286452", "CSAFPID-286497", "CSAFPID-286520", "CSAFPID-286559", "CSAFPID-286843", "CSAFPID-286844", "CSAFPID-286860", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-287121", "CSAFPID-287185", "CSAFPID-289270", "CSAFPID-289301", "CSAFPID-289303", "CSAFPID-289371", "CSAFPID-290465", "CSAFPID-290479", "CSAFPID-290557", "CSAFPID-290587", "CSAFPID-290618", "CSAFPID-290656", "CSAFPID-292482", "CSAFPID-292654", "CSAFPID-292655", "CSAFPID-292769", "CSAFPID-294791", "CSAFPID-294801", "CSAFPID-296664", "CSAFPID-296759", "CSAFPID-299941", "CSAFPID-299944", "CSAFPID-300502", "CSAFPID-300783", "CSAFPID-300835", "CSAFPID-300837", "CSAFPID-300949", "CSAFPID-300950", "CSAFPID-301223", "CSAFPID-301225", "CSAFPID-301233", "CSAFPID-301472", "CSAFPID-301579", "CSAFPID-301721", "CSAFPID-302624", "CSAFPID-302781", "CSAFPID-302978", "CSAFPID-303044" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 8.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "CSAFPID-103763", "CSAFPID-103955", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104101", "CSAFPID-104342", "CSAFPID-104376", "CSAFPID-104855", "CSAFPID-105253", "CSAFPID-105394", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106072", "CSAFPID-106684", "CSAFPID-106997", "CSAFPID-107209", "CSAFPID-107630", "CSAFPID-107852", "CSAFPID-109098", "CSAFPID-109439", "CSAFPID-109442", "CSAFPID-109808", "CSAFPID-111005", "CSAFPID-111674", "CSAFPID-114665", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117282", "CSAFPID-184125", "CSAFPID-187057", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-191928", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-195481", "CSAFPID-195528", "CSAFPID-195544", "CSAFPID-195770", "CSAFPID-197462", "CSAFPID-197468", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200492", "CSAFPID-200503", "CSAFPID-201074", "CSAFPID-204097", "CSAFPID-204102", "CSAFPID-204103", "CSAFPID-204186", "CSAFPID-204228", "CSAFPID-204310", "CSAFPID-204324", "CSAFPID-204826", "CSAFPID-204831", "CSAFPID-205672", "CSAFPID-205723", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209067", "CSAFPID-209068", "CSAFPID-209073", "CSAFPID-209074", "CSAFPID-209075", "CSAFPID-209077", "CSAFPID-209080", "CSAFPID-209081", "CSAFPID-209083", "CSAFPID-209085", "CSAFPID-209086", "CSAFPID-209087", "CSAFPID-209089", "CSAFPID-209090", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209419", "CSAFPID-209474", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209930", "CSAFPID-209935", "CSAFPID-210137", "CSAFPID-210189", "CSAFPID-210203", "CSAFPID-210262", "CSAFPID-210410", "CSAFPID-210411", "CSAFPID-210491", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210937", "CSAFPID-210958", "CSAFPID-211256", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212266", "CSAFPID-212497", "CSAFPID-212686", "CSAFPID-213089", "CSAFPID-213654", "CSAFPID-213655", "CSAFPID-213770", "CSAFPID-213788", "CSAFPID-213843", "CSAFPID-213954", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214382", "CSAFPID-214556", "CSAFPID-214764", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-216277", "CSAFPID-216295", "CSAFPID-216573", "CSAFPID-216632", "CSAFPID-217048", "CSAFPID-217078", "CSAFPID-217194", "CSAFPID-217779", "CSAFPID-217803", "CSAFPID-218891", "CSAFPID-218946", "CSAFPID-218948", "CSAFPID-220038", "CSAFPID-220235", "CSAFPID-220441", "CSAFPID-220446", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220466", "CSAFPID-220507", "CSAFPID-220657", "CSAFPID-220658", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-222258", "CSAFPID-222342", "CSAFPID-222412", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222537", "CSAFPID-222630", "CSAFPID-222716", "CSAFPID-222924", "CSAFPID-222930", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-224442", "CSAFPID-224738", "CSAFPID-224868", "CSAFPID-225160", "CSAFPID-225167", "CSAFPID-225358", "CSAFPID-225662", "CSAFPID-225740", "CSAFPID-225790", "CSAFPID-226038", "CSAFPID-226077", "CSAFPID-226172", "CSAFPID-226174", "CSAFPID-226202", "CSAFPID-227048", "CSAFPID-227364", "CSAFPID-227598", "CSAFPID-227789", "CSAFPID-227791", "CSAFPID-227960", "CSAFPID-228057", "CSAFPID-228075", "CSAFPID-228151", "CSAFPID-228955", "CSAFPID-228956", "CSAFPID-230587", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230591", "CSAFPID-230592", "CSAFPID-230594", "CSAFPID-230596", "CSAFPID-230598", "CSAFPID-230603", "CSAFPID-230605", "CSAFPID-230606", "CSAFPID-230712", "CSAFPID-230824", "CSAFPID-230826", "CSAFPID-230915", "CSAFPID-230962", "CSAFPID-230965", "CSAFPID-230992", "CSAFPID-230994", "CSAFPID-230995", "CSAFPID-231000", "CSAFPID-231001", "CSAFPID-231017", "CSAFPID-231245", "CSAFPID-231679", "CSAFPID-231796", "CSAFPID-232061", "CSAFPID-232122", "CSAFPID-232765", "CSAFPID-232850", "CSAFPID-232852", "CSAFPID-234115", "CSAFPID-234926", "CSAFPID-236205", "CSAFPID-238504", "CSAFPID-238999", "CSAFPID-239225", "CSAFPID-239279", "CSAFPID-239361", "CSAFPID-240186", "CSAFPID-241614", "CSAFPID-241765", "CSAFPID-241916", "CSAFPID-242313", "CSAFPID-243144", "CSAFPID-243525", "CSAFPID-244911", "CSAFPID-244913", "CSAFPID-245380", "CSAFPID-247630", "CSAFPID-251487", "CSAFPID-252156", "CSAFPID-255002", "CSAFPID-257209", "CSAFPID-257830", "CSAFPID-259238", "CSAFPID-259869", "CSAFPID-259985", "CSAFPID-260691", "CSAFPID-260993", "CSAFPID-261487", "CSAFPID-262300", "CSAFPID-262335", "CSAFPID-262536", "CSAFPID-262684", "CSAFPID-263981", "CSAFPID-264643", "CSAFPID-271140", "CSAFPID-271286", "CSAFPID-273350", "CSAFPID-273510", "CSAFPID-274199", "CSAFPID-274202", "CSAFPID-274203", "CSAFPID-275845", "CSAFPID-276903", "CSAFPID-277230", "CSAFPID-277232", "CSAFPID-277253", "CSAFPID-277339", "CSAFPID-277340", "CSAFPID-277341", "CSAFPID-277352", "CSAFPID-277354", "CSAFPID-277355", "CSAFPID-278029", "CSAFPID-278403", "CSAFPID-278804", "CSAFPID-278880", "CSAFPID-278884", "CSAFPID-279335", "CSAFPID-279337", "CSAFPID-280472", "CSAFPID-280661", "CSAFPID-280759", "CSAFPID-280778", "CSAFPID-280779", "CSAFPID-280832", "CSAFPID-280833", "CSAFPID-282026", "CSAFPID-282027", "CSAFPID-282114", "CSAFPID-282651", "CSAFPID-282669", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284349", "CSAFPID-284566", "CSAFPID-284567", "CSAFPID-284785", "CSAFPID-284786", "CSAFPID-285319", "CSAFPID-285320", "CSAFPID-285321", "CSAFPID-285323", "CSAFPID-286029", "CSAFPID-286030", "CSAFPID-286111", "CSAFPID-286352", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286452", "CSAFPID-286497", "CSAFPID-286520", "CSAFPID-286559", "CSAFPID-286843", "CSAFPID-286844", "CSAFPID-286860", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-287121", "CSAFPID-287185", "CSAFPID-289270", "CSAFPID-289301", "CSAFPID-289303", "CSAFPID-289371", "CSAFPID-290465", "CSAFPID-290479", "CSAFPID-290557", "CSAFPID-290587", "CSAFPID-290618", "CSAFPID-290656", "CSAFPID-292482", "CSAFPID-292654", "CSAFPID-292655", "CSAFPID-292769", "CSAFPID-294791", "CSAFPID-294801", "CSAFPID-296664", "CSAFPID-296759", "CSAFPID-299941", "CSAFPID-299944", "CSAFPID-300502", "CSAFPID-300783", "CSAFPID-300835", "CSAFPID-300837", "CSAFPID-300949", "CSAFPID-300950", "CSAFPID-301223", "CSAFPID-301225", "CSAFPID-301233", "CSAFPID-301472", "CSAFPID-301579", "CSAFPID-301721", "CSAFPID-302624", "CSAFPID-302781", "CSAFPID-302978", "CSAFPID-303044", "CSAFPID-222435", "CSAFPID-225856", "CSAFPID-225858", "CSAFPID-227918", "CSAFPID-227920", "CSAFPID-248242", "CSAFPID-252271", "CSAFPID-257955", "CSAFPID-260741", "CSAFPID-260917", "CSAFPID-261240", "CSAFPID-261241", "CSAFPID-261465", "CSAFPID-262389", "CSAFPID-262390", "CSAFPID-262994", "CSAFPID-264096", "CSAFPID-264514", "CSAFPID-265735", "CSAFPID-265841", "CSAFPID-266259", "CSAFPID-267110", "CSAFPID-267240", "CSAFPID-268921", "CSAFPID-270097", "CSAFPID-271633", "CSAFPID-271938", "CSAFPID-273649", "CSAFPID-274832", "CSAFPID-276837", "CSAFPID-277148", "CSAFPID-277945", "CSAFPID-280651", "CSAFPID-280801", "CSAFPID-280938", "CSAFPID-283835", "CSAFPID-284346", "CSAFPID-286453", "CSAFPID-290562", "CSAFPID-290669" ] } ], "title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.