Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-3225 (GCVE-0-2020-3225)
Vulnerability from cvelistv5
| URL | Tags | ||
|---|---|---|---|
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS 12.2(55)SE |
Version: n/a |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:30:56.482Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3225",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-15T16:21:15.739618Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-15T17:14:57.556Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS 12.2(55)SE",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-06-03T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-06-03T17:42:04",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
}
],
"source": {
"advisory": "cisco-sa-cipdos-hkfTZXEx",
"defect": [
[
"CSCvo17827",
"CSCvp56319",
"CSCvr47365",
"CSCvr67776"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-06-03T16:00:00",
"ID": "CVE-2020-3225",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS 12.2(55)SE",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.6",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
}
]
},
"source": {
"advisory": "cisco-sa-cipdos-hkfTZXEx",
"defect": [
[
"CSCvo17827",
"CSCvp56319",
"CSCvr47365",
"CSCvr67776"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3225",
"datePublished": "2020-06-03T17:42:04.855594Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-15T17:14:57.556Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2020-3225\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2020-06-03T18:15:20.543\",\"lastModified\":\"2024-11-21T05:30:36.133\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades en la implementaci\u00f3n de la funcionalidad Common Industrial Protocol (CIP) de Cisco IOS Software y Cisco IOS XE Software, podr\u00edan permitir a un atacante remoto no autenticado causar la recarga de un dispositivo afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Las vulnerabilidades se deben a un procesamiento de entrada insuficiente del tr\u00e1fico CIP. Un atacante podr\u00eda explotar estas vulnerabilidades mediante el env\u00edo de tr\u00e1fico CIP dise\u00f1ado para ser procesado por un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo afectado se vuelva a cargar, resultando en una condici\u00f3n DoS.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}],\"cvssMetricV30\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E632468F-4B62-4937-8CA6-5B8023451F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C853E612-2C4B-4595-AD6F-22E34B68C69A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E8D759-07E9-49DB-B8EB-A9C06A8D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7EF0685-7BEF-4F84-902C-DFE533CD2F34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F114FD7-F62C-4A24-9CE6-C9A7136465F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"892F72BE-B65F-4271-9042-3B459DFBB43C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7715D0D0-E8B2-444A-A590-7B5B0BFA713F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B526DE1-EEA7-47E4-B291-09C02F018A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5898745E-C1D3-4D0E-8476-2EEAA4327B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887C5632-F3F7-4EDB-A065-D81F64A9B15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C3DF8-2B59-41EB-A151-15E46348DF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700DDE2E-922C-426F-8751-BADD15055AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6CA171-4BE2-4204-BDAB-EA19BCD4842A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84766AF1-DC74-4D64-A4E1-56B377D6CE48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D4A0517-EF86-4655-B4B4-246ED3A84803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360F3E49-D75A-4ACE-B775-14055272C861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5362C676-5002-4ABC-9C60-97D4B65A399D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D14EB41-CD6A-483A-8F68-9072E436807D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC201905-7DBF-4E2B-B732-62641F51C170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"377669B9-952D-4527-9C24-E6713E749C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se13a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83236DB-AF3D-44F8-9B5A-7B35B05C3EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D38633-31AE-42E9-8FFA-77C8EFA9AABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D6D9CC-70F0-475C-8AB0-48980596BE47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEECEF97-EC6A-43C8-A7AB-5C48948183FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(60\\\\)ez16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2950C7F-EEB9-4956-937D-CD978AAC2E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF55C0A-768F-445A-AF40-2B553363AF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ek:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"114E5F13-3F15-418B-A0AF-038BEABF8445\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ek1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"694AA98F-2705-477E-B2EE-75D2CEDB263B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7760B1FF-BC56-49F4-8020-439EA2F53AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ABF12A-78BD-459D-BF53-065A56C385AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CA27BF-13BC-4C13-A049-FA50247ACE9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C8B101-CB42-43CF-98CE-44EE5FBC9BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054583DC-AAF8-4BF0-AC13-5A488476C161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A9B13E-8CF7-4879-8C33-8E690291335F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A634C47-2FD6-4106-86B6-DD465A5394E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05DDA3F8-7207-4FC9-B491-F49418975D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09AEBD6-56E7-4D22-B300-C904464FE75F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97525468-9E3E-4E34-8319-B4DFB51BC4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611A649F-161B-4683-98D5-4C8150838039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F414ABC6-B95C-48ED-BC15-817356248776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137D26AB-CA68-4CBC-91E8-8C0901D5BF19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"343F5C35-A0C0-4747-95BA-D4044C64508B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713C55A8-F24D-45FE-88AA-1D1EFEC88339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F7D280-D099-495F-B860-D96F485BAF81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62A7038-EBCF-4996-8795-3BF95CBDE6B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se13a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E212B3A0-5A20-40B7-BBF6-CC420B0C86AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg11a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAAC6B58-6FC4-459B-9663-4FDC6A6F8DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D601E90-6F2A-4C66-97A2-152031C88DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72782F95-948D-489B-A19A-9DAB825DFE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F904CD0-8609-47F7-988C-613DE26BDBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3A39FE-69F6-4BB9-A9CE-D516A3802538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B7058-3467-4CCE-B9A4-71CF8143FEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90447919-CC40-4CA5-A488-2FCF0F25ABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF74559-F418-48EA-9CA7-A9574CAFC97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A1ADB8-DF62-4CB6-8075-2F0956BB0126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB0F2B2A-F273-4166-826F-88B54A480BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194D54FC-F399-4C86-AE04-FB3FD828DDA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C85E0E-A920-4501-AC23-0F7534CF88EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CB7858-C857-41E2-9E5D-9368EEC2825E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10438F4B-281D-4C2F-B4C3-DC3D47B0033A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"681E360E-2287-4BE7-8228-77C235DFA901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81800178-449A-4B61-9611-5FB2FC4DBC75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7316ED4-FABD-49E0-AA21-394D327435F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A56EF3-4E88-4220-846A-A9BE1E496311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0687FD87-BAED-4776-9B94-3C9EA7CCE79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757000B2-A8EB-464A-9A2D-EC4D920A0569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42618DF-F118-41A7-96E5-24C229DA020E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F6FC68-BF4A-4511-8B46-A93C81E349B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7582DA8C-2360-4E8C-90F8-6194F269CD1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F908B0-7ECE-40F8-8549-29BD1A070606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378E67DD-779C-4852-BF29-38C2DFFB1BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF92BEC-AA46-46DF-8C1E-956F3E506E69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C226FE9-61A0-4873-B277-1B8ADB397B32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5BD905-75C3-47AE-8D19-6225BD808B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DE452A-6852-4879-9187-8A152E6E260E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3047E4-BCC3-41A7-9DCD-15C25D14EC44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7785E177-C04E-4170-9C35-B4259D14EA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CAE727E-E552-4222-8FF0-6146A813BDEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7850295-C728-4448-ABA7-D01397DBBE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65589A68-58A4-4BD4-8A26-C629AE610953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A64C8F-6380-47CA-8116-E3438B953F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jaz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE38B2F-F6AB-44E2-89BE-F71796FE1942\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jaz1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4358B9-F3DB-46AC-A3A8-114E25F676DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F112DE64-0042-4FB9-945D-3107468193E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E027FB12-862F-413E-AA2B-4BBD90AE3650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD28874B-148A-4299-9AA1-67A550B25F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B80CBC-961F-4EE8-A998-C0A827151EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7131776-5DEB-4B96-8483-B81B538E24FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE991877-18E0-4374-A441-C2316085CCA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757EB1A1-4764-4108-9AB1-F33CF9CEE574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199DCF1B-8A1E-47CC-87A6-64E6F21D8886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B78669-3B28-4F1D-993D-85282A7D0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD05109E-1183-419D-96A1-9CD5EA5ECC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7551128E-9E23-4C42-A681-6BE64D284C93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1758F264-96F9-4EE9-9CA9-AD5407885547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ABE0470-E94A-4CAF-865D-73E2607A0DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9CCD7E3-C62B-4151-96FF-1175D4896E95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6437E689-A049-4D48-AB7A-49CA7EBDE8B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4C12918-E5BB-465E-9DA4-06B7351DD805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7\\\\)e0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4862C453-8BD7-4D53-B2D6-CE3E44A4915A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7a\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1374E243-4EC2-4A81-991C-B5705135CAD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(7b\\\\)e0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECA6101-94BA-4209-8243-A56AF02963EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71493AA2-49E9-4FF5-AC29-DC2426973EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja1n:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49DAE7DA-E0D3-4434-AD75-C8894D939A83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F96295-2E72-4C23-B973-791B4A2B63F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8555124-BAFA-45D4-8208-ED1172D55F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A313DD0B-C9A9-4731-A486-EE1BCBA3B1F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04B9D9B5-807F-494B-9ED2-7F4BDB32432A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6089D71A-8D46-4819-80E9-8A29BCA47EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21678FDA-D2B4-4041-A52D-C7AA562FD086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6EB0CFF-88F5-4193-8896-B3E4BA8D1AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ja12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E532352-99A6-4E45-B0E7-7F04DA411820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jaa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jaa1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAE1AD0D-C3E9-488C-89CB-F2342CF6D5A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAC643B-AA58-42EA-A777-52FCF6065F9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CFB57C3-6CDF-46D1-858D-D5234956653D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jax2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330125E6-3645-40B5-8E64-009B622090B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D874DF-54A1-47C7-B3D9-A9CE41A42418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1485E3A5-A586-408A-8325-7572779DD0E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2244E538-6B35-44E0-B93E-60B773745A99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9DB6B2A-19D2-4684-B07F-5D42EC850A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC1C381-4795-4992-BE3C-9615E005DE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80188F84-30DE-46AC-8E0C-984126B77CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DECBF0A9-D84F-40A2-AC61-A9C59C819787\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F129CF-FB92-49E9-BD86-90DDB8218FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jbb8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C288D58-F765-4403-BF18-CC0A62B1AA60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27357CD7-3E9E-4EF2-A5D4-A6BC44952FD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4246ACD7-DBCF-4CE6-B9B8-D44AAB2DEC8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1046E19B-DB53-418A-BFEC-5CD4492E6626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0062D992-D990-4EC9-BABD-2EFFF84254D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC81B74C-4F63-46E8-ACF4-EB707853580A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C779C9-3B83-4B26-8942-B8475FB3B5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ACA99D-5784-4F5F-AB83-F55DF8774E94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB9F99-8751-442B-9419-C2AB522D2ADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jc14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E33FD88-8183-40EF-97A1-2766A4BBFBE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D7D48C-9FA1-45DB-B206-437E8ECBF53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3626B216-43E8-4E60-96E5-7CAA0CB67F65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9B59D8B-E71A-4671-BA0B-00E56498E280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956C0089-E5AE-4289-B6D7-A8AB3C39AAA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333468BC-41F0-46ED-9561-D7D2CE6AC267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DBAA17-61D7-4EE4-A70D-A7200DF36C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF17EADC-5812-47FD-A243-287837CEC1E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE8CF99C-B097-4964-B07C-FBB28EB37681\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA4B81F-7FCA-4666-8602-F6C77A4673E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2403659-B7AD-40CE-AF88-FE2BEF0929E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1F53B1-E9FA-4480-8314-C531073B25CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"498030A3-0AFF-4D74-98D6-74C9447E5B79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jd17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDCBDB71-59D7-481E-84FF-8772930F857B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)je:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2955A319-04AC-4D0C-80B7-0C90503908C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0EF13B6-A743-41D1-BB31-F17C3586C8AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37875B18-434B-4218-BAAF-2B593E188180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26BAC234-D00C-4407-A1FE-E45A14D1BDAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C42E2869-F179-49B7-A4E8-0F4E8EA953CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A58711A-F8C9-4F25-97D7-AE8AE64F3912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE3ECC04-345F-4DAE-98F7-04E082BAEC3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A919122-DE62-4032-80DF-F77C1D80B387\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06216CEE-F15D-4B31-A5A3-B2C226E2D25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jf99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BDD2AB-E1DC-4DD3-93AD-EE6348942EE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BB02DEB-81D4-4A05-BDD5-3B8BC7184159\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jh:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B18C3383-28B0-435E-AF08-9739DADAE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jh1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08C9CA39-3515-4226-8453-0B5FC62546D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1658FFCF-7433-4AFB-9D59-BD6CC14A4D28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2CA6116-2C6B-431B-BA88-63B180A00DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)ji5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2377350-7B69-4C49-889A-D63A3E4C1002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD90F4A-2A86-4A98-A157-D93C382717A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jj1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1739E9AD-154D-40C2-A761-F7133BC06C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F1C76C-62EE-4D93-8730-E923E3FD413D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEB7B3E-4E91-477F-BD62-9A28578CCA80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C8DF3B4-A424-4B70-9116-28E2C4DFB776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4677B840-6636-4D8C-9E1C-47FEB8F3116A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jk99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E97BD4E2-154B-4984-A094-EDC95726C760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32E6CCE7-88BB-4F4F-9253-EC67B5076767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFD112AD-9D7D-45C1-80DE-96037B425F98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFFDA314-0FAA-4BF7-AEED-DF2509B74E09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D6C6EE-CFD9-49A9-8784-498560847737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5187A9D2-A057-40E7-84E1-89BE32AFA95C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFEE60A6-9E75-4B20-A06D-411E774511B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1451BB33-6BE0-4F4A-A193-14E13DECEE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F0FC09E-8C60-4EAC-B729-3BE3524E6F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD355DC3-51F1-4CEA-98B1-E08EEE03BFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49B4A0C4-B0CF-4040-9EB0-1529BCAD0DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4071E320-789E-4E1D-982B-C265F4228FEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jn15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC38DE9-5D5D-452A-AC42-C1D24418FDB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BC3CD43-F30A-484B-9285-D925C1262212\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F807A36A-9363-40F1-9B20-E5C4D503EB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5200C1CD-DEAB-44FD-970D-098F3E01F36B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8E71841-512D-483C-A911-86EA745AC00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB655C5-2D7B-4ED5-89D6-4ED613CF3934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE556AB-093C-4992-8F5B-F240526AAA64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnb6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BA0BCD1-4E75-4F39-B960-4B6B1B357442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17F3285-80E8-4BE5-8704-3379CF326601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9669DF61-DDC5-498D-906A-494D56BAE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B0502B-3363-4F3C-A147-8888B894635B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"689327CA-F302-49FC-9365-F09E4A60E8FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"571ECF0D-06C6-4371-891C-FB68A3093F53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A38CF1F-37D9-4CBD-8B98-C24637FF7F56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0886F6DC-C590-48A0-BE27-6CD778EB37FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8552242D-0A93-4841-83F9-EA4D7F58938E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0667D1-B4EC-4FF0-AC5D-9C1B04D84099\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F45D0EFD-784A-4CDB-8FDB-41F6869B4735\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"942CC01D-ED6E-4731-A61B-75CDF219F760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jnp3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59CA018E-5160-40AE-953D-9559F23D2EAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBA595EF-8718-4477-8EEC-EA948C14F091\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CDCADB1-EA01-41AF-9D96-A6EDE42D7A9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13763901-2D7B-485D-A957-E30587BCEB88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B213166-77E2-4E13-8769-FA8AF6EEC33A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3C0371-223A-433C-B8A3-C24A499EB82F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A066A001-830B-4407-A5CD-AB99059C190E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83B45095-526D-4BC5-A16B-6B5741F07FD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpc99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51AA5D4E-5236-44DA-AA1A-E5E7A9DC8E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4A9F7DF-BB18-46FC-B471-3FC41F4CCD01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpi:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E0326F-98A1-48B4-945D-D8603D5A8609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpi3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F06709E-F260-4E1A-A79D-DBD63F458CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.3\\\\(3\\\\)jpj:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F69B4F2-4A03-4383-8958-11EE154A7350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"930678B3-1527-4967-9D8F-27FC0DA060AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A34268-7618-48D2-8872-27B5B624543B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2017A75-CC29-4161-85CB-7A531E5ABB3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AD00E6-A155-4CCB-B329-7B536BEBC976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"672B77C7-0E6B-496D-9ACC-6AD965319B35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA1D885-2270-4370-9F3F-CA80B0E96DD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20286676-70FF-471C-9612-74E5F0ECB8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F13F583-F645-4DF0-A075-B4F19D71D128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119A964D-ABC8-424D-8097-85B832A833BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF5214D-9257-498F-A3EB-C4EC18E2FEB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4BF9829-F80E-4837-A420-39B291C4E17B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07F9539-CFBE-46F7-9F5E-93A68169797D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5AB80E7-0714-44ED-9671-12C877B36A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10182B94-6831-461E-B0FC-9476EAB6EBEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB6BD18B-B9BD-452F-986E-16A6668E46B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADED0D82-2A4D-4235-BFAC-5EE2D862B652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6EF98FA-6DF9-4935-9639-143E08462BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A443E93-6C4B-4F86-BA7C-7C2A929E795A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECEDD9D-6517-44BA-A95F-D1D5488C0E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E91F8704-6DAD-474A-84EA-04E4AF7BB9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314C7763-A64D-4023-9F3F-9A821AE4151F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5820D71D-FC93-45AA-BC58-A26A1A39C936\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1C85DD-69CC-4AA8-B219-651D57FC3506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98DED36-D4B5-48D6-964E-EEEE97936700\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD98C9E8-3EA6-4160-970D-37C389576516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9027A528-2588-4C06-810B-5BB313FE4323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7745ED34-D59D-49CC-B174-96BCA03B3374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19AF4CF3-6E79-4EA3-974D-CD451A192BA9\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\", \"name\": \"20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T07:30:56.482Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-3225\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-15T16:21:15.739618Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-15T16:21:49.925Z\"}}], \"cna\": {\"title\": \"Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"source\": {\"defect\": [[\"CSCvo17827\", \"CSCvp56319\", \"CSCvr47365\", \"CSCvr67776\"]], \"advisory\": \"cisco-sa-cipdos-hkfTZXEx\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"CHANGED\", \"version\": \"3.0\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS 12.2(55)SE\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"datePublic\": \"2020-06-03T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\", \"name\": \"20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2020-06-03T17:42:04\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"8.6\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\"}}, \"source\": {\"defect\": [[\"CSCvo17827\", \"CSCvp56319\", \"CSCvr47365\", \"CSCvr67776\"]], \"advisory\": \"cisco-sa-cipdos-hkfTZXEx\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco IOS 12.2(55)SE\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\", \"name\": \"20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-20\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-3225\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2020-06-03T16:00:00\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-3225\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-15T17:14:57.556Z\", \"dateReserved\": \"2019-12-12T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2020-06-03T17:42:04.855594Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
fkie_cve-2020-3225
Vulnerability from fkie_nvd
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.2\(44\)ex | |
| cisco | ios | 12.2\(44\)ex1 | |
| cisco | ios | 12.2\(46\)se1 | |
| cisco | ios | 12.2\(46\)se2 | |
| cisco | ios | 12.2\(50\)se | |
| cisco | ios | 12.2\(50\)se1 | |
| cisco | ios | 12.2\(50\)se2 | |
| cisco | ios | 12.2\(50\)se3 | |
| cisco | ios | 12.2\(50\)se4 | |
| cisco | ios | 12.2\(50\)se5 | |
| cisco | ios | 12.2\(52\)se | |
| cisco | ios | 12.2\(52\)se1 | |
| cisco | ios | 12.2\(55\)se | |
| cisco | ios | 12.2\(55\)se3 | |
| cisco | ios | 12.2\(55\)se4 | |
| cisco | ios | 12.2\(55\)se5 | |
| cisco | ios | 12.2\(55\)se6 | |
| cisco | ios | 12.2\(55\)se7 | |
| cisco | ios | 12.2\(55\)se9 | |
| cisco | ios | 12.2\(55\)se10 | |
| cisco | ios | 12.2\(55\)se11 | |
| cisco | ios | 12.2\(55\)se12 | |
| cisco | ios | 12.2\(55\)se13 | |
| cisco | ios | 12.2\(55\)se13a | |
| cisco | ios | 12.2\(58\)se | |
| cisco | ios | 12.2\(58\)se1 | |
| cisco | ios | 12.2\(58\)se2 | |
| cisco | ios | 12.2\(60\)ez16 | |
| cisco | ios | 15.0\(1\)ey | |
| cisco | ios | 15.0\(1\)ey1 | |
| cisco | ios | 15.0\(1\)ey2 | |
| cisco | ios | 15.0\(2\)ek | |
| cisco | ios | 15.0\(2\)ek1 | |
| cisco | ios | 15.0\(2\)ex2 | |
| cisco | ios | 15.0\(2\)ex8 | |
| cisco | ios | 15.0\(2\)ey | |
| cisco | ios | 15.0\(2\)ey1 | |
| cisco | ios | 15.0\(2\)ey2 | |
| cisco | ios | 15.0\(2\)ey3 | |
| cisco | ios | 15.0\(2\)se | |
| cisco | ios | 15.0\(2\)se1 | |
| cisco | ios | 15.0\(2\)se2 | |
| cisco | ios | 15.0\(2\)se3 | |
| cisco | ios | 15.0\(2\)se4 | |
| cisco | ios | 15.0\(2\)se5 | |
| cisco | ios | 15.0\(2\)se6 | |
| cisco | ios | 15.0\(2\)se7 | |
| cisco | ios | 15.0\(2\)se8 | |
| cisco | ios | 15.0\(2\)se9 | |
| cisco | ios | 15.0\(2\)se10 | |
| cisco | ios | 15.0\(2\)se10a | |
| cisco | ios | 15.0\(2\)se11 | |
| cisco | ios | 15.0\(2\)se12 | |
| cisco | ios | 15.0\(2\)se13 | |
| cisco | ios | 15.0\(2\)se13a | |
| cisco | ios | 15.0\(2\)sg11a | |
| cisco | ios | 15.2\(1\)ey | |
| cisco | ios | 15.2\(2\)e | |
| cisco | ios | 15.2\(2\)e1 | |
| cisco | ios | 15.2\(2\)e2 | |
| cisco | ios | 15.2\(2\)e3 | |
| cisco | ios | 15.2\(2\)e4 | |
| cisco | ios | 15.2\(2\)e5 | |
| cisco | ios | 15.2\(2\)e5a | |
| cisco | ios | 15.2\(2\)e5b | |
| cisco | ios | 15.2\(2\)e6 | |
| cisco | ios | 15.2\(2\)e7 | |
| cisco | ios | 15.2\(2\)e7b | |
| cisco | ios | 15.2\(2\)e8 | |
| cisco | ios | 15.2\(2\)e9 | |
| cisco | ios | 15.2\(2\)e10 | |
| cisco | ios | 15.2\(2\)ea | |
| cisco | ios | 15.2\(2\)ea1 | |
| cisco | ios | 15.2\(2\)ea2 | |
| cisco | ios | 15.2\(2\)ea3 | |
| cisco | ios | 15.2\(2\)eb | |
| cisco | ios | 15.2\(2\)eb1 | |
| cisco | ios | 15.2\(2\)eb2 | |
| cisco | ios | 15.2\(2b\)e | |
| cisco | ios | 15.2\(3\)e1 | |
| cisco | ios | 15.2\(3\)e2 | |
| cisco | ios | 15.2\(3\)e3 | |
| cisco | ios | 15.2\(3\)e4 | |
| cisco | ios | 15.2\(3\)e5 | |
| cisco | ios | 15.2\(3\)ea | |
| cisco | ios | 15.2\(4\)e9 | |
| cisco | ios | 15.2\(4\)e10 | |
| cisco | ios | 15.2\(4\)ea | |
| cisco | ios | 15.2\(4\)ea1 | |
| cisco | ios | 15.2\(4\)ea2 | |
| cisco | ios | 15.2\(4\)ea3 | |
| cisco | ios | 15.2\(4\)ea4 | |
| cisco | ios | 15.2\(4\)ea5 | |
| cisco | ios | 15.2\(4\)ea6 | |
| cisco | ios | 15.2\(4\)ea7 | |
| cisco | ios | 15.2\(4\)ea8 | |
| cisco | ios | 15.2\(4\)ea9 | |
| cisco | ios | 15.2\(4\)ec1 | |
| cisco | ios | 15.2\(4\)ec2 | |
| cisco | ios | 15.2\(4\)jaz | |
| cisco | ios | 15.2\(4\)jaz1 | |
| cisco | ios | 15.2\(5\)e | |
| cisco | ios | 15.2\(5\)e1 | |
| cisco | ios | 15.2\(5\)e2 | |
| cisco | ios | 15.2\(5\)e2b | |
| cisco | ios | 15.2\(5\)e2c | |
| cisco | ios | 15.2\(5\)ea | |
| cisco | ios | 15.2\(5a\)e1 | |
| cisco | ios | 15.2\(6\)e | |
| cisco | ios | 15.2\(6\)e0a | |
| cisco | ios | 15.2\(6\)e0c | |
| cisco | ios | 15.2\(6\)e1 | |
| cisco | ios | 15.2\(6\)e1a | |
| cisco | ios | 15.2\(6\)e1s | |
| cisco | ios | 15.2\(6\)e2a | |
| cisco | ios | 15.2\(6\)e3 | |
| cisco | ios | 15.2\(6\)eb | |
| cisco | ios | 15.2\(7\)e | |
| cisco | ios | 15.2\(7\)e0b | |
| cisco | ios | 15.2\(7\)e0s | |
| cisco | ios | 15.2\(7a\)e0b | |
| cisco | ios | 15.2\(7b\)e0b | |
| cisco | ios | 15.3\(3\)ja1 | |
| cisco | ios | 15.3\(3\)ja1n | |
| cisco | ios | 15.3\(3\)ja4 | |
| cisco | ios | 15.3\(3\)ja5 | |
| cisco | ios | 15.3\(3\)ja6 | |
| cisco | ios | 15.3\(3\)ja7 | |
| cisco | ios | 15.3\(3\)ja8 | |
| cisco | ios | 15.3\(3\)ja10 | |
| cisco | ios | 15.3\(3\)ja11 | |
| cisco | ios | 15.3\(3\)ja12 | |
| cisco | ios | 15.3\(3\)jaa | |
| cisco | ios | 15.3\(3\)jaa1 | |
| cisco | ios | 15.3\(3\)jax | |
| cisco | ios | 15.3\(3\)jax1 | |
| cisco | ios | 15.3\(3\)jax2 | |
| cisco | ios | 15.3\(3\)jb | |
| cisco | ios | 15.3\(3\)jbb | |
| cisco | ios | 15.3\(3\)jbb1 | |
| cisco | ios | 15.3\(3\)jbb2 | |
| cisco | ios | 15.3\(3\)jbb4 | |
| cisco | ios | 15.3\(3\)jbb5 | |
| cisco | ios | 15.3\(3\)jbb6 | |
| cisco | ios | 15.3\(3\)jbb6a | |
| cisco | ios | 15.3\(3\)jbb8 | |
| cisco | ios | 15.3\(3\)jc | |
| cisco | ios | 15.3\(3\)jc1 | |
| cisco | ios | 15.3\(3\)jc2 | |
| cisco | ios | 15.3\(3\)jc3 | |
| cisco | ios | 15.3\(3\)jc4 | |
| cisco | ios | 15.3\(3\)jc5 | |
| cisco | ios | 15.3\(3\)jc6 | |
| cisco | ios | 15.3\(3\)jc8 | |
| cisco | ios | 15.3\(3\)jc9 | |
| cisco | ios | 15.3\(3\)jc14 | |
| cisco | ios | 15.3\(3\)jd | |
| cisco | ios | 15.3\(3\)jd2 | |
| cisco | ios | 15.3\(3\)jd3 | |
| cisco | ios | 15.3\(3\)jd4 | |
| cisco | ios | 15.3\(3\)jd5 | |
| cisco | ios | 15.3\(3\)jd6 | |
| cisco | ios | 15.3\(3\)jd7 | |
| cisco | ios | 15.3\(3\)jd8 | |
| cisco | ios | 15.3\(3\)jd9 | |
| cisco | ios | 15.3\(3\)jd11 | |
| cisco | ios | 15.3\(3\)jd12 | |
| cisco | ios | 15.3\(3\)jd13 | |
| cisco | ios | 15.3\(3\)jd14 | |
| cisco | ios | 15.3\(3\)jd16 | |
| cisco | ios | 15.3\(3\)jd17 | |
| cisco | ios | 15.3\(3\)je | |
| cisco | ios | 15.3\(3\)jf | |
| cisco | ios | 15.3\(3\)jf1 | |
| cisco | ios | 15.3\(3\)jf2 | |
| cisco | ios | 15.3\(3\)jf4 | |
| cisco | ios | 15.3\(3\)jf5 | |
| cisco | ios | 15.3\(3\)jf6 | |
| cisco | ios | 15.3\(3\)jf7 | |
| cisco | ios | 15.3\(3\)jf8 | |
| cisco | ios | 15.3\(3\)jf9 | |
| cisco | ios | 15.3\(3\)jf10 | |
| cisco | ios | 15.3\(3\)jf13 | |
| cisco | ios | 15.3\(3\)jf99 | |
| cisco | ios | 15.3\(3\)jg | |
| cisco | ios | 15.3\(3\)jg1 | |
| cisco | ios | 15.3\(3\)jh | |
| cisco | ios | 15.3\(3\)jh1 | |
| cisco | ios | 15.3\(3\)ji1 | |
| cisco | ios | 15.3\(3\)ji3 | |
| cisco | ios | 15.3\(3\)ji4 | |
| cisco | ios | 15.3\(3\)ji5 | |
| cisco | ios | 15.3\(3\)jj | |
| cisco | ios | 15.3\(3\)jj1 | |
| cisco | ios | 15.3\(3\)jk | |
| cisco | ios | 15.3\(3\)jk1a | |
| cisco | ios | 15.3\(3\)jk1t | |
| cisco | ios | 15.3\(3\)jk2a | |
| cisco | ios | 15.3\(3\)jk3 | |
| cisco | ios | 15.3\(3\)jk99 | |
| cisco | ios | 15.3\(3\)jn | |
| cisco | ios | 15.3\(3\)jn1 | |
| cisco | ios | 15.3\(3\)jn2 | |
| cisco | ios | 15.3\(3\)jn3 | |
| cisco | ios | 15.3\(3\)jn4 | |
| cisco | ios | 15.3\(3\)jn6 | |
| cisco | ios | 15.3\(3\)jn7 | |
| cisco | ios | 15.3\(3\)jn8 | |
| cisco | ios | 15.3\(3\)jn9 | |
| cisco | ios | 15.3\(3\)jn11 | |
| cisco | ios | 15.3\(3\)jn13 | |
| cisco | ios | 15.3\(3\)jn14 | |
| cisco | ios | 15.3\(3\)jn15 | |
| cisco | ios | 15.3\(3\)jnb | |
| cisco | ios | 15.3\(3\)jnb1 | |
| cisco | ios | 15.3\(3\)jnb2 | |
| cisco | ios | 15.3\(3\)jnb3 | |
| cisco | ios | 15.3\(3\)jnb4 | |
| cisco | ios | 15.3\(3\)jnb5 | |
| cisco | ios | 15.3\(3\)jnb6 | |
| cisco | ios | 15.3\(3\)jnc | |
| cisco | ios | 15.3\(3\)jnc1 | |
| cisco | ios | 15.3\(3\)jnc2 | |
| cisco | ios | 15.3\(3\)jnc3 | |
| cisco | ios | 15.3\(3\)jnc4 | |
| cisco | ios | 15.3\(3\)jnd | |
| cisco | ios | 15.3\(3\)jnd1 | |
| cisco | ios | 15.3\(3\)jnd2 | |
| cisco | ios | 15.3\(3\)jnd3 | |
| cisco | ios | 15.3\(3\)jnp | |
| cisco | ios | 15.3\(3\)jnp1 | |
| cisco | ios | 15.3\(3\)jnp3 | |
| cisco | ios | 15.3\(3\)jpb | |
| cisco | ios | 15.3\(3\)jpb1 | |
| cisco | ios | 15.3\(3\)jpc | |
| cisco | ios | 15.3\(3\)jpc1 | |
| cisco | ios | 15.3\(3\)jpc2 | |
| cisco | ios | 15.3\(3\)jpc3 | |
| cisco | ios | 15.3\(3\)jpc5 | |
| cisco | ios | 15.3\(3\)jpc99 | |
| cisco | ios | 15.3\(3\)jpd | |
| cisco | ios | 15.3\(3\)jpi | |
| cisco | ios | 15.3\(3\)jpi3 | |
| cisco | ios | 15.3\(3\)jpj | |
| cisco | ios_xe | 3.3.0xo | |
| cisco | ios_xe | 3.3.1xo | |
| cisco | ios_xe | 3.3.2xo | |
| cisco | ios_xe | 3.6.5be | |
| cisco | ios_xe | 3.8.9e | |
| cisco | ios_xe | 3.8.10e | |
| cisco | ios_xe | 3.10.3e | |
| cisco | ios_xe | 16.3.9 | |
| cisco | ios_xe | 16.3.10 | |
| cisco | ios_xe | 16.6.7 | |
| cisco | ios_xe | 16.6.7a | |
| cisco | ios_xe | 16.6.8 | |
| cisco | ios_xe | 16.9.1 | |
| cisco | ios_xe | 16.9.1d | |
| cisco | ios_xe | 16.9.4 | |
| cisco | ios_xe | 16.9.4c | |
| cisco | ios_xe | 16.9.5 | |
| cisco | ios_xe | 16.9.5f | |
| cisco | ios_xe | 16.10.1 | |
| cisco | ios_xe | 16.10.1e | |
| cisco | ios_xe | 16.10.1g | |
| cisco | ios_xe | 16.10.2 | |
| cisco | ios_xe | 16.10.3 | |
| cisco | ios_xe | 16.11.1 | |
| cisco | ios_xe | 16.11.1a | |
| cisco | ios_xe | 16.11.1b | |
| cisco | ios_xe | 16.11.1c | |
| cisco | ios_xe | 16.11.1s | |
| cisco | ios_xe | 16.12.1 | |
| cisco | ios_xe | 16.12.1a | |
| cisco | ios_xe | 16.12.1c | |
| cisco | ios_xe | 16.12.1s | |
| cisco | ios_xe | 16.12.1t | |
| cisco | ios_xe | 16.12.1w |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "E632468F-4B62-4937-8CA6-5B8023451F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "C853E612-2C4B-4595-AD6F-22E34B68C69A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "49E8D759-07E9-49DB-B8EB-A9C06A8D8031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "D7EF0685-7BEF-4F84-902C-DFE533CD2F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F114FD7-F62C-4A24-9CE6-C9A7136465F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "892F72BE-B65F-4271-9042-3B459DFBB43C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "7715D0D0-E8B2-444A-A590-7B5B0BFA713F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "1B526DE1-EEA7-47E4-B291-09C02F018A16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "5898745E-C1D3-4D0E-8476-2EEAA4327B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "887C5632-F3F7-4EDB-A065-D81F64A9B15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "5362C676-5002-4ABC-9C60-97D4B65A399D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D14EB41-CD6A-483A-8F68-9072E436807D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
"matchCriteriaId": "DC201905-7DBF-4E2B-B732-62641F51C170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
"matchCriteriaId": "377669B9-952D-4527-9C24-E6713E749C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13a:*:*:*:*:*:*:*",
"matchCriteriaId": "A83236DB-AF3D-44F8-9B5A-7B35B05C3EDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D38633-31AE-42E9-8FFA-77C8EFA9AABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D6D9CC-70F0-475C-8AB0-48980596BE47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez16:*:*:*:*:*:*:*",
"matchCriteriaId": "C2950C7F-EEB9-4956-937D-CD978AAC2E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
"matchCriteriaId": "114E5F13-3F15-418B-A0AF-038BEABF8445",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
"matchCriteriaId": "694AA98F-2705-477E-B2EE-75D2CEDB263B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"matchCriteriaId": "343F5C35-A0C0-4747-95BA-D4044C64508B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "713C55A8-F24D-45FE-88AA-1D1EFEC88339",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"matchCriteriaId": "11F7D280-D099-495F-B860-D96F485BAF81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
"matchCriteriaId": "B62A7038-EBCF-4996-8795-3BF95CBDE6B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13a:*:*:*:*:*:*:*",
"matchCriteriaId": "E212B3A0-5A20-40B7-BBF6-CC420B0C86AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11a:*:*:*:*:*:*:*",
"matchCriteriaId": "AAAC6B58-6FC4-459B-9663-4FDC6A6F8DE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "10438F4B-281D-4C2F-B4C3-DC3D47B0033A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"matchCriteriaId": "F7316ED4-FABD-49E0-AA21-394D327435F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"matchCriteriaId": "24A56EF3-4E88-4220-846A-A9BE1E496311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "0687FD87-BAED-4776-9B94-3C9EA7CCE79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5BD905-75C3-47AE-8D19-6225BD808B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE38B2F-F6AB-44E2-89BE-F71796FE1942",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D4358B9-F3DB-46AC-A3A8-114E25F676DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"matchCriteriaId": "45B80CBC-961F-4EE8-A998-C0A827151EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7551128E-9E23-4C42-A681-6BE64D284C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
"matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
"matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1:*:*:*:*:*:*:*",
"matchCriteriaId": "71493AA2-49E9-4FF5-AC29-DC2426973EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1n:*:*:*:*:*:*:*",
"matchCriteriaId": "49DAE7DA-E0D3-4434-AD75-C8894D939A83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja4:*:*:*:*:*:*:*",
"matchCriteriaId": "85F96295-2E72-4C23-B973-791B4A2B63F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja5:*:*:*:*:*:*:*",
"matchCriteriaId": "A8555124-BAFA-45D4-8208-ED1172D55F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja6:*:*:*:*:*:*:*",
"matchCriteriaId": "A313DD0B-C9A9-4731-A486-EE1BCBA3B1F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja7:*:*:*:*:*:*:*",
"matchCriteriaId": "04B9D9B5-807F-494B-9ED2-7F4BDB32432A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja8:*:*:*:*:*:*:*",
"matchCriteriaId": "6089D71A-8D46-4819-80E9-8A29BCA47EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja10:*:*:*:*:*:*:*",
"matchCriteriaId": "21678FDA-D2B4-4041-A52D-C7AA562FD086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja11:*:*:*:*:*:*:*",
"matchCriteriaId": "F6EB0CFF-88F5-4193-8896-B3E4BA8D1AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja12:*:*:*:*:*:*:*",
"matchCriteriaId": "4E532352-99A6-4E45-B0E7-7F04DA411820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*",
"matchCriteriaId": "D3BD12E4-2ADA-4E3D-A12D-FF0E1031D677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa1:*:*:*:*:*:*:*",
"matchCriteriaId": "EAE1AD0D-C3E9-488C-89CB-F2342CF6D5A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC643B-AA58-42EA-A777-52FCF6065F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax1:*:*:*:*:*:*:*",
"matchCriteriaId": "9CFB57C3-6CDF-46D1-858D-D5234956653D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax2:*:*:*:*:*:*:*",
"matchCriteriaId": "330125E6-3645-40B5-8E64-009B622090B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jb:*:*:*:*:*:*:*",
"matchCriteriaId": "02D874DF-54A1-47C7-B3D9-A9CE41A42418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb:*:*:*:*:*:*:*",
"matchCriteriaId": "1485E3A5-A586-408A-8325-7572779DD0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb1:*:*:*:*:*:*:*",
"matchCriteriaId": "2244E538-6B35-44E0-B93E-60B773745A99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9DB6B2A-19D2-4684-B07F-5D42EC850A8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb4:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC1C381-4795-4992-BE3C-9615E005DE46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb5:*:*:*:*:*:*:*",
"matchCriteriaId": "80188F84-30DE-46AC-8E0C-984126B77CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6:*:*:*:*:*:*:*",
"matchCriteriaId": "DECBF0A9-D84F-40A2-AC61-A9C59C819787",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*",
"matchCriteriaId": "C9F129CF-FB92-49E9-BD86-90DDB8218FF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb8:*:*:*:*:*:*:*",
"matchCriteriaId": "9C288D58-F765-4403-BF18-CC0A62B1AA60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc:*:*:*:*:*:*:*",
"matchCriteriaId": "D4CF8146-FBF4-48F9-8BF0-61ACB2B3524E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc1:*:*:*:*:*:*:*",
"matchCriteriaId": "27357CD7-3E9E-4EF2-A5D4-A6BC44952FD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc2:*:*:*:*:*:*:*",
"matchCriteriaId": "4246ACD7-DBCF-4CE6-B9B8-D44AAB2DEC8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc3:*:*:*:*:*:*:*",
"matchCriteriaId": "1046E19B-DB53-418A-BFEC-5CD4492E6626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc4:*:*:*:*:*:*:*",
"matchCriteriaId": "0062D992-D990-4EC9-BABD-2EFFF84254D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc5:*:*:*:*:*:*:*",
"matchCriteriaId": "CC81B74C-4F63-46E8-ACF4-EB707853580A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C779C9-3B83-4B26-8942-B8475FB3B5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*",
"matchCriteriaId": "02ACA99D-5784-4F5F-AB83-F55DF8774E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFB9F99-8751-442B-9419-C2AB522D2ADC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
"matchCriteriaId": "5E33FD88-8183-40EF-97A1-2766A4BBFBE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd:*:*:*:*:*:*:*",
"matchCriteriaId": "34D7D48C-9FA1-45DB-B206-437E8ECBF53D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd2:*:*:*:*:*:*:*",
"matchCriteriaId": "3626B216-43E8-4E60-96E5-7CAA0CB67F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9B59D8B-E71A-4671-BA0B-00E56498E280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*",
"matchCriteriaId": "956C0089-E5AE-4289-B6D7-A8AB3C39AAA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*",
"matchCriteriaId": "333468BC-41F0-46ED-9561-D7D2CE6AC267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
"matchCriteriaId": "09DBAA17-61D7-4EE4-A70D-A7200DF36C58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*",
"matchCriteriaId": "DF17EADC-5812-47FD-A243-287837CEC1E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*",
"matchCriteriaId": "5733BCBA-B3CE-4B18-9F7B-51CE17AAEF89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8CF99C-B097-4964-B07C-FBB28EB37681",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*",
"matchCriteriaId": "79DC64FF-E6F4-4FEE-87A2-14DF0DA55B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd12:*:*:*:*:*:*:*",
"matchCriteriaId": "CBA4B81F-7FCA-4666-8602-F6C77A4673E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*",
"matchCriteriaId": "E2403659-B7AD-40CE-AF88-FE2BEF0929E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1F53B1-E9FA-4480-8314-C531073B25CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*",
"matchCriteriaId": "498030A3-0AFF-4D74-98D6-74C9447E5B79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*",
"matchCriteriaId": "BDCBDB71-59D7-481E-84FF-8772930F857B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*",
"matchCriteriaId": "2955A319-04AC-4D0C-80B7-0C90503908C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*",
"matchCriteriaId": "B0EF13B6-A743-41D1-BB31-F17C3586C8AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*",
"matchCriteriaId": "0B4F7A75-1D0B-4F55-868C-99DBB67AE1AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*",
"matchCriteriaId": "37875B18-434B-4218-BAAF-2B593E188180",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*",
"matchCriteriaId": "26BAC234-D00C-4407-A1FE-E45A14D1BDAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*",
"matchCriteriaId": "C42E2869-F179-49B7-A4E8-0F4E8EA953CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*",
"matchCriteriaId": "7A58711A-F8C9-4F25-97D7-AE8AE64F3912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*",
"matchCriteriaId": "BF4E7B19-75DF-4811-BEE9-28E7B15ED6F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*",
"matchCriteriaId": "DE3ECC04-345F-4DAE-98F7-04E082BAEC3B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*",
"matchCriteriaId": "6A919122-DE62-4032-80DF-F77C1D80B387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*",
"matchCriteriaId": "9C5B0248-7C59-49F7-A1BC-FE6F5A8E535B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf13:*:*:*:*:*:*:*",
"matchCriteriaId": "06216CEE-F15D-4B31-A5A3-B2C226E2D25B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf99:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BDD2AB-E1DC-4DD3-93AD-EE6348942EE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*",
"matchCriteriaId": "746D8C22-4A3E-4EDB-96A1-923EFF2FD5C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*",
"matchCriteriaId": "8BB02DEB-81D4-4A05-BDD5-3B8BC7184159",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*",
"matchCriteriaId": "B18C3383-28B0-435E-AF08-9739DADAE4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*",
"matchCriteriaId": "08C9CA39-3515-4226-8453-0B5FC62546D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*",
"matchCriteriaId": "19AAE85B-A2E3-4758-9DAF-B4BD7C667DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*",
"matchCriteriaId": "1658FFCF-7433-4AFB-9D59-BD6CC14A4D28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*",
"matchCriteriaId": "D2CA6116-2C6B-431B-BA88-63B180A00DA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*",
"matchCriteriaId": "C2377350-7B69-4C49-889A-D63A3E4C1002",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD90F4A-2A86-4A98-A157-D93C382717A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB2D76-9BE1-4C39-A3B0-BD6F45E20E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*",
"matchCriteriaId": "1739E9AD-154D-40C2-A761-F7133BC06C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1a:*:*:*:*:*:*:*",
"matchCriteriaId": "16F1C76C-62EE-4D93-8730-E923E3FD413D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*",
"matchCriteriaId": "2AEB7B3E-4E91-477F-BD62-9A28578CCA80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*",
"matchCriteriaId": "7C8DF3B4-A424-4B70-9116-28E2C4DFB776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*",
"matchCriteriaId": "4677B840-6636-4D8C-9E1C-47FEB8F3116A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk99:*:*:*:*:*:*:*",
"matchCriteriaId": "E97BD4E2-154B-4984-A094-EDC95726C760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn:*:*:*:*:*:*:*",
"matchCriteriaId": "32E6CCE7-88BB-4F4F-9253-EC67B5076767",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn1:*:*:*:*:*:*:*",
"matchCriteriaId": "FFD112AD-9D7D-45C1-80DE-96037B425F98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn2:*:*:*:*:*:*:*",
"matchCriteriaId": "AFFDA314-0FAA-4BF7-AEED-DF2509B74E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn3:*:*:*:*:*:*:*",
"matchCriteriaId": "2EBD0947-656E-4CB0-9B4F-1A1F7AA360C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn4:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D6C6EE-CFD9-49A9-8784-498560847737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn6:*:*:*:*:*:*:*",
"matchCriteriaId": "5187A9D2-A057-40E7-84E1-89BE32AFA95C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn7:*:*:*:*:*:*:*",
"matchCriteriaId": "FFEE60A6-9E75-4B20-A06D-411E774511B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn8:*:*:*:*:*:*:*",
"matchCriteriaId": "1451BB33-6BE0-4F4A-A193-14E13DECEE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn9:*:*:*:*:*:*:*",
"matchCriteriaId": "5F0FC09E-8C60-4EAC-B729-3BE3524E6F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn11:*:*:*:*:*:*:*",
"matchCriteriaId": "DD355DC3-51F1-4CEA-98B1-E08EEE03BFD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn13:*:*:*:*:*:*:*",
"matchCriteriaId": "49B4A0C4-B0CF-4040-9EB0-1529BCAD0DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn14:*:*:*:*:*:*:*",
"matchCriteriaId": "4071E320-789E-4E1D-982B-C265F4228FEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn15:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC38DE9-5D5D-452A-AC42-C1D24418FDB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC3CD43-F30A-484B-9285-D925C1262212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb1:*:*:*:*:*:*:*",
"matchCriteriaId": "F807A36A-9363-40F1-9B20-E5C4D503EB1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb2:*:*:*:*:*:*:*",
"matchCriteriaId": "5200C1CD-DEAB-44FD-970D-098F3E01F36B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb3:*:*:*:*:*:*:*",
"matchCriteriaId": "E8E71841-512D-483C-A911-86EA745AC00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb4:*:*:*:*:*:*:*",
"matchCriteriaId": "BBB655C5-2D7B-4ED5-89D6-4ED613CF3934",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb5:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE556AB-093C-4992-8F5B-F240526AAA64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb6:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA0BCD1-4E75-4F39-B960-4B6B1B357442",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc:*:*:*:*:*:*:*",
"matchCriteriaId": "F17F3285-80E8-4BE5-8704-3379CF326601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc1:*:*:*:*:*:*:*",
"matchCriteriaId": "9669DF61-DDC5-498D-906A-494D56BAE450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc2:*:*:*:*:*:*:*",
"matchCriteriaId": "00B0502B-3363-4F3C-A147-8888B894635B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc3:*:*:*:*:*:*:*",
"matchCriteriaId": "689327CA-F302-49FC-9365-F09E4A60E8FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc4:*:*:*:*:*:*:*",
"matchCriteriaId": "571ECF0D-06C6-4371-891C-FB68A3093F53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd:*:*:*:*:*:*:*",
"matchCriteriaId": "8A38CF1F-37D9-4CBD-8B98-C24637FF7F56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd1:*:*:*:*:*:*:*",
"matchCriteriaId": "0886F6DC-C590-48A0-BE27-6CD778EB37FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd2:*:*:*:*:*:*:*",
"matchCriteriaId": "8552242D-0A93-4841-83F9-EA4D7F58938E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd3:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0667D1-B4EC-4FF0-AC5D-9C1B04D84099",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp:*:*:*:*:*:*:*",
"matchCriteriaId": "F45D0EFD-784A-4CDB-8FDB-41F6869B4735",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp1:*:*:*:*:*:*:*",
"matchCriteriaId": "942CC01D-ED6E-4731-A61B-75CDF219F760",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp3:*:*:*:*:*:*:*",
"matchCriteriaId": "59CA018E-5160-40AE-953D-9559F23D2EAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb:*:*:*:*:*:*:*",
"matchCriteriaId": "BBA595EF-8718-4477-8EEC-EA948C14F091",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb1:*:*:*:*:*:*:*",
"matchCriteriaId": "4CDCADB1-EA01-41AF-9D96-A6EDE42D7A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc:*:*:*:*:*:*:*",
"matchCriteriaId": "13763901-2D7B-485D-A957-E30587BCEB88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B213166-77E2-4E13-8769-FA8AF6EEC33A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc2:*:*:*:*:*:*:*",
"matchCriteriaId": "7A3C0371-223A-433C-B8A3-C24A499EB82F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc3:*:*:*:*:*:*:*",
"matchCriteriaId": "A066A001-830B-4407-A5CD-AB99059C190E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*",
"matchCriteriaId": "83B45095-526D-4BC5-A16B-6B5741F07FD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc99:*:*:*:*:*:*:*",
"matchCriteriaId": "51AA5D4E-5236-44DA-AA1A-E5E7A9DC8E64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpd:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A9F7DF-BB18-46FC-B471-3FC41F4CCD01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi:*:*:*:*:*:*:*",
"matchCriteriaId": "20E0326F-98A1-48B4-945D-D8603D5A8609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F06709E-F260-4E1A-A79D-DBD63F458CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj:*:*:*:*:*:*:*",
"matchCriteriaId": "2F69B4F2-4A03-4383-8958-11EE154A7350",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"matchCriteriaId": "930678B3-1527-4967-9D8F-27FC0DA060AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"matchCriteriaId": "58A34268-7618-48D2-8872-27B5B624543B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"matchCriteriaId": "C2017A75-CC29-4161-85CB-7A531E5ABB3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
"matchCriteriaId": "3F13F583-F645-4DF0-A075-B4F19D71D128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
"matchCriteriaId": "D07F9539-CFBE-46F7-9F5E-93A68169797D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades en la implementaci\u00f3n de la funcionalidad Common Industrial Protocol (CIP) de Cisco IOS Software y Cisco IOS XE Software, podr\u00edan permitir a un atacante remoto no autenticado causar la recarga de un dispositivo afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Las vulnerabilidades se deben a un procesamiento de entrada insuficiente del tr\u00e1fico CIP. Un atacante podr\u00eda explotar estas vulnerabilidades mediante el env\u00edo de tr\u00e1fico CIP dise\u00f1ado para ser procesado por un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo afectado se vuelva a cargar, resultando en una condici\u00f3n DoS."
}
],
"id": "CVE-2020-3225",
"lastModified": "2024-11-21T05:30:36.133",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-06-03T18:15:20.543",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
gsd-2020-3225
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2020-3225",
"description": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.",
"id": "GSD-2020-3225"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-3225"
],
"details": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.",
"id": "GSD-2020-3225",
"modified": "2023-12-13T01:22:09.341388Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-06-03T16:00:00",
"ID": "CVE-2020-3225",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS 12.2(55)SE",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "8.6",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
}
]
},
"source": {
"advisory": "cisco-sa-cipdos-hkfTZXEx",
"defect": [
[
"CSCvo17827",
"CSCvp56319",
"CSCvr47365",
"CSCvr67776"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1n:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jax2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jd17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)je:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jf99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jh1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)ji5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jj1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk1t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jk99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jn15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnd3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpi3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpj:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2020-3225"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200603 Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"refsource": "CISCO",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
},
"lastModifiedDate": "2021-09-17T18:42Z",
"publishedDate": "2020-06-03T18:15Z"
}
}
}
ghsa-h6c9-q6x7-9r7w
Vulnerability from github
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
{
"affected": [],
"aliases": [
"CVE-2020-3225"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-06-03T18:15:00Z",
"severity": "HIGH"
},
"details": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.",
"id": "GHSA-h6c9-q6x7-9r7w",
"modified": "2024-04-04T02:52:42Z",
"published": "2022-05-24T17:19:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3225"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
cisco-sa-cipdos-hkfTZXEx
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were found during the resolution of a Cisco TAC support case."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r\nThe vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\n\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\"]\r\n\r\n\r\nThis advisory is part of the June 3, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 23 Cisco Security Advisories that describe 25 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\" https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388\"].",
"title": "Summary"
},
{
"category": "general",
"text": "These vulnerabilities affect Cisco IOS and IOS XE Software if they are configured for CIP. CIP is not enabled by default.\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n Determine Whether CIP Is Enabled\r\nAn administrator can determine whether CIP is enabled on a device by issuing the show cip status command and checking the State: value.\r\n\r\nThe following show cip status output shows that CIP is enabled for VLAN 1:\r\n\r\n\r\nDevice\u003eshow cip status\r\nState : Enabled\r\nVlan : 1\r\n\r\nIf the command returns no output, the device is not affected by the vulnerabilities described in this advisory.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect Cisco IOS XR Software or Cisco NX-OS Software.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttps://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n\r\n\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to search advisories in the following ways:\r\n\r\nChoose the software and one or more releases\r\nUpload a .txt file that includes a list of specific releases\r\nEnter the output of the show version command\r\n\r\nAfter initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.\r\n\r\nCustomers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S:\r\n\r\n\r\n\r\nBy default, the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were found during the resolution of a Cisco TAC support case.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
},
{
"category": "external",
"summary": "Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
},
{
"category": "external",
"summary": "Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 2 Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3S Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3SG Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"tracking": {
"current_release_date": "2020-06-03T16:00:00+00:00",
"generator": {
"date": "2022-09-03T03:00:30+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-cipdos-hkfTZXEx",
"initial_release_date": "2020-06-03T16:00:00+00:00",
"revision_history": [
{
"date": "2020-04-30T19:04:54+00:00",
"number": "1.0.0",
"summary": "Initial public release."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "12.2(55)SE",
"product": {
"name": "12.2(55)SE",
"product_id": "CSAFPID-103763"
}
},
{
"category": "service_pack",
"name": "12.2(46)SE2",
"product": {
"name": "12.2(46)SE2",
"product_id": "CSAFPID-104089"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE2",
"product": {
"name": "12.2(50)SE2",
"product_id": "CSAFPID-104101"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE1",
"product": {
"name": "12.2(50)SE1",
"product_id": "CSAFPID-104342"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE5",
"product": {
"name": "12.2(50)SE5",
"product_id": "CSAFPID-104855"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE3",
"product": {
"name": "12.2(55)SE3",
"product_id": "CSAFPID-105394"
}
},
{
"category": "service_pack",
"name": "12.2(52)SE",
"product": {
"name": "12.2(52)SE",
"product_id": "CSAFPID-105973"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE",
"product": {
"name": "12.2(58)SE",
"product_id": "CSAFPID-105987"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE3",
"product": {
"name": "12.2(50)SE3",
"product_id": "CSAFPID-106016"
}
},
{
"category": "service_pack",
"name": "12.2(52)SE1",
"product": {
"name": "12.2(52)SE1",
"product_id": "CSAFPID-106684"
}
},
{
"category": "service_pack",
"name": "12.2(46)SE1",
"product": {
"name": "12.2(46)SE1",
"product_id": "CSAFPID-106997"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE4",
"product": {
"name": "12.2(50)SE4",
"product_id": "CSAFPID-107209"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE",
"product": {
"name": "12.2(50)SE",
"product_id": "CSAFPID-107630"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE1",
"product": {
"name": "12.2(58)SE1",
"product_id": "CSAFPID-109098"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE4",
"product": {
"name": "12.2(55)SE4",
"product_id": "CSAFPID-109439"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE2",
"product": {
"name": "12.2(58)SE2",
"product_id": "CSAFPID-109808"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE5",
"product": {
"name": "12.2(55)SE5",
"product_id": "CSAFPID-111674"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE6",
"product": {
"name": "12.2(55)SE6",
"product_id": "CSAFPID-114665"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE7",
"product": {
"name": "12.2(55)SE7",
"product_id": "CSAFPID-184125"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE9",
"product": {
"name": "12.2(55)SE9",
"product_id": "CSAFPID-192911"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE10",
"product": {
"name": "12.2(55)SE10",
"product_id": "CSAFPID-198542"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE11",
"product": {
"name": "12.2(55)SE11",
"product_id": "CSAFPID-210732"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE12",
"product": {
"name": "12.2(55)SE12",
"product_id": "CSAFPID-228057"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE13",
"product": {
"name": "12.2(55)SE13",
"product_id": "CSAFPID-230962"
}
}
],
"category": "product_version",
"name": "12.2SE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(44)EX",
"product": {
"name": "12.2(44)EX",
"product_id": "CSAFPID-104061"
}
},
{
"category": "service_pack",
"name": "12.2(44)EX1",
"product": {
"name": "12.2(44)EX1",
"product_id": "CSAFPID-105253"
}
}
],
"category": "product_version",
"name": "12.2EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(60)EZ16",
"product": {
"name": "12.2(60)EZ16",
"product_id": "CSAFPID-262536"
}
}
],
"category": "product_version",
"name": "12.2EZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)XO1",
"product": {
"name": "15.0(1)XO1",
"product_id": "CSAFPID-103955"
}
},
{
"category": "service_pack",
"name": "15.0(1)XO",
"product": {
"name": "15.0(1)XO",
"product_id": "CSAFPID-106072"
}
},
{
"category": "service_pack",
"name": "15.0(2)XO",
"product": {
"name": "15.0(2)XO",
"product_id": "CSAFPID-111005"
}
}
],
"category": "product_version",
"name": "15.0XO"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)EY",
"product": {
"name": "15.0(1)EY",
"product_id": "CSAFPID-104376"
}
},
{
"category": "service_pack",
"name": "15.0(1)EY1",
"product": {
"name": "15.0(1)EY1",
"product_id": "CSAFPID-115969"
}
},
{
"category": "service_pack",
"name": "15.0(1)EY2",
"product": {
"name": "15.0(1)EY2",
"product_id": "CSAFPID-187269"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY",
"product": {
"name": "15.0(2)EY",
"product_id": "CSAFPID-187932"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY1",
"product": {
"name": "15.0(2)EY1",
"product_id": "CSAFPID-190250"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY2",
"product": {
"name": "15.0(2)EY2",
"product_id": "CSAFPID-192831"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY3",
"product": {
"name": "15.0(2)EY3",
"product_id": "CSAFPID-195481"
}
}
],
"category": "product_version",
"name": "15.0EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SE",
"product": {
"name": "15.0(2)SE",
"product_id": "CSAFPID-107852"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE1",
"product": {
"name": "15.0(2)SE1",
"product_id": "CSAFPID-115939"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE2",
"product": {
"name": "15.0(2)SE2",
"product_id": "CSAFPID-116083"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE3",
"product": {
"name": "15.0(2)SE3",
"product_id": "CSAFPID-189455"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE4",
"product": {
"name": "15.0(2)SE4",
"product_id": "CSAFPID-190635"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE5",
"product": {
"name": "15.0(2)SE5",
"product_id": "CSAFPID-192706"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE6",
"product": {
"name": "15.0(2)SE6",
"product_id": "CSAFPID-195770"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE7",
"product": {
"name": "15.0(2)SE7",
"product_id": "CSAFPID-204097"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE8",
"product": {
"name": "15.0(2)SE8",
"product_id": "CSAFPID-209028"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE9",
"product": {
"name": "15.0(2)SE9",
"product_id": "CSAFPID-209029"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE10",
"product": {
"name": "15.0(2)SE10",
"product_id": "CSAFPID-213788"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE11",
"product": {
"name": "15.0(2)SE11",
"product_id": "CSAFPID-220466"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE10a",
"product": {
"name": "15.0(2)SE10a",
"product_id": "CSAFPID-222342"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE12",
"product": {
"name": "15.0(2)SE12",
"product_id": "CSAFPID-234926"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE13",
"product": {
"name": "15.0(2)SE13",
"product_id": "CSAFPID-245380"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE13a",
"product": {
"name": "15.0(2)SE13a",
"product_id": "CSAFPID-274199"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE13b",
"product": {
"name": "15.0(2)SE13b",
"product_id": "CSAFPID-280778"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE13c",
"product": {
"name": "15.0(2)SE13c",
"product_id": "CSAFPID-286843"
}
}
],
"category": "product_version",
"name": "15.0SE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SG11a",
"product": {
"name": "15.0(2)SG11a",
"product_id": "CSAFPID-262335"
}
}
],
"category": "product_version",
"name": "15.0SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)EX",
"product": {
"name": "15.0(1)EX",
"product_id": "CSAFPID-109442"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX2",
"product": {
"name": "15.0(2)EX2",
"product_id": "CSAFPID-192910"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX8",
"product": {
"name": "15.0(2)EX8",
"product_id": "CSAFPID-204831"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX10",
"product": {
"name": "15.0(2)EX10",
"product_id": "CSAFPID-211570"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX11",
"product": {
"name": "15.0(2)EX11",
"product_id": "CSAFPID-214797"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX13",
"product": {
"name": "15.0(2)EX13",
"product_id": "CSAFPID-225160"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX12",
"product": {
"name": "15.0(2)EX12",
"product_id": "CSAFPID-230965"
}
}
],
"category": "product_version",
"name": "15.0EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EA",
"product": {
"name": "15.0(2)EA",
"product_id": "CSAFPID-117282"
}
},
{
"category": "service_pack",
"name": "15.0(2)EA1",
"product": {
"name": "15.0(2)EA1",
"product_id": "CSAFPID-193033"
}
}
],
"category": "product_version",
"name": "15.0EA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)E",
"product": {
"name": "15.2(2)E",
"product_id": "CSAFPID-187057"
}
},
{
"category": "service_pack",
"name": "15.2(2)E1",
"product": {
"name": "15.2(2)E1",
"product_id": "CSAFPID-201074"
}
},
{
"category": "service_pack",
"name": "15.2(2b)E",
"product": {
"name": "15.2(2b)E",
"product_id": "CSAFPID-204102"
}
},
{
"category": "service_pack",
"name": "15.2(3)E1",
"product": {
"name": "15.2(3)E1",
"product_id": "CSAFPID-204186"
}
},
{
"category": "service_pack",
"name": "15.2(2)E2",
"product": {
"name": "15.2(2)E2",
"product_id": "CSAFPID-204228"
}
},
{
"category": "service_pack",
"name": "15.2(2)E3",
"product": {
"name": "15.2(2)E3",
"product_id": "CSAFPID-205672"
}
},
{
"category": "service_pack",
"name": "15.2(2a)E2",
"product": {
"name": "15.2(2a)E2",
"product_id": "CSAFPID-209045"
}
},
{
"category": "service_pack",
"name": "15.2(3)E2",
"product": {
"name": "15.2(3)E2",
"product_id": "CSAFPID-209046"
}
},
{
"category": "service_pack",
"name": "15.2(3a)E",
"product": {
"name": "15.2(3a)E",
"product_id": "CSAFPID-209047"
}
},
{
"category": "service_pack",
"name": "15.2(3)E3",
"product": {
"name": "15.2(3)E3",
"product_id": "CSAFPID-209358"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E2",
"product": {
"name": "15.2(3m)E2",
"product_id": "CSAFPID-209359"
}
},
{
"category": "service_pack",
"name": "15.2(2)E4",
"product": {
"name": "15.2(2)E4",
"product_id": "CSAFPID-210766"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5",
"product": {
"name": "15.2(2)E5",
"product_id": "CSAFPID-211296"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E1",
"product": {
"name": "15.2(4m)E1",
"product_id": "CSAFPID-214072"
}
},
{
"category": "service_pack",
"name": "15.2(3)E4",
"product": {
"name": "15.2(3)E4",
"product_id": "CSAFPID-214078"
}
},
{
"category": "service_pack",
"name": "15.2(5)E",
"product": {
"name": "15.2(5)E",
"product_id": "CSAFPID-214556"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E7",
"product": {
"name": "15.2(3m)E7",
"product_id": "CSAFPID-216295"
}
},
{
"category": "service_pack",
"name": "15.2(2)E6",
"product": {
"name": "15.2(2)E6",
"product_id": "CSAFPID-218891"
}
},
{
"category": "service_pack",
"name": "15.2(5)E1",
"product": {
"name": "15.2(5)E1",
"product_id": "CSAFPID-220441"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E3",
"product": {
"name": "15.2(4m)E3",
"product_id": "CSAFPID-220664"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E8",
"product": {
"name": "15.2(3m)E8",
"product_id": "CSAFPID-220689"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5a",
"product": {
"name": "15.2(2)E5a",
"product_id": "CSAFPID-221033"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5b",
"product": {
"name": "15.2(2)E5b",
"product_id": "CSAFPID-222436"
}
},
{
"category": "service_pack",
"name": "15.2(4n)E2",
"product": {
"name": "15.2(4n)E2",
"product_id": "CSAFPID-222500"
}
},
{
"category": "service_pack",
"name": "15.2(4o)E2",
"product": {
"name": "15.2(4o)E2",
"product_id": "CSAFPID-222924"
}
},
{
"category": "service_pack",
"name": "15.2(5a)E1",
"product": {
"name": "15.2(5a)E1",
"product_id": "CSAFPID-223143"
}
},
{
"category": "service_pack",
"name": "15.2(2)E7",
"product": {
"name": "15.2(2)E7",
"product_id": "CSAFPID-224868"
}
},
{
"category": "service_pack",
"name": "15.2(5)E2",
"product": {
"name": "15.2(5)E2",
"product_id": "CSAFPID-225740"
}
},
{
"category": "service_pack",
"name": "15.2(4p)E1",
"product": {
"name": "15.2(4p)E1",
"product_id": "CSAFPID-226077"
}
},
{
"category": "service_pack",
"name": "15.2(6)E",
"product": {
"name": "15.2(6)E",
"product_id": "CSAFPID-227598"
}
},
{
"category": "service_pack",
"name": "15.2(5)E2c",
"product": {
"name": "15.2(5)E2c",
"product_id": "CSAFPID-228151"
}
},
{
"category": "service_pack",
"name": "15.2(2)E8",
"product": {
"name": "15.2(2)E8",
"product_id": "CSAFPID-230587"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E2",
"product": {
"name": "15.2(4m)E2",
"product_id": "CSAFPID-230588"
}
},
{
"category": "service_pack",
"name": "15.2(4o)E3",
"product": {
"name": "15.2(4o)E3",
"product_id": "CSAFPID-230589"
}
},
{
"category": "service_pack",
"name": "15.2(4q)E1",
"product": {
"name": "15.2(4q)E1",
"product_id": "CSAFPID-230590"
}
},
{
"category": "service_pack",
"name": "15.2(6)E0a",
"product": {
"name": "15.2(6)E0a",
"product_id": "CSAFPID-230591"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1",
"product": {
"name": "15.2(6)E1",
"product_id": "CSAFPID-230592"
}
},
{
"category": "service_pack",
"name": "15.2(6)E0c",
"product": {
"name": "15.2(6)E0c",
"product_id": "CSAFPID-231245"
}
},
{
"category": "service_pack",
"name": "15.2(2)E9",
"product": {
"name": "15.2(2)E9",
"product_id": "CSAFPID-232765"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1a",
"product": {
"name": "15.2(6)E1a",
"product_id": "CSAFPID-238999"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1s",
"product": {
"name": "15.2(6)E1s",
"product_id": "CSAFPID-240186"
}
},
{
"category": "service_pack",
"name": "15.2(4s)E1",
"product": {
"name": "15.2(4s)E1",
"product_id": "CSAFPID-241916"
}
},
{
"category": "service_pack",
"name": "15.2(7)E",
"product": {
"name": "15.2(7)E",
"product_id": "CSAFPID-242313"
}
},
{
"category": "service_pack",
"name": "15.2(2)E10",
"product": {
"name": "15.2(2)E10",
"product_id": "CSAFPID-244911"
}
},
{
"category": "service_pack",
"name": "15.2(6)E2a",
"product": {
"name": "15.2(6)E2a",
"product_id": "CSAFPID-247630"
}
},
{
"category": "service_pack",
"name": "15.2(7)E0b",
"product": {
"name": "15.2(7)E0b",
"product_id": "CSAFPID-260993"
}
},
{
"category": "service_pack",
"name": "15.2(7)E0s",
"product": {
"name": "15.2(7)E0s",
"product_id": "CSAFPID-262300"
}
},
{
"category": "service_pack",
"name": "15.2(6)E3",
"product": {
"name": "15.2(6)E3",
"product_id": "CSAFPID-262684"
}
},
{
"category": "service_pack",
"name": "15.2(2)E10a",
"product": {
"name": "15.2(2)E10a",
"product_id": "CSAFPID-263981"
}
},
{
"category": "service_pack",
"name": "15.2(4)E9",
"product": {
"name": "15.2(4)E9",
"product_id": "CSAFPID-264643"
}
},
{
"category": "service_pack",
"name": "15.2(7a)E0b",
"product": {
"name": "15.2(7a)E0b",
"product_id": "CSAFPID-271140"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10",
"product": {
"name": "15.2(4)E10",
"product_id": "CSAFPID-271286"
}
},
{
"category": "service_pack",
"name": "15.2(7b)E0b",
"product": {
"name": "15.2(7b)E0b",
"product_id": "CSAFPID-276903"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10a",
"product": {
"name": "15.2(4)E10a",
"product_id": "CSAFPID-278029"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10b",
"product": {
"name": "15.2(4)E10b",
"product_id": "CSAFPID-280779"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10c",
"product": {
"name": "15.2(4)E10c",
"product_id": "CSAFPID-284349"
}
},
{
"category": "service_pack",
"name": "15.2(2)E10b",
"product": {
"name": "15.2(2)E10b",
"product_id": "CSAFPID-284567"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10d",
"product": {
"name": "15.2(4)E10d",
"product_id": "CSAFPID-286452"
}
},
{
"category": "service_pack",
"name": "15.2(2)E10c",
"product": {
"name": "15.2(2)E10c",
"product_id": "CSAFPID-286860"
}
}
],
"category": "product_version",
"name": "15.2E"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)EY",
"product": {
"name": "15.2(1)EY",
"product_id": "CSAFPID-191928"
}
}
],
"category": "product_version",
"name": "15.2EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(4)JAZ",
"product": {
"name": "15.2(4)JAZ",
"product_id": "CSAFPID-195528"
}
},
{
"category": "service_pack",
"name": "15.2(4)JAZ1",
"product": {
"name": "15.2(4)JAZ1",
"product_id": "CSAFPID-200503"
}
}
],
"category": "product_version",
"name": "15.2JAZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EK",
"product": {
"name": "15.0(2)EK",
"product_id": "CSAFPID-195544"
}
},
{
"category": "service_pack",
"name": "15.0(2)EK1",
"product": {
"name": "15.0(2)EK1",
"product_id": "CSAFPID-197468"
}
}
],
"category": "product_version",
"name": "15.0EK"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)EB",
"product": {
"name": "15.2(2)EB",
"product_id": "CSAFPID-197462"
}
},
{
"category": "service_pack",
"name": "15.2(2)EB1",
"product": {
"name": "15.2(2)EB1",
"product_id": "CSAFPID-209839"
}
},
{
"category": "service_pack",
"name": "15.2(2)EB2",
"product": {
"name": "15.2(2)EB2",
"product_id": "CSAFPID-214218"
}
},
{
"category": "service_pack",
"name": "15.2(6)EB",
"product": {
"name": "15.2(6)EB",
"product_id": "CSAFPID-251487"
}
}
],
"category": "product_version",
"name": "15.2EB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)EA",
"product": {
"name": "15.2(2)EA",
"product_id": "CSAFPID-198063"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA1",
"product": {
"name": "15.2(2)EA1",
"product_id": "CSAFPID-209049"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA2",
"product": {
"name": "15.2(2)EA2",
"product_id": "CSAFPID-209050"
}
},
{
"category": "service_pack",
"name": "15.2(3)EA",
"product": {
"name": "15.2(3)EA",
"product_id": "CSAFPID-209051"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA",
"product": {
"name": "15.2(4)EA",
"product_id": "CSAFPID-210203"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA1",
"product": {
"name": "15.2(4)EA1",
"product_id": "CSAFPID-210958"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA3",
"product": {
"name": "15.2(2)EA3",
"product_id": "CSAFPID-214217"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA3",
"product": {
"name": "15.2(4)EA3",
"product_id": "CSAFPID-214965"
}
},
{
"category": "service_pack",
"name": "15.2(5)EA",
"product": {
"name": "15.2(5)EA",
"product_id": "CSAFPID-220038"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA4",
"product": {
"name": "15.2(4)EA4",
"product_id": "CSAFPID-220460"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA2",
"product": {
"name": "15.2(4)EA2",
"product_id": "CSAFPID-220507"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA5",
"product": {
"name": "15.2(4)EA5",
"product_id": "CSAFPID-222419"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA6",
"product": {
"name": "15.2(4)EA6",
"product_id": "CSAFPID-228075"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA7",
"product": {
"name": "15.2(4)EA7",
"product_id": "CSAFPID-230992"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA8",
"product": {
"name": "15.2(4)EA8",
"product_id": "CSAFPID-241614"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA9",
"product": {
"name": "15.2(4)EA9",
"product_id": "CSAFPID-257830"
}
}
],
"category": "product_version",
"name": "15.2EA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JN",
"product": {
"name": "15.3(3)JN",
"product_id": "CSAFPID-200492"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN1",
"product": {
"name": "15.3(3)JN1",
"product_id": "CSAFPID-209083"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN2",
"product": {
"name": "15.3(3)JN2",
"product_id": "CSAFPID-209085"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN3",
"product": {
"name": "15.3(3)JN3",
"product_id": "CSAFPID-209086"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN4",
"product": {
"name": "15.3(3)JN4",
"product_id": "CSAFPID-209087"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN6",
"product": {
"name": "15.3(3)JN6",
"product_id": "CSAFPID-209930"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN7",
"product": {
"name": "15.3(3)JN7",
"product_id": "CSAFPID-209935"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN8",
"product": {
"name": "15.3(3)JN8",
"product_id": "CSAFPID-210410"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN9",
"product": {
"name": "15.3(3)JN9",
"product_id": "CSAFPID-213654"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN11",
"product": {
"name": "15.3(3)JN11",
"product_id": "CSAFPID-222537"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN13",
"product": {
"name": "15.3(3)JN13",
"product_id": "CSAFPID-230915"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN14",
"product": {
"name": "15.3(3)JN14",
"product_id": "CSAFPID-232122"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN15",
"product": {
"name": "15.3(3)JN15",
"product_id": "CSAFPID-239279"
}
}
],
"category": "product_version",
"name": "15.3JN"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JA1n",
"product": {
"name": "15.3(3)JA1n",
"product_id": "CSAFPID-204310"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA1",
"product": {
"name": "15.3(3)JA1",
"product_id": "CSAFPID-204826"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA4",
"product": {
"name": "15.3(3)JA4",
"product_id": "CSAFPID-209067"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA5",
"product": {
"name": "15.3(3)JA5",
"product_id": "CSAFPID-209068"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA6",
"product": {
"name": "15.3(3)JA6",
"product_id": "CSAFPID-210937"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA7",
"product": {
"name": "15.3(3)JA7",
"product_id": "CSAFPID-214382"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA8",
"product": {
"name": "15.3(3)JA8",
"product_id": "CSAFPID-214764"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA10",
"product": {
"name": "15.3(3)JA10",
"product_id": "CSAFPID-217779"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA11",
"product": {
"name": "15.3(3)JA11",
"product_id": "CSAFPID-226174"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA12",
"product": {
"name": "15.3(3)JA12",
"product_id": "CSAFPID-230712"
}
}
],
"category": "product_version",
"name": "15.3JA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JAA",
"product": {
"name": "15.3(3)JAA",
"product_id": "CSAFPID-204103"
}
},
{
"category": "service_pack",
"name": "15.3(3)JAA1",
"product": {
"name": "15.3(3)JAA1",
"product_id": "CSAFPID-230594"
}
}
],
"category": "product_version",
"name": "15.3JAA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JB",
"product": {
"name": "15.3(3)JB",
"product_id": "CSAFPID-209077"
}
}
],
"category": "product_version",
"name": "15.3JB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SQD",
"product": {
"name": "15.0(2)SQD",
"product_id": "CSAFPID-204324"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD1",
"product": {
"name": "15.0(2)SQD1",
"product_id": "CSAFPID-209628"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD2",
"product": {
"name": "15.0(2)SQD2",
"product_id": "CSAFPID-211290"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD3",
"product": {
"name": "15.0(2)SQD3",
"product_id": "CSAFPID-217078"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD4",
"product": {
"name": "15.0(2)SQD4",
"product_id": "CSAFPID-220670"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD5",
"product": {
"name": "15.0(2)SQD5",
"product_id": "CSAFPID-225358"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD6",
"product": {
"name": "15.0(2)SQD6",
"product_id": "CSAFPID-226038"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD7",
"product": {
"name": "15.0(2)SQD7",
"product_id": "CSAFPID-227364"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD8",
"product": {
"name": "15.0(2)SQD8",
"product_id": "CSAFPID-232850"
}
}
],
"category": "product_version",
"name": "15.0SQD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JNB",
"product": {
"name": "15.3(3)JNB",
"product_id": "CSAFPID-205723"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB1",
"product": {
"name": "15.3(3)JNB1",
"product_id": "CSAFPID-209089"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB2",
"product": {
"name": "15.3(3)JNB2",
"product_id": "CSAFPID-209090"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB3",
"product": {
"name": "15.3(3)JNB3",
"product_id": "CSAFPID-210411"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB4",
"product": {
"name": "15.3(3)JNB4",
"product_id": "CSAFPID-213655"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB6",
"product": {
"name": "15.3(3)JNB6",
"product_id": "CSAFPID-224738"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB5",
"product": {
"name": "15.3(3)JNB5",
"product_id": "CSAFPID-230606"
}
}
],
"category": "product_version",
"name": "15.3JNB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JAX",
"product": {
"name": "15.3(3)JAX",
"product_id": "CSAFPID-209073"
}
},
{
"category": "service_pack",
"name": "15.3(3)JAX1",
"product": {
"name": "15.3(3)JAX1",
"product_id": "CSAFPID-209074"
}
},
{
"category": "service_pack",
"name": "15.3(3)JAX2",
"product": {
"name": "15.3(3)JAX2",
"product_id": "CSAFPID-209075"
}
}
],
"category": "product_version",
"name": "15.3JAX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JBB",
"product": {
"name": "15.3(3)JBB",
"product_id": "CSAFPID-209080"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB1",
"product": {
"name": "15.3(3)JBB1",
"product_id": "CSAFPID-209081"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB2",
"product": {
"name": "15.3(3)JBB2",
"product_id": "CSAFPID-209419"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB4",
"product": {
"name": "15.3(3)JBB4",
"product_id": "CSAFPID-210189"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB5",
"product": {
"name": "15.3(3)JBB5",
"product_id": "CSAFPID-210262"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB6",
"product": {
"name": "15.3(3)JBB6",
"product_id": "CSAFPID-210491"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB8",
"product": {
"name": "15.3(3)JBB8",
"product_id": "CSAFPID-212266"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB6a",
"product": {
"name": "15.3(3)JBB6a",
"product_id": "CSAFPID-213770"
}
}
],
"category": "product_version",
"name": "15.3JBB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JC",
"product": {
"name": "15.3(3)JC",
"product_id": "CSAFPID-209474"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC1",
"product": {
"name": "15.3(3)JC1",
"product_id": "CSAFPID-213089"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC2",
"product": {
"name": "15.3(3)JC2",
"product_id": "CSAFPID-216573"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC3",
"product": {
"name": "15.3(3)JC3",
"product_id": "CSAFPID-217803"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC4",
"product": {
"name": "15.3(3)JC4",
"product_id": "CSAFPID-220446"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC5",
"product": {
"name": "15.3(3)JC5",
"product_id": "CSAFPID-222258"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC6",
"product": {
"name": "15.3(3)JC6",
"product_id": "CSAFPID-224442"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC8",
"product": {
"name": "15.3(3)JC8",
"product_id": "CSAFPID-227791"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC9",
"product": {
"name": "15.3(3)JC9",
"product_id": "CSAFPID-230596"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC14",
"product": {
"name": "15.3(3)JC14",
"product_id": "CSAFPID-231017"
}
}
],
"category": "product_version",
"name": "15.3JC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JNC",
"product": {
"name": "15.3(3)JNC",
"product_id": "CSAFPID-210137"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNC1",
"product": {
"name": "15.3(3)JNC1",
"product_id": "CSAFPID-212497"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNC2",
"product": {
"name": "15.3(3)JNC2",
"product_id": "CSAFPID-216632"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNC3",
"product": {
"name": "15.3(3)JNC3",
"product_id": "CSAFPID-222412"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNC4",
"product": {
"name": "15.3(3)JNC4",
"product_id": "CSAFPID-225662"
}
}
],
"category": "product_version",
"name": "15.3JNC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JNP",
"product": {
"name": "15.3(3)JNP",
"product_id": "CSAFPID-211256"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNP1",
"product": {
"name": "15.3(3)JNP1",
"product_id": "CSAFPID-212686"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNP3",
"product": {
"name": "15.3(3)JNP3",
"product_id": "CSAFPID-220657"
}
}
],
"category": "product_version",
"name": "15.3JNP"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPB",
"product": {
"name": "15.3(3)JPB",
"product_id": "CSAFPID-213843"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPB1",
"product": {
"name": "15.3(3)JPB1",
"product_id": "CSAFPID-216277"
}
}
],
"category": "product_version",
"name": "15.3JPB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JD",
"product": {
"name": "15.3(3)JD",
"product_id": "CSAFPID-213954"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD2",
"product": {
"name": "15.3(3)JD2",
"product_id": "CSAFPID-222630"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD3",
"product": {
"name": "15.3(3)JD3",
"product_id": "CSAFPID-222716"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD4",
"product": {
"name": "15.3(3)JD4",
"product_id": "CSAFPID-225790"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD5",
"product": {
"name": "15.3(3)JD5",
"product_id": "CSAFPID-226172"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD6",
"product": {
"name": "15.3(3)JD6",
"product_id": "CSAFPID-227789"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD7",
"product": {
"name": "15.3(3)JD7",
"product_id": "CSAFPID-228955"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD8",
"product": {
"name": "15.3(3)JD8",
"product_id": "CSAFPID-230598"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD9",
"product": {
"name": "15.3(3)JD9",
"product_id": "CSAFPID-230824"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD11",
"product": {
"name": "15.3(3)JD11",
"product_id": "CSAFPID-231000"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD12",
"product": {
"name": "15.3(3)JD12",
"product_id": "CSAFPID-231001"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD13",
"product": {
"name": "15.3(3)JD13",
"product_id": "CSAFPID-232852"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD14",
"product": {
"name": "15.3(3)JD14",
"product_id": "CSAFPID-234115"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD16",
"product": {
"name": "15.3(3)JD16",
"product_id": "CSAFPID-239225"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD17",
"product": {
"name": "15.3(3)JD17",
"product_id": "CSAFPID-259985"
}
}
],
"category": "product_version",
"name": "15.3JD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(4)EC1",
"product": {
"name": "15.2(4)EC1",
"product_id": "CSAFPID-220461"
}
},
{
"category": "service_pack",
"name": "15.2(4)EC2",
"product": {
"name": "15.2(4)EC2",
"product_id": "CSAFPID-223086"
}
}
],
"category": "product_version",
"name": "15.2EC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPC",
"product": {
"name": "15.3(3)JPC",
"product_id": "CSAFPID-217048"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC1",
"product": {
"name": "15.3(3)JPC1",
"product_id": "CSAFPID-220235"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC2",
"product": {
"name": "15.3(3)JPC2",
"product_id": "CSAFPID-220658"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC3",
"product": {
"name": "15.3(3)JPC3",
"product_id": "CSAFPID-225167"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC100",
"product": {
"name": "15.3(3)JPC100",
"product_id": "CSAFPID-230994"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC5",
"product": {
"name": "15.3(3)JPC5",
"product_id": "CSAFPID-230995"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC99",
"product": {
"name": "15.3(3)JPC99",
"product_id": "CSAFPID-273510"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC97",
"product": {
"name": "15.3(3)JPC97",
"product_id": "CSAFPID-278403"
}
}
],
"category": "product_version",
"name": "15.3JPC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JND",
"product": {
"name": "15.3(3)JND",
"product_id": "CSAFPID-217194"
}
},
{
"category": "service_pack",
"name": "15.3(3)JND1",
"product": {
"name": "15.3(3)JND1",
"product_id": "CSAFPID-222930"
}
},
{
"category": "service_pack",
"name": "15.3(3)JND2",
"product": {
"name": "15.3(3)JND2",
"product_id": "CSAFPID-226202"
}
},
{
"category": "service_pack",
"name": "15.3(3)JND3",
"product": {
"name": "15.3(3)JND3",
"product_id": "CSAFPID-227960"
}
}
],
"category": "product_version",
"name": "15.3JND"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JE",
"product": {
"name": "15.3(3)JE",
"product_id": "CSAFPID-218946"
}
}
],
"category": "product_version",
"name": "15.3JE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPD",
"product": {
"name": "15.3(3)JPD",
"product_id": "CSAFPID-218948"
}
}
],
"category": "product_version",
"name": "15.3JPD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JF",
"product": {
"name": "15.3(3)JF",
"product_id": "CSAFPID-227048"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF1",
"product": {
"name": "15.3(3)JF1",
"product_id": "CSAFPID-228956"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF2",
"product": {
"name": "15.3(3)JF2",
"product_id": "CSAFPID-230826"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF4",
"product": {
"name": "15.3(3)JF4",
"product_id": "CSAFPID-231679"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF5",
"product": {
"name": "15.3(3)JF5",
"product_id": "CSAFPID-232061"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF6",
"product": {
"name": "15.3(3)JF6",
"product_id": "CSAFPID-236205"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF7",
"product": {
"name": "15.3(3)JF7",
"product_id": "CSAFPID-239361"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF8",
"product": {
"name": "15.3(3)JF8",
"product_id": "CSAFPID-241765"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF9",
"product": {
"name": "15.3(3)JF9",
"product_id": "CSAFPID-243525"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF10",
"product": {
"name": "15.3(3)JF10",
"product_id": "CSAFPID-259238"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF15i",
"product": {
"name": "15.3(3)JF15i",
"product_id": "CSAFPID-284786"
}
}
],
"category": "product_version",
"name": "15.3JF"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JG",
"product": {
"name": "15.3(3)JG",
"product_id": "CSAFPID-230603"
}
},
{
"category": "service_pack",
"name": "15.3(3)JG1",
"product": {
"name": "15.3(3)JG1",
"product_id": "CSAFPID-231796"
}
}
],
"category": "product_version",
"name": "15.3JG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JH",
"product": {
"name": "15.3(3)JH",
"product_id": "CSAFPID-230605"
}
},
{
"category": "service_pack",
"name": "15.3(3)JH1",
"product": {
"name": "15.3(3)JH1",
"product_id": "CSAFPID-238504"
}
}
],
"category": "product_version",
"name": "15.3JH"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JI1",
"product": {
"name": "15.3(3)JI1",
"product_id": "CSAFPID-244913"
}
},
{
"category": "service_pack",
"name": "15.3(3)JI3",
"product": {
"name": "15.3(3)JI3",
"product_id": "CSAFPID-252156"
}
},
{
"category": "service_pack",
"name": "15.3(3)JI4",
"product": {
"name": "15.3(3)JI4",
"product_id": "CSAFPID-257209"
}
},
{
"category": "service_pack",
"name": "15.3(3)JI5",
"product": {
"name": "15.3(3)JI5",
"product_id": "CSAFPID-260691"
}
}
],
"category": "product_version",
"name": "15.3JI"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(6)I1",
"product": {
"name": "12.2(6)I1",
"product_id": "CSAFPID-243144"
}
}
],
"category": "product_version",
"name": "12.2I"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JK",
"product": {
"name": "15.3(3)JK",
"product_id": "CSAFPID-255002"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK99",
"product": {
"name": "15.3(3)JK99",
"product_id": "CSAFPID-273350"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK3",
"product": {
"name": "15.3(3)JK3",
"product_id": "CSAFPID-277339"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK1a",
"product": {
"name": "15.3(3)JK1a",
"product_id": "CSAFPID-277340"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK2a",
"product": {
"name": "15.3(3)JK2a",
"product_id": "CSAFPID-277341"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK1t",
"product": {
"name": "15.3(3)JK1t",
"product_id": "CSAFPID-277352"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK6",
"product": {
"name": "15.3(3)JK6",
"product_id": "CSAFPID-282669"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK7",
"product": {
"name": "15.3(3)JK7",
"product_id": "CSAFPID-286111"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK8",
"product": {
"name": "15.3(3)JK8",
"product_id": "CSAFPID-287121"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK8a",
"product": {
"name": "15.3(3)JK8a",
"product_id": "CSAFPID-290656"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK8b",
"product": {
"name": "15.3(3)JK8b",
"product_id": "CSAFPID-292482"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK9",
"product": {
"name": "15.3(3)JK9",
"product_id": "CSAFPID-294801"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK10",
"product": {
"name": "15.3(3)JK10",
"product_id": "CSAFPID-299944"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK11",
"product": {
"name": "15.3(3)JK11",
"product_id": "CSAFPID-301233"
}
}
],
"category": "product_version",
"name": "15.3JK"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JJ",
"product": {
"name": "15.3(3)JJ",
"product_id": "CSAFPID-259869"
}
},
{
"category": "service_pack",
"name": "15.3(3)JJ1",
"product": {
"name": "15.3(3)JJ1",
"product_id": "CSAFPID-261487"
}
}
],
"category": "product_version",
"name": "15.3JJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVR1",
"product": {
"name": "15.1(3)SVR1",
"product_id": "CSAFPID-277230"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR2",
"product": {
"name": "15.1(3)SVR2",
"product_id": "CSAFPID-277253"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR3",
"product": {
"name": "15.1(3)SVR3",
"product_id": "CSAFPID-279337"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR10",
"product": {
"name": "15.1(3)SVR10",
"product_id": "CSAFPID-290618"
}
}
],
"category": "product_version",
"name": "15.1SVR"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPI",
"product": {
"name": "15.3(3)JPI",
"product_id": "CSAFPID-274202"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI3",
"product": {
"name": "15.3(3)JPI3",
"product_id": "CSAFPID-274203"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI7",
"product": {
"name": "15.3(3)JPI7",
"product_id": "CSAFPID-278804"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI6a",
"product": {
"name": "15.3(3)JPI6a",
"product_id": "CSAFPID-278884"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI8a",
"product": {
"name": "15.3(3)JPI8a",
"product_id": "CSAFPID-285319"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI9",
"product": {
"name": "15.3(3)JPI9",
"product_id": "CSAFPID-285320"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI10",
"product": {
"name": "15.3(3)JPI10",
"product_id": "CSAFPID-286520"
}
}
],
"category": "product_version",
"name": "15.3JPI"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPJ",
"product": {
"name": "15.3(3)JPJ",
"product_id": "CSAFPID-275845"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ2t",
"product": {
"name": "15.3(3)JPJ2t",
"product_id": "CSAFPID-277354"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ3a",
"product": {
"name": "15.3(3)JPJ3a",
"product_id": "CSAFPID-277355"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ4",
"product": {
"name": "15.3(3)JPJ4",
"product_id": "CSAFPID-278880"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ5",
"product": {
"name": "15.3(3)JPJ5",
"product_id": "CSAFPID-280472"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ6",
"product": {
"name": "15.3(3)JPJ6",
"product_id": "CSAFPID-280832"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ7",
"product": {
"name": "15.3(3)JPJ7",
"product_id": "CSAFPID-282651"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ7c",
"product": {
"name": "15.3(3)JPJ7c",
"product_id": "CSAFPID-285321"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ8a",
"product": {
"name": "15.3(3)JPJ8a",
"product_id": "CSAFPID-286497"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ9",
"product": {
"name": "15.3(3)JPJ9",
"product_id": "CSAFPID-290465"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ10",
"product": {
"name": "15.3(3)JPJ10",
"product_id": "CSAFPID-292769"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ11",
"product": {
"name": "15.3(3)JPJ11",
"product_id": "CSAFPID-299941"
}
}
],
"category": "product_version",
"name": "15.3JPJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVS",
"product": {
"name": "15.1(3)SVS",
"product_id": "CSAFPID-277232"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVS1",
"product": {
"name": "15.1(3)SVS1",
"product_id": "CSAFPID-279335"
}
}
],
"category": "product_version",
"name": "15.1SVS"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPK",
"product": {
"name": "15.3(3)JPK",
"product_id": "CSAFPID-280661"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK1",
"product": {
"name": "15.3(3)JPK1",
"product_id": "CSAFPID-280833"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK2",
"product": {
"name": "15.3(3)JPK2",
"product_id": "CSAFPID-282027"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK3",
"product": {
"name": "15.3(3)JPK3",
"product_id": "CSAFPID-282114"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK4",
"product": {
"name": "15.3(3)JPK4",
"product_id": "CSAFPID-286030"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK5",
"product": {
"name": "15.3(3)JPK5",
"product_id": "CSAFPID-286559"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK6",
"product": {
"name": "15.3(3)JPK6",
"product_id": "CSAFPID-289303"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK7",
"product": {
"name": "15.3(3)JPK7",
"product_id": "CSAFPID-292655"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK8",
"product": {
"name": "15.3(3)JPK8",
"product_id": "CSAFPID-300783"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK9",
"product": {
"name": "15.3(3)JPK9",
"product_id": "CSAFPID-301579"
}
}
],
"category": "product_version",
"name": "15.3JPK"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVT1",
"product": {
"name": "15.1(3)SVT1",
"product_id": "CSAFPID-280759"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT2",
"product": {
"name": "15.1(3)SVT2",
"product_id": "CSAFPID-282026"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT3",
"product": {
"name": "15.1(3)SVT3",
"product_id": "CSAFPID-284785"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT4",
"product": {
"name": "15.1(3)SVT4",
"product_id": "CSAFPID-286399"
}
}
],
"category": "product_version",
"name": "15.1SVT"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVU1",
"product": {
"name": "15.1(3)SVU1",
"product_id": "CSAFPID-283833"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU10",
"product": {
"name": "15.1(3)SVU10",
"product_id": "CSAFPID-284291"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU2",
"product": {
"name": "15.1(3)SVU2",
"product_id": "CSAFPID-284566"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU11",
"product": {
"name": "15.1(3)SVU11",
"product_id": "CSAFPID-286400"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU20",
"product": {
"name": "15.1(3)SVU20",
"product_id": "CSAFPID-289270"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU21",
"product": {
"name": "15.1(3)SVU21",
"product_id": "CSAFPID-290557"
}
}
],
"category": "product_version",
"name": "15.1SVU"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVV1",
"product": {
"name": "15.1(3)SVV1",
"product_id": "CSAFPID-284341"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV2",
"product": {
"name": "15.1(3)SVV2",
"product_id": "CSAFPID-286029"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV3",
"product": {
"name": "15.1(3)SVV3",
"product_id": "CSAFPID-286940"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV4",
"product": {
"name": "15.1(3)SVV4",
"product_id": "CSAFPID-289371"
}
}
],
"category": "product_version",
"name": "15.1SVV"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPL",
"product": {
"name": "15.3(3)JPL",
"product_id": "CSAFPID-285323"
}
}
],
"category": "product_version",
"name": "15.3JPL"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPM",
"product": {
"name": "15.3(3)JPM",
"product_id": "CSAFPID-286352"
}
}
],
"category": "product_version",
"name": "15.3JPM"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVW",
"product": {
"name": "15.1(3)SVW",
"product_id": "CSAFPID-286451"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVW1",
"product": {
"name": "15.1(3)SVW1",
"product_id": "CSAFPID-286844"
}
}
],
"category": "product_version",
"name": "15.1SVW"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVX",
"product": {
"name": "15.1(3)SVX",
"product_id": "CSAFPID-286927"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVX1",
"product": {
"name": "15.1(3)SVX1",
"product_id": "CSAFPID-289301"
}
}
],
"category": "product_version",
"name": "15.1SVX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPN",
"product": {
"name": "15.3(3)JPN",
"product_id": "CSAFPID-287185"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN1",
"product": {
"name": "15.3(3)JPN1",
"product_id": "CSAFPID-290587"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN2",
"product": {
"name": "15.3(3)JPN2",
"product_id": "CSAFPID-292654"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN3",
"product": {
"name": "15.3(3)JPN3",
"product_id": "CSAFPID-296664"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN4",
"product": {
"name": "15.3(3)JPN4",
"product_id": "CSAFPID-300502"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN5",
"product": {
"name": "15.3(3)JPN5",
"product_id": "CSAFPID-301721"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN6",
"product": {
"name": "15.3(3)JPN6",
"product_id": "CSAFPID-302978"
}
}
],
"category": "product_version",
"name": "15.3JPN"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPO",
"product": {
"name": "15.3(3)JPO",
"product_id": "CSAFPID-290479"
}
}
],
"category": "product_version",
"name": "15.3JPO"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPP",
"product": {
"name": "15.3(3)JPP",
"product_id": "CSAFPID-294791"
}
}
],
"category": "product_version",
"name": "15.3JPP"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPQ",
"product": {
"name": "15.3(3)JPQ",
"product_id": "CSAFPID-296759"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPQ1",
"product": {
"name": "15.3(3)JPQ1",
"product_id": "CSAFPID-300835"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPQ2",
"product": {
"name": "15.3(3)JPQ2",
"product_id": "CSAFPID-300949"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPQ3",
"product": {
"name": "15.3(3)JPQ3",
"product_id": "CSAFPID-301472"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPQ4",
"product": {
"name": "15.3(3)JPQ4",
"product_id": "CSAFPID-302624"
}
}
],
"category": "product_version",
"name": "15.3JPQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPR",
"product": {
"name": "15.3(3)JPR",
"product_id": "CSAFPID-300837"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPR1",
"product": {
"name": "15.3(3)JPR1",
"product_id": "CSAFPID-300950"
}
}
],
"category": "product_version",
"name": "15.3JPR"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPS",
"product": {
"name": "15.3(3)JPS",
"product_id": "CSAFPID-301223"
}
}
],
"category": "product_version",
"name": "15.3JPS"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPT",
"product": {
"name": "15.3(3)JPT",
"product_id": "CSAFPID-301225"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPT1",
"product": {
"name": "15.3(3)JPT1",
"product_id": "CSAFPID-302781"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPT2",
"product": {
"name": "15.3(3)JPT2",
"product_id": "CSAFPID-303044"
}
}
],
"category": "product_version",
"name": "15.3JPT"
}
],
"category": "product_family",
"name": "IOS"
},
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "3.6.5bE",
"product": {
"name": "3.6.5bE",
"product_id": "CSAFPID-222435"
}
}
],
"category": "product_version",
"name": "3.6E"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.8.9E",
"product": {
"name": "3.8.9E",
"product_id": "CSAFPID-264514"
}
},
{
"category": "service_pack",
"name": "3.8.10E",
"product": {
"name": "3.8.10E",
"product_id": "CSAFPID-271633"
}
},
{
"category": "service_pack",
"name": "3.8.10cE",
"product": {
"name": "3.8.10cE",
"product_id": "CSAFPID-284346"
}
},
{
"category": "service_pack",
"name": "3.8.10dE",
"product": {
"name": "3.8.10dE",
"product_id": "CSAFPID-286453"
}
}
],
"category": "product_version",
"name": "3.8E"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.3.9",
"product": {
"name": "16.3.9",
"product_id": "CSAFPID-262389"
}
}
],
"category": "product_version",
"name": "16.3"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.6.7",
"product": {
"name": "16.6.7",
"product_id": "CSAFPID-261241"
}
},
{
"category": "service_pack",
"name": "16.6.7a",
"product": {
"name": "16.6.7a",
"product_id": "CSAFPID-270097"
}
},
{
"category": "service_pack",
"name": "16.6.8",
"product": {
"name": "16.6.8",
"product_id": "CSAFPID-277148"
}
},
{
"category": "service_pack",
"name": "16.6.9",
"product": {
"name": "16.6.9",
"product_id": "CSAFPID-280801"
}
},
{
"category": "service_pack",
"name": "16.6.10",
"product": {
"name": "16.6.10",
"product_id": "CSAFPID-283835"
}
}
],
"category": "product_version",
"name": "16.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.9.1",
"product": {
"name": "16.9.1",
"product_id": "CSAFPID-225856"
}
},
{
"category": "service_pack",
"name": "16.9.1d",
"product": {
"name": "16.9.1d",
"product_id": "CSAFPID-248242"
}
},
{
"category": "service_pack",
"name": "16.9.4",
"product": {
"name": "16.9.4",
"product_id": "CSAFPID-262390"
}
},
{
"category": "service_pack",
"name": "16.9.4c",
"product": {
"name": "16.9.4c",
"product_id": "CSAFPID-268921"
}
},
{
"category": "service_pack",
"name": "16.9.5f",
"product": {
"name": "16.9.5f",
"product_id": "CSAFPID-276837"
}
},
{
"category": "service_pack",
"name": "16.9.6",
"product": {
"name": "16.9.6",
"product_id": "CSAFPID-277945"
}
},
{
"category": "service_pack",
"name": "16.9.7",
"product": {
"name": "16.9.7",
"product_id": "CSAFPID-280651"
}
},
{
"category": "service_pack",
"name": "16.9.8",
"product": {
"name": "16.9.8",
"product_id": "CSAFPID-280938"
}
},
{
"category": "service_pack",
"name": "16.9.8a",
"product": {
"name": "16.9.8a",
"product_id": "CSAFPID-290562"
}
},
{
"category": "service_pack",
"name": "16.9.8b",
"product": {
"name": "16.9.8b",
"product_id": "CSAFPID-290669"
}
}
],
"category": "product_version",
"name": "16.9"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.10.1",
"product": {
"name": "16.10.1",
"product_id": "CSAFPID-225858"
}
},
{
"category": "service_pack",
"name": "16.10.1e",
"product": {
"name": "16.10.1e",
"product_id": "CSAFPID-257955"
}
},
{
"category": "service_pack",
"name": "16.10.2",
"product": {
"name": "16.10.2",
"product_id": "CSAFPID-260917"
}
},
{
"category": "service_pack",
"name": "16.10.1g",
"product": {
"name": "16.10.1g",
"product_id": "CSAFPID-266259"
}
}
],
"category": "product_version",
"name": "16.10"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.10.3E",
"product": {
"name": "3.10.3E",
"product_id": "CSAFPID-262994"
}
}
],
"category": "product_version",
"name": "3.10E"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.11.1",
"product": {
"name": "16.11.1",
"product_id": "CSAFPID-227918"
}
},
{
"category": "service_pack",
"name": "16.11.1a",
"product": {
"name": "16.11.1a",
"product_id": "CSAFPID-252271"
}
},
{
"category": "service_pack",
"name": "16.11.1b",
"product": {
"name": "16.11.1b",
"product_id": "CSAFPID-260741"
}
},
{
"category": "service_pack",
"name": "16.11.2",
"product": {
"name": "16.11.2",
"product_id": "CSAFPID-261240"
}
},
{
"category": "service_pack",
"name": "16.11.1s",
"product": {
"name": "16.11.1s",
"product_id": "CSAFPID-261465"
}
},
{
"category": "service_pack",
"name": "16.11.1c",
"product": {
"name": "16.11.1c",
"product_id": "CSAFPID-264096"
}
}
],
"category": "product_version",
"name": "16.11"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.12.1",
"product": {
"name": "16.12.1",
"product_id": "CSAFPID-227920"
}
},
{
"category": "service_pack",
"name": "16.12.1s",
"product": {
"name": "16.12.1s",
"product_id": "CSAFPID-265735"
}
},
{
"category": "service_pack",
"name": "16.12.1a",
"product": {
"name": "16.12.1a",
"product_id": "CSAFPID-265841"
}
},
{
"category": "service_pack",
"name": "16.12.1c",
"product": {
"name": "16.12.1c",
"product_id": "CSAFPID-267110"
}
},
{
"category": "service_pack",
"name": "16.12.1w",
"product": {
"name": "16.12.1w",
"product_id": "CSAFPID-267240"
}
},
{
"category": "service_pack",
"name": "16.12.1y",
"product": {
"name": "16.12.1y",
"product_id": "CSAFPID-271938"
}
},
{
"category": "service_pack",
"name": "16.12.1x",
"product": {
"name": "16.12.1x",
"product_id": "CSAFPID-273649"
}
},
{
"category": "service_pack",
"name": "16.12.1t",
"product": {
"name": "16.12.1t",
"product_id": "CSAFPID-274832"
}
}
],
"category": "product_version",
"name": "16.12"
}
],
"category": "product_family",
"name": "Cisco IOS XE Software"
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-3225",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvo17827"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvp56319"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvr47365"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvr67776"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-103763",
"CSAFPID-103955",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104101",
"CSAFPID-104342",
"CSAFPID-104376",
"CSAFPID-104855",
"CSAFPID-105253",
"CSAFPID-105394",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-106016",
"CSAFPID-106072",
"CSAFPID-106684",
"CSAFPID-106997",
"CSAFPID-107209",
"CSAFPID-107630",
"CSAFPID-107852",
"CSAFPID-109098",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109808",
"CSAFPID-111005",
"CSAFPID-111674",
"CSAFPID-114665",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117282",
"CSAFPID-184125",
"CSAFPID-187057",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-191928",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-195481",
"CSAFPID-195528",
"CSAFPID-195544",
"CSAFPID-195770",
"CSAFPID-197462",
"CSAFPID-197468",
"CSAFPID-198063",
"CSAFPID-198542",
"CSAFPID-200492",
"CSAFPID-200503",
"CSAFPID-201074",
"CSAFPID-204097",
"CSAFPID-204102",
"CSAFPID-204103",
"CSAFPID-204186",
"CSAFPID-204228",
"CSAFPID-204310",
"CSAFPID-204324",
"CSAFPID-204826",
"CSAFPID-204831",
"CSAFPID-205672",
"CSAFPID-205723",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209067",
"CSAFPID-209068",
"CSAFPID-209073",
"CSAFPID-209074",
"CSAFPID-209075",
"CSAFPID-209077",
"CSAFPID-209080",
"CSAFPID-209081",
"CSAFPID-209083",
"CSAFPID-209085",
"CSAFPID-209086",
"CSAFPID-209087",
"CSAFPID-209089",
"CSAFPID-209090",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209419",
"CSAFPID-209474",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209930",
"CSAFPID-209935",
"CSAFPID-210137",
"CSAFPID-210189",
"CSAFPID-210203",
"CSAFPID-210262",
"CSAFPID-210410",
"CSAFPID-210411",
"CSAFPID-210491",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210937",
"CSAFPID-210958",
"CSAFPID-211256",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-212266",
"CSAFPID-212497",
"CSAFPID-212686",
"CSAFPID-213089",
"CSAFPID-213654",
"CSAFPID-213655",
"CSAFPID-213770",
"CSAFPID-213788",
"CSAFPID-213843",
"CSAFPID-213954",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214382",
"CSAFPID-214556",
"CSAFPID-214764",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-216277",
"CSAFPID-216295",
"CSAFPID-216573",
"CSAFPID-216632",
"CSAFPID-217048",
"CSAFPID-217078",
"CSAFPID-217194",
"CSAFPID-217779",
"CSAFPID-217803",
"CSAFPID-218891",
"CSAFPID-218946",
"CSAFPID-218948",
"CSAFPID-220038",
"CSAFPID-220235",
"CSAFPID-220441",
"CSAFPID-220446",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220657",
"CSAFPID-220658",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222258",
"CSAFPID-222342",
"CSAFPID-222412",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222537",
"CSAFPID-222630",
"CSAFPID-222716",
"CSAFPID-222924",
"CSAFPID-222930",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224442",
"CSAFPID-224738",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225167",
"CSAFPID-225358",
"CSAFPID-225662",
"CSAFPID-225740",
"CSAFPID-225790",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-226172",
"CSAFPID-226174",
"CSAFPID-226202",
"CSAFPID-227048",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227789",
"CSAFPID-227791",
"CSAFPID-227960",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-228955",
"CSAFPID-228956",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230596",
"CSAFPID-230598",
"CSAFPID-230603",
"CSAFPID-230605",
"CSAFPID-230606",
"CSAFPID-230712",
"CSAFPID-230824",
"CSAFPID-230826",
"CSAFPID-230915",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230992",
"CSAFPID-230994",
"CSAFPID-230995",
"CSAFPID-231000",
"CSAFPID-231001",
"CSAFPID-231017",
"CSAFPID-231245",
"CSAFPID-231679",
"CSAFPID-231796",
"CSAFPID-232061",
"CSAFPID-232122",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-232852",
"CSAFPID-234115",
"CSAFPID-234926",
"CSAFPID-236205",
"CSAFPID-238504",
"CSAFPID-238999",
"CSAFPID-239225",
"CSAFPID-239279",
"CSAFPID-239361",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241765",
"CSAFPID-241916",
"CSAFPID-242313",
"CSAFPID-243144",
"CSAFPID-243525",
"CSAFPID-244911",
"CSAFPID-244913",
"CSAFPID-245380",
"CSAFPID-247630",
"CSAFPID-251487",
"CSAFPID-252156",
"CSAFPID-255002",
"CSAFPID-257209",
"CSAFPID-257830",
"CSAFPID-259238",
"CSAFPID-259869",
"CSAFPID-259985",
"CSAFPID-260691",
"CSAFPID-260993",
"CSAFPID-261487",
"CSAFPID-262300",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-262684",
"CSAFPID-263981",
"CSAFPID-264643",
"CSAFPID-271140",
"CSAFPID-271286",
"CSAFPID-273350",
"CSAFPID-273510",
"CSAFPID-274199",
"CSAFPID-274202",
"CSAFPID-274203",
"CSAFPID-275845",
"CSAFPID-276903",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-277339",
"CSAFPID-277340",
"CSAFPID-277341",
"CSAFPID-277352",
"CSAFPID-277354",
"CSAFPID-277355",
"CSAFPID-278029",
"CSAFPID-278403",
"CSAFPID-278804",
"CSAFPID-278880",
"CSAFPID-278884",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280472",
"CSAFPID-280661",
"CSAFPID-280759",
"CSAFPID-280778",
"CSAFPID-280779",
"CSAFPID-280832",
"CSAFPID-280833",
"CSAFPID-282026",
"CSAFPID-282027",
"CSAFPID-282114",
"CSAFPID-282651",
"CSAFPID-282669",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284349",
"CSAFPID-284566",
"CSAFPID-284567",
"CSAFPID-284785",
"CSAFPID-284786",
"CSAFPID-285319",
"CSAFPID-285320",
"CSAFPID-285321",
"CSAFPID-285323",
"CSAFPID-286029",
"CSAFPID-286030",
"CSAFPID-286111",
"CSAFPID-286352",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286452",
"CSAFPID-286497",
"CSAFPID-286520",
"CSAFPID-286559",
"CSAFPID-286843",
"CSAFPID-286844",
"CSAFPID-286860",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-287121",
"CSAFPID-287185",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289303",
"CSAFPID-289371",
"CSAFPID-290465",
"CSAFPID-290479",
"CSAFPID-290557",
"CSAFPID-290587",
"CSAFPID-290618",
"CSAFPID-290656",
"CSAFPID-292482",
"CSAFPID-292654",
"CSAFPID-292655",
"CSAFPID-292769",
"CSAFPID-294791",
"CSAFPID-294801",
"CSAFPID-296664",
"CSAFPID-296759",
"CSAFPID-299941",
"CSAFPID-299944",
"CSAFPID-300502",
"CSAFPID-300783",
"CSAFPID-300835",
"CSAFPID-300837",
"CSAFPID-300949",
"CSAFPID-300950",
"CSAFPID-301223",
"CSAFPID-301225",
"CSAFPID-301233",
"CSAFPID-301472",
"CSAFPID-301579",
"CSAFPID-301721",
"CSAFPID-302624",
"CSAFPID-302781",
"CSAFPID-302978",
"CSAFPID-303044",
"CSAFPID-222435",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-248242",
"CSAFPID-252271",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262994",
"CSAFPID-264096",
"CSAFPID-264514",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271633",
"CSAFPID-271938",
"CSAFPID-273649",
"CSAFPID-274832",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-283835",
"CSAFPID-284346",
"CSAFPID-286453",
"CSAFPID-290562",
"CSAFPID-290669"
]
},
"release_date": "2020-06-03T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-222435",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-248242",
"CSAFPID-252271",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262994",
"CSAFPID-264096",
"CSAFPID-264514",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271633",
"CSAFPID-271938",
"CSAFPID-273649",
"CSAFPID-274832",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-283835",
"CSAFPID-284346",
"CSAFPID-286453",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-103763",
"CSAFPID-103955",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104101",
"CSAFPID-104342",
"CSAFPID-104376",
"CSAFPID-104855",
"CSAFPID-105253",
"CSAFPID-105394",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-106016",
"CSAFPID-106072",
"CSAFPID-106684",
"CSAFPID-106997",
"CSAFPID-107209",
"CSAFPID-107630",
"CSAFPID-107852",
"CSAFPID-109098",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109808",
"CSAFPID-111005",
"CSAFPID-111674",
"CSAFPID-114665",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117282",
"CSAFPID-184125",
"CSAFPID-187057",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-191928",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-195481",
"CSAFPID-195528",
"CSAFPID-195544",
"CSAFPID-195770",
"CSAFPID-197462",
"CSAFPID-197468",
"CSAFPID-198063",
"CSAFPID-198542",
"CSAFPID-200492",
"CSAFPID-200503",
"CSAFPID-201074",
"CSAFPID-204097",
"CSAFPID-204102",
"CSAFPID-204103",
"CSAFPID-204186",
"CSAFPID-204228",
"CSAFPID-204310",
"CSAFPID-204324",
"CSAFPID-204826",
"CSAFPID-204831",
"CSAFPID-205672",
"CSAFPID-205723",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209067",
"CSAFPID-209068",
"CSAFPID-209073",
"CSAFPID-209074",
"CSAFPID-209075",
"CSAFPID-209077",
"CSAFPID-209080",
"CSAFPID-209081",
"CSAFPID-209083",
"CSAFPID-209085",
"CSAFPID-209086",
"CSAFPID-209087",
"CSAFPID-209089",
"CSAFPID-209090",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209419",
"CSAFPID-209474",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209930",
"CSAFPID-209935",
"CSAFPID-210137",
"CSAFPID-210189",
"CSAFPID-210203",
"CSAFPID-210262",
"CSAFPID-210410",
"CSAFPID-210411",
"CSAFPID-210491",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210937",
"CSAFPID-210958",
"CSAFPID-211256",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-212266",
"CSAFPID-212497",
"CSAFPID-212686",
"CSAFPID-213089",
"CSAFPID-213654",
"CSAFPID-213655",
"CSAFPID-213770",
"CSAFPID-213788",
"CSAFPID-213843",
"CSAFPID-213954",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214382",
"CSAFPID-214556",
"CSAFPID-214764",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-216277",
"CSAFPID-216295",
"CSAFPID-216573",
"CSAFPID-216632",
"CSAFPID-217048",
"CSAFPID-217078",
"CSAFPID-217194",
"CSAFPID-217779",
"CSAFPID-217803",
"CSAFPID-218891",
"CSAFPID-218946",
"CSAFPID-218948",
"CSAFPID-220038",
"CSAFPID-220235",
"CSAFPID-220441",
"CSAFPID-220446",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220657",
"CSAFPID-220658",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222258",
"CSAFPID-222342",
"CSAFPID-222412",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222537",
"CSAFPID-222630",
"CSAFPID-222716",
"CSAFPID-222924",
"CSAFPID-222930",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224442",
"CSAFPID-224738",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225167",
"CSAFPID-225358",
"CSAFPID-225662",
"CSAFPID-225740",
"CSAFPID-225790",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-226172",
"CSAFPID-226174",
"CSAFPID-226202",
"CSAFPID-227048",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227789",
"CSAFPID-227791",
"CSAFPID-227960",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-228955",
"CSAFPID-228956",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230596",
"CSAFPID-230598",
"CSAFPID-230603",
"CSAFPID-230605",
"CSAFPID-230606",
"CSAFPID-230712",
"CSAFPID-230824",
"CSAFPID-230826",
"CSAFPID-230915",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230992",
"CSAFPID-230994",
"CSAFPID-230995",
"CSAFPID-231000",
"CSAFPID-231001",
"CSAFPID-231017",
"CSAFPID-231245",
"CSAFPID-231679",
"CSAFPID-231796",
"CSAFPID-232061",
"CSAFPID-232122",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-232852",
"CSAFPID-234115",
"CSAFPID-234926",
"CSAFPID-236205",
"CSAFPID-238504",
"CSAFPID-238999",
"CSAFPID-239225",
"CSAFPID-239279",
"CSAFPID-239361",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241765",
"CSAFPID-241916",
"CSAFPID-242313",
"CSAFPID-243144",
"CSAFPID-243525",
"CSAFPID-244911",
"CSAFPID-244913",
"CSAFPID-245380",
"CSAFPID-247630",
"CSAFPID-251487",
"CSAFPID-252156",
"CSAFPID-255002",
"CSAFPID-257209",
"CSAFPID-257830",
"CSAFPID-259238",
"CSAFPID-259869",
"CSAFPID-259985",
"CSAFPID-260691",
"CSAFPID-260993",
"CSAFPID-261487",
"CSAFPID-262300",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-262684",
"CSAFPID-263981",
"CSAFPID-264643",
"CSAFPID-271140",
"CSAFPID-271286",
"CSAFPID-273350",
"CSAFPID-273510",
"CSAFPID-274199",
"CSAFPID-274202",
"CSAFPID-274203",
"CSAFPID-275845",
"CSAFPID-276903",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-277339",
"CSAFPID-277340",
"CSAFPID-277341",
"CSAFPID-277352",
"CSAFPID-277354",
"CSAFPID-277355",
"CSAFPID-278029",
"CSAFPID-278403",
"CSAFPID-278804",
"CSAFPID-278880",
"CSAFPID-278884",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280472",
"CSAFPID-280661",
"CSAFPID-280759",
"CSAFPID-280778",
"CSAFPID-280779",
"CSAFPID-280832",
"CSAFPID-280833",
"CSAFPID-282026",
"CSAFPID-282027",
"CSAFPID-282114",
"CSAFPID-282651",
"CSAFPID-282669",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284349",
"CSAFPID-284566",
"CSAFPID-284567",
"CSAFPID-284785",
"CSAFPID-284786",
"CSAFPID-285319",
"CSAFPID-285320",
"CSAFPID-285321",
"CSAFPID-285323",
"CSAFPID-286029",
"CSAFPID-286030",
"CSAFPID-286111",
"CSAFPID-286352",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286452",
"CSAFPID-286497",
"CSAFPID-286520",
"CSAFPID-286559",
"CSAFPID-286843",
"CSAFPID-286844",
"CSAFPID-286860",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-287121",
"CSAFPID-287185",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289303",
"CSAFPID-289371",
"CSAFPID-290465",
"CSAFPID-290479",
"CSAFPID-290557",
"CSAFPID-290587",
"CSAFPID-290618",
"CSAFPID-290656",
"CSAFPID-292482",
"CSAFPID-292654",
"CSAFPID-292655",
"CSAFPID-292769",
"CSAFPID-294791",
"CSAFPID-294801",
"CSAFPID-296664",
"CSAFPID-296759",
"CSAFPID-299941",
"CSAFPID-299944",
"CSAFPID-300502",
"CSAFPID-300783",
"CSAFPID-300835",
"CSAFPID-300837",
"CSAFPID-300949",
"CSAFPID-300950",
"CSAFPID-301223",
"CSAFPID-301225",
"CSAFPID-301233",
"CSAFPID-301472",
"CSAFPID-301579",
"CSAFPID-301721",
"CSAFPID-302624",
"CSAFPID-302781",
"CSAFPID-302978",
"CSAFPID-303044"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-103763",
"CSAFPID-103955",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104101",
"CSAFPID-104342",
"CSAFPID-104376",
"CSAFPID-104855",
"CSAFPID-105253",
"CSAFPID-105394",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-106016",
"CSAFPID-106072",
"CSAFPID-106684",
"CSAFPID-106997",
"CSAFPID-107209",
"CSAFPID-107630",
"CSAFPID-107852",
"CSAFPID-109098",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109808",
"CSAFPID-111005",
"CSAFPID-111674",
"CSAFPID-114665",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117282",
"CSAFPID-184125",
"CSAFPID-187057",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-191928",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-195481",
"CSAFPID-195528",
"CSAFPID-195544",
"CSAFPID-195770",
"CSAFPID-197462",
"CSAFPID-197468",
"CSAFPID-198063",
"CSAFPID-198542",
"CSAFPID-200492",
"CSAFPID-200503",
"CSAFPID-201074",
"CSAFPID-204097",
"CSAFPID-204102",
"CSAFPID-204103",
"CSAFPID-204186",
"CSAFPID-204228",
"CSAFPID-204310",
"CSAFPID-204324",
"CSAFPID-204826",
"CSAFPID-204831",
"CSAFPID-205672",
"CSAFPID-205723",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209067",
"CSAFPID-209068",
"CSAFPID-209073",
"CSAFPID-209074",
"CSAFPID-209075",
"CSAFPID-209077",
"CSAFPID-209080",
"CSAFPID-209081",
"CSAFPID-209083",
"CSAFPID-209085",
"CSAFPID-209086",
"CSAFPID-209087",
"CSAFPID-209089",
"CSAFPID-209090",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209419",
"CSAFPID-209474",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209930",
"CSAFPID-209935",
"CSAFPID-210137",
"CSAFPID-210189",
"CSAFPID-210203",
"CSAFPID-210262",
"CSAFPID-210410",
"CSAFPID-210411",
"CSAFPID-210491",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210937",
"CSAFPID-210958",
"CSAFPID-211256",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-212266",
"CSAFPID-212497",
"CSAFPID-212686",
"CSAFPID-213089",
"CSAFPID-213654",
"CSAFPID-213655",
"CSAFPID-213770",
"CSAFPID-213788",
"CSAFPID-213843",
"CSAFPID-213954",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214382",
"CSAFPID-214556",
"CSAFPID-214764",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-216277",
"CSAFPID-216295",
"CSAFPID-216573",
"CSAFPID-216632",
"CSAFPID-217048",
"CSAFPID-217078",
"CSAFPID-217194",
"CSAFPID-217779",
"CSAFPID-217803",
"CSAFPID-218891",
"CSAFPID-218946",
"CSAFPID-218948",
"CSAFPID-220038",
"CSAFPID-220235",
"CSAFPID-220441",
"CSAFPID-220446",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220657",
"CSAFPID-220658",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222258",
"CSAFPID-222342",
"CSAFPID-222412",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222537",
"CSAFPID-222630",
"CSAFPID-222716",
"CSAFPID-222924",
"CSAFPID-222930",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224442",
"CSAFPID-224738",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225167",
"CSAFPID-225358",
"CSAFPID-225662",
"CSAFPID-225740",
"CSAFPID-225790",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-226172",
"CSAFPID-226174",
"CSAFPID-226202",
"CSAFPID-227048",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227789",
"CSAFPID-227791",
"CSAFPID-227960",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-228955",
"CSAFPID-228956",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230596",
"CSAFPID-230598",
"CSAFPID-230603",
"CSAFPID-230605",
"CSAFPID-230606",
"CSAFPID-230712",
"CSAFPID-230824",
"CSAFPID-230826",
"CSAFPID-230915",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230992",
"CSAFPID-230994",
"CSAFPID-230995",
"CSAFPID-231000",
"CSAFPID-231001",
"CSAFPID-231017",
"CSAFPID-231245",
"CSAFPID-231679",
"CSAFPID-231796",
"CSAFPID-232061",
"CSAFPID-232122",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-232852",
"CSAFPID-234115",
"CSAFPID-234926",
"CSAFPID-236205",
"CSAFPID-238504",
"CSAFPID-238999",
"CSAFPID-239225",
"CSAFPID-239279",
"CSAFPID-239361",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241765",
"CSAFPID-241916",
"CSAFPID-242313",
"CSAFPID-243144",
"CSAFPID-243525",
"CSAFPID-244911",
"CSAFPID-244913",
"CSAFPID-245380",
"CSAFPID-247630",
"CSAFPID-251487",
"CSAFPID-252156",
"CSAFPID-255002",
"CSAFPID-257209",
"CSAFPID-257830",
"CSAFPID-259238",
"CSAFPID-259869",
"CSAFPID-259985",
"CSAFPID-260691",
"CSAFPID-260993",
"CSAFPID-261487",
"CSAFPID-262300",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-262684",
"CSAFPID-263981",
"CSAFPID-264643",
"CSAFPID-271140",
"CSAFPID-271286",
"CSAFPID-273350",
"CSAFPID-273510",
"CSAFPID-274199",
"CSAFPID-274202",
"CSAFPID-274203",
"CSAFPID-275845",
"CSAFPID-276903",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-277339",
"CSAFPID-277340",
"CSAFPID-277341",
"CSAFPID-277352",
"CSAFPID-277354",
"CSAFPID-277355",
"CSAFPID-278029",
"CSAFPID-278403",
"CSAFPID-278804",
"CSAFPID-278880",
"CSAFPID-278884",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280472",
"CSAFPID-280661",
"CSAFPID-280759",
"CSAFPID-280778",
"CSAFPID-280779",
"CSAFPID-280832",
"CSAFPID-280833",
"CSAFPID-282026",
"CSAFPID-282027",
"CSAFPID-282114",
"CSAFPID-282651",
"CSAFPID-282669",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284349",
"CSAFPID-284566",
"CSAFPID-284567",
"CSAFPID-284785",
"CSAFPID-284786",
"CSAFPID-285319",
"CSAFPID-285320",
"CSAFPID-285321",
"CSAFPID-285323",
"CSAFPID-286029",
"CSAFPID-286030",
"CSAFPID-286111",
"CSAFPID-286352",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286452",
"CSAFPID-286497",
"CSAFPID-286520",
"CSAFPID-286559",
"CSAFPID-286843",
"CSAFPID-286844",
"CSAFPID-286860",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-287121",
"CSAFPID-287185",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289303",
"CSAFPID-289371",
"CSAFPID-290465",
"CSAFPID-290479",
"CSAFPID-290557",
"CSAFPID-290587",
"CSAFPID-290618",
"CSAFPID-290656",
"CSAFPID-292482",
"CSAFPID-292654",
"CSAFPID-292655",
"CSAFPID-292769",
"CSAFPID-294791",
"CSAFPID-294801",
"CSAFPID-296664",
"CSAFPID-296759",
"CSAFPID-299941",
"CSAFPID-299944",
"CSAFPID-300502",
"CSAFPID-300783",
"CSAFPID-300835",
"CSAFPID-300837",
"CSAFPID-300949",
"CSAFPID-300950",
"CSAFPID-301223",
"CSAFPID-301225",
"CSAFPID-301233",
"CSAFPID-301472",
"CSAFPID-301579",
"CSAFPID-301721",
"CSAFPID-302624",
"CSAFPID-302781",
"CSAFPID-302978",
"CSAFPID-303044",
"CSAFPID-222435",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-248242",
"CSAFPID-252271",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262994",
"CSAFPID-264096",
"CSAFPID-264514",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271633",
"CSAFPID-271938",
"CSAFPID-273649",
"CSAFPID-274832",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-283835",
"CSAFPID-284346",
"CSAFPID-286453",
"CSAFPID-290562",
"CSAFPID-290669"
]
}
],
"title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities"
}
]
}
cisco-sa-cipdos-hkftzxex
Vulnerability from csaf_cisco
Notes
{
"document": {
"acknowledgments": [
{
"summary": "These vulnerabilities were found during the resolution of a Cisco TAC support case."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.\r\n\r\nThe vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\n\r\n\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx\"]\r\n\r\n\r\nThis advisory is part of the June 3, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 23 Cisco Security Advisories that describe 25 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\" https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388\"].",
"title": "Summary"
},
{
"category": "general",
"text": "These vulnerabilities affect Cisco IOS and IOS XE Software if they are configured for CIP. CIP is not enabled by default.\r\n\r\nFor information about which Cisco software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n Determine Whether CIP Is Enabled\r\nAn administrator can determine whether CIP is enabled on a device by issuing the show cip status command and checking the State: value.\r\n\r\nThe following show cip status output shows that CIP is enabled for VLAN 1:\r\n\r\n\r\nDevice\u003eshow cip status\r\nState : Enabled\r\nVlan : 1\r\n\r\nIf the command returns no output, the device is not affected by the vulnerabilities described in this advisory.",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect Cisco IOS XR Software or Cisco NX-OS Software.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "There are no workarounds that address these vulnerabilities.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerabilities described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes\"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttps://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n\r\n\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] to search advisories in the following ways:\r\n\r\nChoose the software and one or more releases\r\nUpload a .txt file that includes a list of specific releases\r\nEnter the output of the show version command\r\n\r\nAfter initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.\r\n\r\nCustomers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S:\r\n\r\n\r\n\r\nBy default, the Cisco Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "These vulnerabilities were found during the resolution of a Cisco TAC support case.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
},
{
"category": "external",
"summary": "Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
},
{
"category": "external",
"summary": "Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-73388"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "considering software upgrades",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"
},
{
"category": "external",
"summary": "Cisco Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 2 Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3S Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3SG Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"tracking": {
"current_release_date": "2020-06-03T16:00:00+00:00",
"generator": {
"date": "2022-09-03T03:00:30+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-cipdos-hkfTZXEx",
"initial_release_date": "2020-06-03T16:00:00+00:00",
"revision_history": [
{
"date": "2020-04-30T19:04:54+00:00",
"number": "1.0.0",
"summary": "Initial public release."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "12.2(55)SE",
"product": {
"name": "12.2(55)SE",
"product_id": "CSAFPID-103763"
}
},
{
"category": "service_pack",
"name": "12.2(46)SE2",
"product": {
"name": "12.2(46)SE2",
"product_id": "CSAFPID-104089"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE2",
"product": {
"name": "12.2(50)SE2",
"product_id": "CSAFPID-104101"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE1",
"product": {
"name": "12.2(50)SE1",
"product_id": "CSAFPID-104342"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE5",
"product": {
"name": "12.2(50)SE5",
"product_id": "CSAFPID-104855"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE3",
"product": {
"name": "12.2(55)SE3",
"product_id": "CSAFPID-105394"
}
},
{
"category": "service_pack",
"name": "12.2(52)SE",
"product": {
"name": "12.2(52)SE",
"product_id": "CSAFPID-105973"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE",
"product": {
"name": "12.2(58)SE",
"product_id": "CSAFPID-105987"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE3",
"product": {
"name": "12.2(50)SE3",
"product_id": "CSAFPID-106016"
}
},
{
"category": "service_pack",
"name": "12.2(52)SE1",
"product": {
"name": "12.2(52)SE1",
"product_id": "CSAFPID-106684"
}
},
{
"category": "service_pack",
"name": "12.2(46)SE1",
"product": {
"name": "12.2(46)SE1",
"product_id": "CSAFPID-106997"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE4",
"product": {
"name": "12.2(50)SE4",
"product_id": "CSAFPID-107209"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE",
"product": {
"name": "12.2(50)SE",
"product_id": "CSAFPID-107630"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE1",
"product": {
"name": "12.2(58)SE1",
"product_id": "CSAFPID-109098"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE4",
"product": {
"name": "12.2(55)SE4",
"product_id": "CSAFPID-109439"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE2",
"product": {
"name": "12.2(58)SE2",
"product_id": "CSAFPID-109808"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE5",
"product": {
"name": "12.2(55)SE5",
"product_id": "CSAFPID-111674"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE6",
"product": {
"name": "12.2(55)SE6",
"product_id": "CSAFPID-114665"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE7",
"product": {
"name": "12.2(55)SE7",
"product_id": "CSAFPID-184125"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE9",
"product": {
"name": "12.2(55)SE9",
"product_id": "CSAFPID-192911"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE10",
"product": {
"name": "12.2(55)SE10",
"product_id": "CSAFPID-198542"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE11",
"product": {
"name": "12.2(55)SE11",
"product_id": "CSAFPID-210732"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE12",
"product": {
"name": "12.2(55)SE12",
"product_id": "CSAFPID-228057"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE13",
"product": {
"name": "12.2(55)SE13",
"product_id": "CSAFPID-230962"
}
}
],
"category": "product_version",
"name": "12.2SE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(44)EX",
"product": {
"name": "12.2(44)EX",
"product_id": "CSAFPID-104061"
}
},
{
"category": "service_pack",
"name": "12.2(44)EX1",
"product": {
"name": "12.2(44)EX1",
"product_id": "CSAFPID-105253"
}
}
],
"category": "product_version",
"name": "12.2EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(60)EZ16",
"product": {
"name": "12.2(60)EZ16",
"product_id": "CSAFPID-262536"
}
}
],
"category": "product_version",
"name": "12.2EZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)XO1",
"product": {
"name": "15.0(1)XO1",
"product_id": "CSAFPID-103955"
}
},
{
"category": "service_pack",
"name": "15.0(1)XO",
"product": {
"name": "15.0(1)XO",
"product_id": "CSAFPID-106072"
}
},
{
"category": "service_pack",
"name": "15.0(2)XO",
"product": {
"name": "15.0(2)XO",
"product_id": "CSAFPID-111005"
}
}
],
"category": "product_version",
"name": "15.0XO"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)EY",
"product": {
"name": "15.0(1)EY",
"product_id": "CSAFPID-104376"
}
},
{
"category": "service_pack",
"name": "15.0(1)EY1",
"product": {
"name": "15.0(1)EY1",
"product_id": "CSAFPID-115969"
}
},
{
"category": "service_pack",
"name": "15.0(1)EY2",
"product": {
"name": "15.0(1)EY2",
"product_id": "CSAFPID-187269"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY",
"product": {
"name": "15.0(2)EY",
"product_id": "CSAFPID-187932"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY1",
"product": {
"name": "15.0(2)EY1",
"product_id": "CSAFPID-190250"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY2",
"product": {
"name": "15.0(2)EY2",
"product_id": "CSAFPID-192831"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY3",
"product": {
"name": "15.0(2)EY3",
"product_id": "CSAFPID-195481"
}
}
],
"category": "product_version",
"name": "15.0EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SE",
"product": {
"name": "15.0(2)SE",
"product_id": "CSAFPID-107852"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE1",
"product": {
"name": "15.0(2)SE1",
"product_id": "CSAFPID-115939"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE2",
"product": {
"name": "15.0(2)SE2",
"product_id": "CSAFPID-116083"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE3",
"product": {
"name": "15.0(2)SE3",
"product_id": "CSAFPID-189455"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE4",
"product": {
"name": "15.0(2)SE4",
"product_id": "CSAFPID-190635"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE5",
"product": {
"name": "15.0(2)SE5",
"product_id": "CSAFPID-192706"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE6",
"product": {
"name": "15.0(2)SE6",
"product_id": "CSAFPID-195770"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE7",
"product": {
"name": "15.0(2)SE7",
"product_id": "CSAFPID-204097"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE8",
"product": {
"name": "15.0(2)SE8",
"product_id": "CSAFPID-209028"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE9",
"product": {
"name": "15.0(2)SE9",
"product_id": "CSAFPID-209029"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE10",
"product": {
"name": "15.0(2)SE10",
"product_id": "CSAFPID-213788"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE11",
"product": {
"name": "15.0(2)SE11",
"product_id": "CSAFPID-220466"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE10a",
"product": {
"name": "15.0(2)SE10a",
"product_id": "CSAFPID-222342"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE12",
"product": {
"name": "15.0(2)SE12",
"product_id": "CSAFPID-234926"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE13",
"product": {
"name": "15.0(2)SE13",
"product_id": "CSAFPID-245380"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE13a",
"product": {
"name": "15.0(2)SE13a",
"product_id": "CSAFPID-274199"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE13b",
"product": {
"name": "15.0(2)SE13b",
"product_id": "CSAFPID-280778"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE13c",
"product": {
"name": "15.0(2)SE13c",
"product_id": "CSAFPID-286843"
}
}
],
"category": "product_version",
"name": "15.0SE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SG11a",
"product": {
"name": "15.0(2)SG11a",
"product_id": "CSAFPID-262335"
}
}
],
"category": "product_version",
"name": "15.0SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)EX",
"product": {
"name": "15.0(1)EX",
"product_id": "CSAFPID-109442"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX2",
"product": {
"name": "15.0(2)EX2",
"product_id": "CSAFPID-192910"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX8",
"product": {
"name": "15.0(2)EX8",
"product_id": "CSAFPID-204831"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX10",
"product": {
"name": "15.0(2)EX10",
"product_id": "CSAFPID-211570"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX11",
"product": {
"name": "15.0(2)EX11",
"product_id": "CSAFPID-214797"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX13",
"product": {
"name": "15.0(2)EX13",
"product_id": "CSAFPID-225160"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX12",
"product": {
"name": "15.0(2)EX12",
"product_id": "CSAFPID-230965"
}
}
],
"category": "product_version",
"name": "15.0EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EA",
"product": {
"name": "15.0(2)EA",
"product_id": "CSAFPID-117282"
}
},
{
"category": "service_pack",
"name": "15.0(2)EA1",
"product": {
"name": "15.0(2)EA1",
"product_id": "CSAFPID-193033"
}
}
],
"category": "product_version",
"name": "15.0EA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)E",
"product": {
"name": "15.2(2)E",
"product_id": "CSAFPID-187057"
}
},
{
"category": "service_pack",
"name": "15.2(2)E1",
"product": {
"name": "15.2(2)E1",
"product_id": "CSAFPID-201074"
}
},
{
"category": "service_pack",
"name": "15.2(2b)E",
"product": {
"name": "15.2(2b)E",
"product_id": "CSAFPID-204102"
}
},
{
"category": "service_pack",
"name": "15.2(3)E1",
"product": {
"name": "15.2(3)E1",
"product_id": "CSAFPID-204186"
}
},
{
"category": "service_pack",
"name": "15.2(2)E2",
"product": {
"name": "15.2(2)E2",
"product_id": "CSAFPID-204228"
}
},
{
"category": "service_pack",
"name": "15.2(2)E3",
"product": {
"name": "15.2(2)E3",
"product_id": "CSAFPID-205672"
}
},
{
"category": "service_pack",
"name": "15.2(2a)E2",
"product": {
"name": "15.2(2a)E2",
"product_id": "CSAFPID-209045"
}
},
{
"category": "service_pack",
"name": "15.2(3)E2",
"product": {
"name": "15.2(3)E2",
"product_id": "CSAFPID-209046"
}
},
{
"category": "service_pack",
"name": "15.2(3a)E",
"product": {
"name": "15.2(3a)E",
"product_id": "CSAFPID-209047"
}
},
{
"category": "service_pack",
"name": "15.2(3)E3",
"product": {
"name": "15.2(3)E3",
"product_id": "CSAFPID-209358"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E2",
"product": {
"name": "15.2(3m)E2",
"product_id": "CSAFPID-209359"
}
},
{
"category": "service_pack",
"name": "15.2(2)E4",
"product": {
"name": "15.2(2)E4",
"product_id": "CSAFPID-210766"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5",
"product": {
"name": "15.2(2)E5",
"product_id": "CSAFPID-211296"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E1",
"product": {
"name": "15.2(4m)E1",
"product_id": "CSAFPID-214072"
}
},
{
"category": "service_pack",
"name": "15.2(3)E4",
"product": {
"name": "15.2(3)E4",
"product_id": "CSAFPID-214078"
}
},
{
"category": "service_pack",
"name": "15.2(5)E",
"product": {
"name": "15.2(5)E",
"product_id": "CSAFPID-214556"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E7",
"product": {
"name": "15.2(3m)E7",
"product_id": "CSAFPID-216295"
}
},
{
"category": "service_pack",
"name": "15.2(2)E6",
"product": {
"name": "15.2(2)E6",
"product_id": "CSAFPID-218891"
}
},
{
"category": "service_pack",
"name": "15.2(5)E1",
"product": {
"name": "15.2(5)E1",
"product_id": "CSAFPID-220441"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E3",
"product": {
"name": "15.2(4m)E3",
"product_id": "CSAFPID-220664"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E8",
"product": {
"name": "15.2(3m)E8",
"product_id": "CSAFPID-220689"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5a",
"product": {
"name": "15.2(2)E5a",
"product_id": "CSAFPID-221033"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5b",
"product": {
"name": "15.2(2)E5b",
"product_id": "CSAFPID-222436"
}
},
{
"category": "service_pack",
"name": "15.2(4n)E2",
"product": {
"name": "15.2(4n)E2",
"product_id": "CSAFPID-222500"
}
},
{
"category": "service_pack",
"name": "15.2(4o)E2",
"product": {
"name": "15.2(4o)E2",
"product_id": "CSAFPID-222924"
}
},
{
"category": "service_pack",
"name": "15.2(5a)E1",
"product": {
"name": "15.2(5a)E1",
"product_id": "CSAFPID-223143"
}
},
{
"category": "service_pack",
"name": "15.2(2)E7",
"product": {
"name": "15.2(2)E7",
"product_id": "CSAFPID-224868"
}
},
{
"category": "service_pack",
"name": "15.2(5)E2",
"product": {
"name": "15.2(5)E2",
"product_id": "CSAFPID-225740"
}
},
{
"category": "service_pack",
"name": "15.2(4p)E1",
"product": {
"name": "15.2(4p)E1",
"product_id": "CSAFPID-226077"
}
},
{
"category": "service_pack",
"name": "15.2(6)E",
"product": {
"name": "15.2(6)E",
"product_id": "CSAFPID-227598"
}
},
{
"category": "service_pack",
"name": "15.2(5)E2c",
"product": {
"name": "15.2(5)E2c",
"product_id": "CSAFPID-228151"
}
},
{
"category": "service_pack",
"name": "15.2(2)E8",
"product": {
"name": "15.2(2)E8",
"product_id": "CSAFPID-230587"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E2",
"product": {
"name": "15.2(4m)E2",
"product_id": "CSAFPID-230588"
}
},
{
"category": "service_pack",
"name": "15.2(4o)E3",
"product": {
"name": "15.2(4o)E3",
"product_id": "CSAFPID-230589"
}
},
{
"category": "service_pack",
"name": "15.2(4q)E1",
"product": {
"name": "15.2(4q)E1",
"product_id": "CSAFPID-230590"
}
},
{
"category": "service_pack",
"name": "15.2(6)E0a",
"product": {
"name": "15.2(6)E0a",
"product_id": "CSAFPID-230591"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1",
"product": {
"name": "15.2(6)E1",
"product_id": "CSAFPID-230592"
}
},
{
"category": "service_pack",
"name": "15.2(6)E0c",
"product": {
"name": "15.2(6)E0c",
"product_id": "CSAFPID-231245"
}
},
{
"category": "service_pack",
"name": "15.2(2)E9",
"product": {
"name": "15.2(2)E9",
"product_id": "CSAFPID-232765"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1a",
"product": {
"name": "15.2(6)E1a",
"product_id": "CSAFPID-238999"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1s",
"product": {
"name": "15.2(6)E1s",
"product_id": "CSAFPID-240186"
}
},
{
"category": "service_pack",
"name": "15.2(4s)E1",
"product": {
"name": "15.2(4s)E1",
"product_id": "CSAFPID-241916"
}
},
{
"category": "service_pack",
"name": "15.2(7)E",
"product": {
"name": "15.2(7)E",
"product_id": "CSAFPID-242313"
}
},
{
"category": "service_pack",
"name": "15.2(2)E10",
"product": {
"name": "15.2(2)E10",
"product_id": "CSAFPID-244911"
}
},
{
"category": "service_pack",
"name": "15.2(6)E2a",
"product": {
"name": "15.2(6)E2a",
"product_id": "CSAFPID-247630"
}
},
{
"category": "service_pack",
"name": "15.2(7)E0b",
"product": {
"name": "15.2(7)E0b",
"product_id": "CSAFPID-260993"
}
},
{
"category": "service_pack",
"name": "15.2(7)E0s",
"product": {
"name": "15.2(7)E0s",
"product_id": "CSAFPID-262300"
}
},
{
"category": "service_pack",
"name": "15.2(6)E3",
"product": {
"name": "15.2(6)E3",
"product_id": "CSAFPID-262684"
}
},
{
"category": "service_pack",
"name": "15.2(2)E10a",
"product": {
"name": "15.2(2)E10a",
"product_id": "CSAFPID-263981"
}
},
{
"category": "service_pack",
"name": "15.2(4)E9",
"product": {
"name": "15.2(4)E9",
"product_id": "CSAFPID-264643"
}
},
{
"category": "service_pack",
"name": "15.2(7a)E0b",
"product": {
"name": "15.2(7a)E0b",
"product_id": "CSAFPID-271140"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10",
"product": {
"name": "15.2(4)E10",
"product_id": "CSAFPID-271286"
}
},
{
"category": "service_pack",
"name": "15.2(7b)E0b",
"product": {
"name": "15.2(7b)E0b",
"product_id": "CSAFPID-276903"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10a",
"product": {
"name": "15.2(4)E10a",
"product_id": "CSAFPID-278029"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10b",
"product": {
"name": "15.2(4)E10b",
"product_id": "CSAFPID-280779"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10c",
"product": {
"name": "15.2(4)E10c",
"product_id": "CSAFPID-284349"
}
},
{
"category": "service_pack",
"name": "15.2(2)E10b",
"product": {
"name": "15.2(2)E10b",
"product_id": "CSAFPID-284567"
}
},
{
"category": "service_pack",
"name": "15.2(4)E10d",
"product": {
"name": "15.2(4)E10d",
"product_id": "CSAFPID-286452"
}
},
{
"category": "service_pack",
"name": "15.2(2)E10c",
"product": {
"name": "15.2(2)E10c",
"product_id": "CSAFPID-286860"
}
}
],
"category": "product_version",
"name": "15.2E"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)EY",
"product": {
"name": "15.2(1)EY",
"product_id": "CSAFPID-191928"
}
}
],
"category": "product_version",
"name": "15.2EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(4)JAZ",
"product": {
"name": "15.2(4)JAZ",
"product_id": "CSAFPID-195528"
}
},
{
"category": "service_pack",
"name": "15.2(4)JAZ1",
"product": {
"name": "15.2(4)JAZ1",
"product_id": "CSAFPID-200503"
}
}
],
"category": "product_version",
"name": "15.2JAZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EK",
"product": {
"name": "15.0(2)EK",
"product_id": "CSAFPID-195544"
}
},
{
"category": "service_pack",
"name": "15.0(2)EK1",
"product": {
"name": "15.0(2)EK1",
"product_id": "CSAFPID-197468"
}
}
],
"category": "product_version",
"name": "15.0EK"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)EB",
"product": {
"name": "15.2(2)EB",
"product_id": "CSAFPID-197462"
}
},
{
"category": "service_pack",
"name": "15.2(2)EB1",
"product": {
"name": "15.2(2)EB1",
"product_id": "CSAFPID-209839"
}
},
{
"category": "service_pack",
"name": "15.2(2)EB2",
"product": {
"name": "15.2(2)EB2",
"product_id": "CSAFPID-214218"
}
},
{
"category": "service_pack",
"name": "15.2(6)EB",
"product": {
"name": "15.2(6)EB",
"product_id": "CSAFPID-251487"
}
}
],
"category": "product_version",
"name": "15.2EB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)EA",
"product": {
"name": "15.2(2)EA",
"product_id": "CSAFPID-198063"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA1",
"product": {
"name": "15.2(2)EA1",
"product_id": "CSAFPID-209049"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA2",
"product": {
"name": "15.2(2)EA2",
"product_id": "CSAFPID-209050"
}
},
{
"category": "service_pack",
"name": "15.2(3)EA",
"product": {
"name": "15.2(3)EA",
"product_id": "CSAFPID-209051"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA",
"product": {
"name": "15.2(4)EA",
"product_id": "CSAFPID-210203"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA1",
"product": {
"name": "15.2(4)EA1",
"product_id": "CSAFPID-210958"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA3",
"product": {
"name": "15.2(2)EA3",
"product_id": "CSAFPID-214217"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA3",
"product": {
"name": "15.2(4)EA3",
"product_id": "CSAFPID-214965"
}
},
{
"category": "service_pack",
"name": "15.2(5)EA",
"product": {
"name": "15.2(5)EA",
"product_id": "CSAFPID-220038"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA4",
"product": {
"name": "15.2(4)EA4",
"product_id": "CSAFPID-220460"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA2",
"product": {
"name": "15.2(4)EA2",
"product_id": "CSAFPID-220507"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA5",
"product": {
"name": "15.2(4)EA5",
"product_id": "CSAFPID-222419"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA6",
"product": {
"name": "15.2(4)EA6",
"product_id": "CSAFPID-228075"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA7",
"product": {
"name": "15.2(4)EA7",
"product_id": "CSAFPID-230992"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA8",
"product": {
"name": "15.2(4)EA8",
"product_id": "CSAFPID-241614"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA9",
"product": {
"name": "15.2(4)EA9",
"product_id": "CSAFPID-257830"
}
}
],
"category": "product_version",
"name": "15.2EA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JN",
"product": {
"name": "15.3(3)JN",
"product_id": "CSAFPID-200492"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN1",
"product": {
"name": "15.3(3)JN1",
"product_id": "CSAFPID-209083"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN2",
"product": {
"name": "15.3(3)JN2",
"product_id": "CSAFPID-209085"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN3",
"product": {
"name": "15.3(3)JN3",
"product_id": "CSAFPID-209086"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN4",
"product": {
"name": "15.3(3)JN4",
"product_id": "CSAFPID-209087"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN6",
"product": {
"name": "15.3(3)JN6",
"product_id": "CSAFPID-209930"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN7",
"product": {
"name": "15.3(3)JN7",
"product_id": "CSAFPID-209935"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN8",
"product": {
"name": "15.3(3)JN8",
"product_id": "CSAFPID-210410"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN9",
"product": {
"name": "15.3(3)JN9",
"product_id": "CSAFPID-213654"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN11",
"product": {
"name": "15.3(3)JN11",
"product_id": "CSAFPID-222537"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN13",
"product": {
"name": "15.3(3)JN13",
"product_id": "CSAFPID-230915"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN14",
"product": {
"name": "15.3(3)JN14",
"product_id": "CSAFPID-232122"
}
},
{
"category": "service_pack",
"name": "15.3(3)JN15",
"product": {
"name": "15.3(3)JN15",
"product_id": "CSAFPID-239279"
}
}
],
"category": "product_version",
"name": "15.3JN"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JA1n",
"product": {
"name": "15.3(3)JA1n",
"product_id": "CSAFPID-204310"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA1",
"product": {
"name": "15.3(3)JA1",
"product_id": "CSAFPID-204826"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA4",
"product": {
"name": "15.3(3)JA4",
"product_id": "CSAFPID-209067"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA5",
"product": {
"name": "15.3(3)JA5",
"product_id": "CSAFPID-209068"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA6",
"product": {
"name": "15.3(3)JA6",
"product_id": "CSAFPID-210937"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA7",
"product": {
"name": "15.3(3)JA7",
"product_id": "CSAFPID-214382"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA8",
"product": {
"name": "15.3(3)JA8",
"product_id": "CSAFPID-214764"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA10",
"product": {
"name": "15.3(3)JA10",
"product_id": "CSAFPID-217779"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA11",
"product": {
"name": "15.3(3)JA11",
"product_id": "CSAFPID-226174"
}
},
{
"category": "service_pack",
"name": "15.3(3)JA12",
"product": {
"name": "15.3(3)JA12",
"product_id": "CSAFPID-230712"
}
}
],
"category": "product_version",
"name": "15.3JA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JAA",
"product": {
"name": "15.3(3)JAA",
"product_id": "CSAFPID-204103"
}
},
{
"category": "service_pack",
"name": "15.3(3)JAA1",
"product": {
"name": "15.3(3)JAA1",
"product_id": "CSAFPID-230594"
}
}
],
"category": "product_version",
"name": "15.3JAA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JB",
"product": {
"name": "15.3(3)JB",
"product_id": "CSAFPID-209077"
}
}
],
"category": "product_version",
"name": "15.3JB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SQD",
"product": {
"name": "15.0(2)SQD",
"product_id": "CSAFPID-204324"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD1",
"product": {
"name": "15.0(2)SQD1",
"product_id": "CSAFPID-209628"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD2",
"product": {
"name": "15.0(2)SQD2",
"product_id": "CSAFPID-211290"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD3",
"product": {
"name": "15.0(2)SQD3",
"product_id": "CSAFPID-217078"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD4",
"product": {
"name": "15.0(2)SQD4",
"product_id": "CSAFPID-220670"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD5",
"product": {
"name": "15.0(2)SQD5",
"product_id": "CSAFPID-225358"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD6",
"product": {
"name": "15.0(2)SQD6",
"product_id": "CSAFPID-226038"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD7",
"product": {
"name": "15.0(2)SQD7",
"product_id": "CSAFPID-227364"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD8",
"product": {
"name": "15.0(2)SQD8",
"product_id": "CSAFPID-232850"
}
}
],
"category": "product_version",
"name": "15.0SQD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JNB",
"product": {
"name": "15.3(3)JNB",
"product_id": "CSAFPID-205723"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB1",
"product": {
"name": "15.3(3)JNB1",
"product_id": "CSAFPID-209089"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB2",
"product": {
"name": "15.3(3)JNB2",
"product_id": "CSAFPID-209090"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB3",
"product": {
"name": "15.3(3)JNB3",
"product_id": "CSAFPID-210411"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB4",
"product": {
"name": "15.3(3)JNB4",
"product_id": "CSAFPID-213655"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB6",
"product": {
"name": "15.3(3)JNB6",
"product_id": "CSAFPID-224738"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNB5",
"product": {
"name": "15.3(3)JNB5",
"product_id": "CSAFPID-230606"
}
}
],
"category": "product_version",
"name": "15.3JNB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JAX",
"product": {
"name": "15.3(3)JAX",
"product_id": "CSAFPID-209073"
}
},
{
"category": "service_pack",
"name": "15.3(3)JAX1",
"product": {
"name": "15.3(3)JAX1",
"product_id": "CSAFPID-209074"
}
},
{
"category": "service_pack",
"name": "15.3(3)JAX2",
"product": {
"name": "15.3(3)JAX2",
"product_id": "CSAFPID-209075"
}
}
],
"category": "product_version",
"name": "15.3JAX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JBB",
"product": {
"name": "15.3(3)JBB",
"product_id": "CSAFPID-209080"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB1",
"product": {
"name": "15.3(3)JBB1",
"product_id": "CSAFPID-209081"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB2",
"product": {
"name": "15.3(3)JBB2",
"product_id": "CSAFPID-209419"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB4",
"product": {
"name": "15.3(3)JBB4",
"product_id": "CSAFPID-210189"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB5",
"product": {
"name": "15.3(3)JBB5",
"product_id": "CSAFPID-210262"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB6",
"product": {
"name": "15.3(3)JBB6",
"product_id": "CSAFPID-210491"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB8",
"product": {
"name": "15.3(3)JBB8",
"product_id": "CSAFPID-212266"
}
},
{
"category": "service_pack",
"name": "15.3(3)JBB6a",
"product": {
"name": "15.3(3)JBB6a",
"product_id": "CSAFPID-213770"
}
}
],
"category": "product_version",
"name": "15.3JBB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JC",
"product": {
"name": "15.3(3)JC",
"product_id": "CSAFPID-209474"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC1",
"product": {
"name": "15.3(3)JC1",
"product_id": "CSAFPID-213089"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC2",
"product": {
"name": "15.3(3)JC2",
"product_id": "CSAFPID-216573"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC3",
"product": {
"name": "15.3(3)JC3",
"product_id": "CSAFPID-217803"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC4",
"product": {
"name": "15.3(3)JC4",
"product_id": "CSAFPID-220446"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC5",
"product": {
"name": "15.3(3)JC5",
"product_id": "CSAFPID-222258"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC6",
"product": {
"name": "15.3(3)JC6",
"product_id": "CSAFPID-224442"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC8",
"product": {
"name": "15.3(3)JC8",
"product_id": "CSAFPID-227791"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC9",
"product": {
"name": "15.3(3)JC9",
"product_id": "CSAFPID-230596"
}
},
{
"category": "service_pack",
"name": "15.3(3)JC14",
"product": {
"name": "15.3(3)JC14",
"product_id": "CSAFPID-231017"
}
}
],
"category": "product_version",
"name": "15.3JC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JNC",
"product": {
"name": "15.3(3)JNC",
"product_id": "CSAFPID-210137"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNC1",
"product": {
"name": "15.3(3)JNC1",
"product_id": "CSAFPID-212497"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNC2",
"product": {
"name": "15.3(3)JNC2",
"product_id": "CSAFPID-216632"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNC3",
"product": {
"name": "15.3(3)JNC3",
"product_id": "CSAFPID-222412"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNC4",
"product": {
"name": "15.3(3)JNC4",
"product_id": "CSAFPID-225662"
}
}
],
"category": "product_version",
"name": "15.3JNC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JNP",
"product": {
"name": "15.3(3)JNP",
"product_id": "CSAFPID-211256"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNP1",
"product": {
"name": "15.3(3)JNP1",
"product_id": "CSAFPID-212686"
}
},
{
"category": "service_pack",
"name": "15.3(3)JNP3",
"product": {
"name": "15.3(3)JNP3",
"product_id": "CSAFPID-220657"
}
}
],
"category": "product_version",
"name": "15.3JNP"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPB",
"product": {
"name": "15.3(3)JPB",
"product_id": "CSAFPID-213843"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPB1",
"product": {
"name": "15.3(3)JPB1",
"product_id": "CSAFPID-216277"
}
}
],
"category": "product_version",
"name": "15.3JPB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JD",
"product": {
"name": "15.3(3)JD",
"product_id": "CSAFPID-213954"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD2",
"product": {
"name": "15.3(3)JD2",
"product_id": "CSAFPID-222630"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD3",
"product": {
"name": "15.3(3)JD3",
"product_id": "CSAFPID-222716"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD4",
"product": {
"name": "15.3(3)JD4",
"product_id": "CSAFPID-225790"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD5",
"product": {
"name": "15.3(3)JD5",
"product_id": "CSAFPID-226172"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD6",
"product": {
"name": "15.3(3)JD6",
"product_id": "CSAFPID-227789"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD7",
"product": {
"name": "15.3(3)JD7",
"product_id": "CSAFPID-228955"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD8",
"product": {
"name": "15.3(3)JD8",
"product_id": "CSAFPID-230598"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD9",
"product": {
"name": "15.3(3)JD9",
"product_id": "CSAFPID-230824"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD11",
"product": {
"name": "15.3(3)JD11",
"product_id": "CSAFPID-231000"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD12",
"product": {
"name": "15.3(3)JD12",
"product_id": "CSAFPID-231001"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD13",
"product": {
"name": "15.3(3)JD13",
"product_id": "CSAFPID-232852"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD14",
"product": {
"name": "15.3(3)JD14",
"product_id": "CSAFPID-234115"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD16",
"product": {
"name": "15.3(3)JD16",
"product_id": "CSAFPID-239225"
}
},
{
"category": "service_pack",
"name": "15.3(3)JD17",
"product": {
"name": "15.3(3)JD17",
"product_id": "CSAFPID-259985"
}
}
],
"category": "product_version",
"name": "15.3JD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(4)EC1",
"product": {
"name": "15.2(4)EC1",
"product_id": "CSAFPID-220461"
}
},
{
"category": "service_pack",
"name": "15.2(4)EC2",
"product": {
"name": "15.2(4)EC2",
"product_id": "CSAFPID-223086"
}
}
],
"category": "product_version",
"name": "15.2EC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPC",
"product": {
"name": "15.3(3)JPC",
"product_id": "CSAFPID-217048"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC1",
"product": {
"name": "15.3(3)JPC1",
"product_id": "CSAFPID-220235"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC2",
"product": {
"name": "15.3(3)JPC2",
"product_id": "CSAFPID-220658"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC3",
"product": {
"name": "15.3(3)JPC3",
"product_id": "CSAFPID-225167"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC100",
"product": {
"name": "15.3(3)JPC100",
"product_id": "CSAFPID-230994"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC5",
"product": {
"name": "15.3(3)JPC5",
"product_id": "CSAFPID-230995"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC99",
"product": {
"name": "15.3(3)JPC99",
"product_id": "CSAFPID-273510"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPC97",
"product": {
"name": "15.3(3)JPC97",
"product_id": "CSAFPID-278403"
}
}
],
"category": "product_version",
"name": "15.3JPC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JND",
"product": {
"name": "15.3(3)JND",
"product_id": "CSAFPID-217194"
}
},
{
"category": "service_pack",
"name": "15.3(3)JND1",
"product": {
"name": "15.3(3)JND1",
"product_id": "CSAFPID-222930"
}
},
{
"category": "service_pack",
"name": "15.3(3)JND2",
"product": {
"name": "15.3(3)JND2",
"product_id": "CSAFPID-226202"
}
},
{
"category": "service_pack",
"name": "15.3(3)JND3",
"product": {
"name": "15.3(3)JND3",
"product_id": "CSAFPID-227960"
}
}
],
"category": "product_version",
"name": "15.3JND"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JE",
"product": {
"name": "15.3(3)JE",
"product_id": "CSAFPID-218946"
}
}
],
"category": "product_version",
"name": "15.3JE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPD",
"product": {
"name": "15.3(3)JPD",
"product_id": "CSAFPID-218948"
}
}
],
"category": "product_version",
"name": "15.3JPD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JF",
"product": {
"name": "15.3(3)JF",
"product_id": "CSAFPID-227048"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF1",
"product": {
"name": "15.3(3)JF1",
"product_id": "CSAFPID-228956"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF2",
"product": {
"name": "15.3(3)JF2",
"product_id": "CSAFPID-230826"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF4",
"product": {
"name": "15.3(3)JF4",
"product_id": "CSAFPID-231679"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF5",
"product": {
"name": "15.3(3)JF5",
"product_id": "CSAFPID-232061"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF6",
"product": {
"name": "15.3(3)JF6",
"product_id": "CSAFPID-236205"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF7",
"product": {
"name": "15.3(3)JF7",
"product_id": "CSAFPID-239361"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF8",
"product": {
"name": "15.3(3)JF8",
"product_id": "CSAFPID-241765"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF9",
"product": {
"name": "15.3(3)JF9",
"product_id": "CSAFPID-243525"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF10",
"product": {
"name": "15.3(3)JF10",
"product_id": "CSAFPID-259238"
}
},
{
"category": "service_pack",
"name": "15.3(3)JF15i",
"product": {
"name": "15.3(3)JF15i",
"product_id": "CSAFPID-284786"
}
}
],
"category": "product_version",
"name": "15.3JF"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JG",
"product": {
"name": "15.3(3)JG",
"product_id": "CSAFPID-230603"
}
},
{
"category": "service_pack",
"name": "15.3(3)JG1",
"product": {
"name": "15.3(3)JG1",
"product_id": "CSAFPID-231796"
}
}
],
"category": "product_version",
"name": "15.3JG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JH",
"product": {
"name": "15.3(3)JH",
"product_id": "CSAFPID-230605"
}
},
{
"category": "service_pack",
"name": "15.3(3)JH1",
"product": {
"name": "15.3(3)JH1",
"product_id": "CSAFPID-238504"
}
}
],
"category": "product_version",
"name": "15.3JH"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JI1",
"product": {
"name": "15.3(3)JI1",
"product_id": "CSAFPID-244913"
}
},
{
"category": "service_pack",
"name": "15.3(3)JI3",
"product": {
"name": "15.3(3)JI3",
"product_id": "CSAFPID-252156"
}
},
{
"category": "service_pack",
"name": "15.3(3)JI4",
"product": {
"name": "15.3(3)JI4",
"product_id": "CSAFPID-257209"
}
},
{
"category": "service_pack",
"name": "15.3(3)JI5",
"product": {
"name": "15.3(3)JI5",
"product_id": "CSAFPID-260691"
}
}
],
"category": "product_version",
"name": "15.3JI"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(6)I1",
"product": {
"name": "12.2(6)I1",
"product_id": "CSAFPID-243144"
}
}
],
"category": "product_version",
"name": "12.2I"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JK",
"product": {
"name": "15.3(3)JK",
"product_id": "CSAFPID-255002"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK99",
"product": {
"name": "15.3(3)JK99",
"product_id": "CSAFPID-273350"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK3",
"product": {
"name": "15.3(3)JK3",
"product_id": "CSAFPID-277339"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK1a",
"product": {
"name": "15.3(3)JK1a",
"product_id": "CSAFPID-277340"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK2a",
"product": {
"name": "15.3(3)JK2a",
"product_id": "CSAFPID-277341"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK1t",
"product": {
"name": "15.3(3)JK1t",
"product_id": "CSAFPID-277352"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK6",
"product": {
"name": "15.3(3)JK6",
"product_id": "CSAFPID-282669"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK7",
"product": {
"name": "15.3(3)JK7",
"product_id": "CSAFPID-286111"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK8",
"product": {
"name": "15.3(3)JK8",
"product_id": "CSAFPID-287121"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK8a",
"product": {
"name": "15.3(3)JK8a",
"product_id": "CSAFPID-290656"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK8b",
"product": {
"name": "15.3(3)JK8b",
"product_id": "CSAFPID-292482"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK9",
"product": {
"name": "15.3(3)JK9",
"product_id": "CSAFPID-294801"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK10",
"product": {
"name": "15.3(3)JK10",
"product_id": "CSAFPID-299944"
}
},
{
"category": "service_pack",
"name": "15.3(3)JK11",
"product": {
"name": "15.3(3)JK11",
"product_id": "CSAFPID-301233"
}
}
],
"category": "product_version",
"name": "15.3JK"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JJ",
"product": {
"name": "15.3(3)JJ",
"product_id": "CSAFPID-259869"
}
},
{
"category": "service_pack",
"name": "15.3(3)JJ1",
"product": {
"name": "15.3(3)JJ1",
"product_id": "CSAFPID-261487"
}
}
],
"category": "product_version",
"name": "15.3JJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVR1",
"product": {
"name": "15.1(3)SVR1",
"product_id": "CSAFPID-277230"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR2",
"product": {
"name": "15.1(3)SVR2",
"product_id": "CSAFPID-277253"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR3",
"product": {
"name": "15.1(3)SVR3",
"product_id": "CSAFPID-279337"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR10",
"product": {
"name": "15.1(3)SVR10",
"product_id": "CSAFPID-290618"
}
}
],
"category": "product_version",
"name": "15.1SVR"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPI",
"product": {
"name": "15.3(3)JPI",
"product_id": "CSAFPID-274202"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI3",
"product": {
"name": "15.3(3)JPI3",
"product_id": "CSAFPID-274203"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI7",
"product": {
"name": "15.3(3)JPI7",
"product_id": "CSAFPID-278804"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI6a",
"product": {
"name": "15.3(3)JPI6a",
"product_id": "CSAFPID-278884"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI8a",
"product": {
"name": "15.3(3)JPI8a",
"product_id": "CSAFPID-285319"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI9",
"product": {
"name": "15.3(3)JPI9",
"product_id": "CSAFPID-285320"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPI10",
"product": {
"name": "15.3(3)JPI10",
"product_id": "CSAFPID-286520"
}
}
],
"category": "product_version",
"name": "15.3JPI"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPJ",
"product": {
"name": "15.3(3)JPJ",
"product_id": "CSAFPID-275845"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ2t",
"product": {
"name": "15.3(3)JPJ2t",
"product_id": "CSAFPID-277354"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ3a",
"product": {
"name": "15.3(3)JPJ3a",
"product_id": "CSAFPID-277355"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ4",
"product": {
"name": "15.3(3)JPJ4",
"product_id": "CSAFPID-278880"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ5",
"product": {
"name": "15.3(3)JPJ5",
"product_id": "CSAFPID-280472"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ6",
"product": {
"name": "15.3(3)JPJ6",
"product_id": "CSAFPID-280832"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ7",
"product": {
"name": "15.3(3)JPJ7",
"product_id": "CSAFPID-282651"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ7c",
"product": {
"name": "15.3(3)JPJ7c",
"product_id": "CSAFPID-285321"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ8a",
"product": {
"name": "15.3(3)JPJ8a",
"product_id": "CSAFPID-286497"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ9",
"product": {
"name": "15.3(3)JPJ9",
"product_id": "CSAFPID-290465"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ10",
"product": {
"name": "15.3(3)JPJ10",
"product_id": "CSAFPID-292769"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPJ11",
"product": {
"name": "15.3(3)JPJ11",
"product_id": "CSAFPID-299941"
}
}
],
"category": "product_version",
"name": "15.3JPJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVS",
"product": {
"name": "15.1(3)SVS",
"product_id": "CSAFPID-277232"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVS1",
"product": {
"name": "15.1(3)SVS1",
"product_id": "CSAFPID-279335"
}
}
],
"category": "product_version",
"name": "15.1SVS"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPK",
"product": {
"name": "15.3(3)JPK",
"product_id": "CSAFPID-280661"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK1",
"product": {
"name": "15.3(3)JPK1",
"product_id": "CSAFPID-280833"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK2",
"product": {
"name": "15.3(3)JPK2",
"product_id": "CSAFPID-282027"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK3",
"product": {
"name": "15.3(3)JPK3",
"product_id": "CSAFPID-282114"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK4",
"product": {
"name": "15.3(3)JPK4",
"product_id": "CSAFPID-286030"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK5",
"product": {
"name": "15.3(3)JPK5",
"product_id": "CSAFPID-286559"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK6",
"product": {
"name": "15.3(3)JPK6",
"product_id": "CSAFPID-289303"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK7",
"product": {
"name": "15.3(3)JPK7",
"product_id": "CSAFPID-292655"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK8",
"product": {
"name": "15.3(3)JPK8",
"product_id": "CSAFPID-300783"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPK9",
"product": {
"name": "15.3(3)JPK9",
"product_id": "CSAFPID-301579"
}
}
],
"category": "product_version",
"name": "15.3JPK"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVT1",
"product": {
"name": "15.1(3)SVT1",
"product_id": "CSAFPID-280759"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT2",
"product": {
"name": "15.1(3)SVT2",
"product_id": "CSAFPID-282026"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT3",
"product": {
"name": "15.1(3)SVT3",
"product_id": "CSAFPID-284785"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT4",
"product": {
"name": "15.1(3)SVT4",
"product_id": "CSAFPID-286399"
}
}
],
"category": "product_version",
"name": "15.1SVT"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVU1",
"product": {
"name": "15.1(3)SVU1",
"product_id": "CSAFPID-283833"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU10",
"product": {
"name": "15.1(3)SVU10",
"product_id": "CSAFPID-284291"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU2",
"product": {
"name": "15.1(3)SVU2",
"product_id": "CSAFPID-284566"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU11",
"product": {
"name": "15.1(3)SVU11",
"product_id": "CSAFPID-286400"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU20",
"product": {
"name": "15.1(3)SVU20",
"product_id": "CSAFPID-289270"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU21",
"product": {
"name": "15.1(3)SVU21",
"product_id": "CSAFPID-290557"
}
}
],
"category": "product_version",
"name": "15.1SVU"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVV1",
"product": {
"name": "15.1(3)SVV1",
"product_id": "CSAFPID-284341"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV2",
"product": {
"name": "15.1(3)SVV2",
"product_id": "CSAFPID-286029"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV3",
"product": {
"name": "15.1(3)SVV3",
"product_id": "CSAFPID-286940"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV4",
"product": {
"name": "15.1(3)SVV4",
"product_id": "CSAFPID-289371"
}
}
],
"category": "product_version",
"name": "15.1SVV"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPL",
"product": {
"name": "15.3(3)JPL",
"product_id": "CSAFPID-285323"
}
}
],
"category": "product_version",
"name": "15.3JPL"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPM",
"product": {
"name": "15.3(3)JPM",
"product_id": "CSAFPID-286352"
}
}
],
"category": "product_version",
"name": "15.3JPM"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVW",
"product": {
"name": "15.1(3)SVW",
"product_id": "CSAFPID-286451"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVW1",
"product": {
"name": "15.1(3)SVW1",
"product_id": "CSAFPID-286844"
}
}
],
"category": "product_version",
"name": "15.1SVW"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVX",
"product": {
"name": "15.1(3)SVX",
"product_id": "CSAFPID-286927"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVX1",
"product": {
"name": "15.1(3)SVX1",
"product_id": "CSAFPID-289301"
}
}
],
"category": "product_version",
"name": "15.1SVX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPN",
"product": {
"name": "15.3(3)JPN",
"product_id": "CSAFPID-287185"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN1",
"product": {
"name": "15.3(3)JPN1",
"product_id": "CSAFPID-290587"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN2",
"product": {
"name": "15.3(3)JPN2",
"product_id": "CSAFPID-292654"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN3",
"product": {
"name": "15.3(3)JPN3",
"product_id": "CSAFPID-296664"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN4",
"product": {
"name": "15.3(3)JPN4",
"product_id": "CSAFPID-300502"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN5",
"product": {
"name": "15.3(3)JPN5",
"product_id": "CSAFPID-301721"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPN6",
"product": {
"name": "15.3(3)JPN6",
"product_id": "CSAFPID-302978"
}
}
],
"category": "product_version",
"name": "15.3JPN"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPO",
"product": {
"name": "15.3(3)JPO",
"product_id": "CSAFPID-290479"
}
}
],
"category": "product_version",
"name": "15.3JPO"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPP",
"product": {
"name": "15.3(3)JPP",
"product_id": "CSAFPID-294791"
}
}
],
"category": "product_version",
"name": "15.3JPP"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPQ",
"product": {
"name": "15.3(3)JPQ",
"product_id": "CSAFPID-296759"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPQ1",
"product": {
"name": "15.3(3)JPQ1",
"product_id": "CSAFPID-300835"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPQ2",
"product": {
"name": "15.3(3)JPQ2",
"product_id": "CSAFPID-300949"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPQ3",
"product": {
"name": "15.3(3)JPQ3",
"product_id": "CSAFPID-301472"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPQ4",
"product": {
"name": "15.3(3)JPQ4",
"product_id": "CSAFPID-302624"
}
}
],
"category": "product_version",
"name": "15.3JPQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPR",
"product": {
"name": "15.3(3)JPR",
"product_id": "CSAFPID-300837"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPR1",
"product": {
"name": "15.3(3)JPR1",
"product_id": "CSAFPID-300950"
}
}
],
"category": "product_version",
"name": "15.3JPR"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPS",
"product": {
"name": "15.3(3)JPS",
"product_id": "CSAFPID-301223"
}
}
],
"category": "product_version",
"name": "15.3JPS"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JPT",
"product": {
"name": "15.3(3)JPT",
"product_id": "CSAFPID-301225"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPT1",
"product": {
"name": "15.3(3)JPT1",
"product_id": "CSAFPID-302781"
}
},
{
"category": "service_pack",
"name": "15.3(3)JPT2",
"product": {
"name": "15.3(3)JPT2",
"product_id": "CSAFPID-303044"
}
}
],
"category": "product_version",
"name": "15.3JPT"
}
],
"category": "product_family",
"name": "IOS"
},
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "3.6.5bE",
"product": {
"name": "3.6.5bE",
"product_id": "CSAFPID-222435"
}
}
],
"category": "product_version",
"name": "3.6E"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.8.9E",
"product": {
"name": "3.8.9E",
"product_id": "CSAFPID-264514"
}
},
{
"category": "service_pack",
"name": "3.8.10E",
"product": {
"name": "3.8.10E",
"product_id": "CSAFPID-271633"
}
},
{
"category": "service_pack",
"name": "3.8.10cE",
"product": {
"name": "3.8.10cE",
"product_id": "CSAFPID-284346"
}
},
{
"category": "service_pack",
"name": "3.8.10dE",
"product": {
"name": "3.8.10dE",
"product_id": "CSAFPID-286453"
}
}
],
"category": "product_version",
"name": "3.8E"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.3.9",
"product": {
"name": "16.3.9",
"product_id": "CSAFPID-262389"
}
}
],
"category": "product_version",
"name": "16.3"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.6.7",
"product": {
"name": "16.6.7",
"product_id": "CSAFPID-261241"
}
},
{
"category": "service_pack",
"name": "16.6.7a",
"product": {
"name": "16.6.7a",
"product_id": "CSAFPID-270097"
}
},
{
"category": "service_pack",
"name": "16.6.8",
"product": {
"name": "16.6.8",
"product_id": "CSAFPID-277148"
}
},
{
"category": "service_pack",
"name": "16.6.9",
"product": {
"name": "16.6.9",
"product_id": "CSAFPID-280801"
}
},
{
"category": "service_pack",
"name": "16.6.10",
"product": {
"name": "16.6.10",
"product_id": "CSAFPID-283835"
}
}
],
"category": "product_version",
"name": "16.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.9.1",
"product": {
"name": "16.9.1",
"product_id": "CSAFPID-225856"
}
},
{
"category": "service_pack",
"name": "16.9.1d",
"product": {
"name": "16.9.1d",
"product_id": "CSAFPID-248242"
}
},
{
"category": "service_pack",
"name": "16.9.4",
"product": {
"name": "16.9.4",
"product_id": "CSAFPID-262390"
}
},
{
"category": "service_pack",
"name": "16.9.4c",
"product": {
"name": "16.9.4c",
"product_id": "CSAFPID-268921"
}
},
{
"category": "service_pack",
"name": "16.9.5f",
"product": {
"name": "16.9.5f",
"product_id": "CSAFPID-276837"
}
},
{
"category": "service_pack",
"name": "16.9.6",
"product": {
"name": "16.9.6",
"product_id": "CSAFPID-277945"
}
},
{
"category": "service_pack",
"name": "16.9.7",
"product": {
"name": "16.9.7",
"product_id": "CSAFPID-280651"
}
},
{
"category": "service_pack",
"name": "16.9.8",
"product": {
"name": "16.9.8",
"product_id": "CSAFPID-280938"
}
},
{
"category": "service_pack",
"name": "16.9.8a",
"product": {
"name": "16.9.8a",
"product_id": "CSAFPID-290562"
}
},
{
"category": "service_pack",
"name": "16.9.8b",
"product": {
"name": "16.9.8b",
"product_id": "CSAFPID-290669"
}
}
],
"category": "product_version",
"name": "16.9"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.10.1",
"product": {
"name": "16.10.1",
"product_id": "CSAFPID-225858"
}
},
{
"category": "service_pack",
"name": "16.10.1e",
"product": {
"name": "16.10.1e",
"product_id": "CSAFPID-257955"
}
},
{
"category": "service_pack",
"name": "16.10.2",
"product": {
"name": "16.10.2",
"product_id": "CSAFPID-260917"
}
},
{
"category": "service_pack",
"name": "16.10.1g",
"product": {
"name": "16.10.1g",
"product_id": "CSAFPID-266259"
}
}
],
"category": "product_version",
"name": "16.10"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.10.3E",
"product": {
"name": "3.10.3E",
"product_id": "CSAFPID-262994"
}
}
],
"category": "product_version",
"name": "3.10E"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.11.1",
"product": {
"name": "16.11.1",
"product_id": "CSAFPID-227918"
}
},
{
"category": "service_pack",
"name": "16.11.1a",
"product": {
"name": "16.11.1a",
"product_id": "CSAFPID-252271"
}
},
{
"category": "service_pack",
"name": "16.11.1b",
"product": {
"name": "16.11.1b",
"product_id": "CSAFPID-260741"
}
},
{
"category": "service_pack",
"name": "16.11.2",
"product": {
"name": "16.11.2",
"product_id": "CSAFPID-261240"
}
},
{
"category": "service_pack",
"name": "16.11.1s",
"product": {
"name": "16.11.1s",
"product_id": "CSAFPID-261465"
}
},
{
"category": "service_pack",
"name": "16.11.1c",
"product": {
"name": "16.11.1c",
"product_id": "CSAFPID-264096"
}
}
],
"category": "product_version",
"name": "16.11"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.12.1",
"product": {
"name": "16.12.1",
"product_id": "CSAFPID-227920"
}
},
{
"category": "service_pack",
"name": "16.12.1s",
"product": {
"name": "16.12.1s",
"product_id": "CSAFPID-265735"
}
},
{
"category": "service_pack",
"name": "16.12.1a",
"product": {
"name": "16.12.1a",
"product_id": "CSAFPID-265841"
}
},
{
"category": "service_pack",
"name": "16.12.1c",
"product": {
"name": "16.12.1c",
"product_id": "CSAFPID-267110"
}
},
{
"category": "service_pack",
"name": "16.12.1w",
"product": {
"name": "16.12.1w",
"product_id": "CSAFPID-267240"
}
},
{
"category": "service_pack",
"name": "16.12.1y",
"product": {
"name": "16.12.1y",
"product_id": "CSAFPID-271938"
}
},
{
"category": "service_pack",
"name": "16.12.1x",
"product": {
"name": "16.12.1x",
"product_id": "CSAFPID-273649"
}
},
{
"category": "service_pack",
"name": "16.12.1t",
"product": {
"name": "16.12.1t",
"product_id": "CSAFPID-274832"
}
}
],
"category": "product_version",
"name": "16.12"
}
],
"category": "product_family",
"name": "Cisco IOS XE Software"
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-3225",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvo17827"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvp56319"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvr47365"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvr67776"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-103763",
"CSAFPID-103955",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104101",
"CSAFPID-104342",
"CSAFPID-104376",
"CSAFPID-104855",
"CSAFPID-105253",
"CSAFPID-105394",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-106016",
"CSAFPID-106072",
"CSAFPID-106684",
"CSAFPID-106997",
"CSAFPID-107209",
"CSAFPID-107630",
"CSAFPID-107852",
"CSAFPID-109098",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109808",
"CSAFPID-111005",
"CSAFPID-111674",
"CSAFPID-114665",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117282",
"CSAFPID-184125",
"CSAFPID-187057",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-191928",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-195481",
"CSAFPID-195528",
"CSAFPID-195544",
"CSAFPID-195770",
"CSAFPID-197462",
"CSAFPID-197468",
"CSAFPID-198063",
"CSAFPID-198542",
"CSAFPID-200492",
"CSAFPID-200503",
"CSAFPID-201074",
"CSAFPID-204097",
"CSAFPID-204102",
"CSAFPID-204103",
"CSAFPID-204186",
"CSAFPID-204228",
"CSAFPID-204310",
"CSAFPID-204324",
"CSAFPID-204826",
"CSAFPID-204831",
"CSAFPID-205672",
"CSAFPID-205723",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209067",
"CSAFPID-209068",
"CSAFPID-209073",
"CSAFPID-209074",
"CSAFPID-209075",
"CSAFPID-209077",
"CSAFPID-209080",
"CSAFPID-209081",
"CSAFPID-209083",
"CSAFPID-209085",
"CSAFPID-209086",
"CSAFPID-209087",
"CSAFPID-209089",
"CSAFPID-209090",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209419",
"CSAFPID-209474",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209930",
"CSAFPID-209935",
"CSAFPID-210137",
"CSAFPID-210189",
"CSAFPID-210203",
"CSAFPID-210262",
"CSAFPID-210410",
"CSAFPID-210411",
"CSAFPID-210491",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210937",
"CSAFPID-210958",
"CSAFPID-211256",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-212266",
"CSAFPID-212497",
"CSAFPID-212686",
"CSAFPID-213089",
"CSAFPID-213654",
"CSAFPID-213655",
"CSAFPID-213770",
"CSAFPID-213788",
"CSAFPID-213843",
"CSAFPID-213954",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214382",
"CSAFPID-214556",
"CSAFPID-214764",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-216277",
"CSAFPID-216295",
"CSAFPID-216573",
"CSAFPID-216632",
"CSAFPID-217048",
"CSAFPID-217078",
"CSAFPID-217194",
"CSAFPID-217779",
"CSAFPID-217803",
"CSAFPID-218891",
"CSAFPID-218946",
"CSAFPID-218948",
"CSAFPID-220038",
"CSAFPID-220235",
"CSAFPID-220441",
"CSAFPID-220446",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220657",
"CSAFPID-220658",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222258",
"CSAFPID-222342",
"CSAFPID-222412",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222537",
"CSAFPID-222630",
"CSAFPID-222716",
"CSAFPID-222924",
"CSAFPID-222930",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224442",
"CSAFPID-224738",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225167",
"CSAFPID-225358",
"CSAFPID-225662",
"CSAFPID-225740",
"CSAFPID-225790",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-226172",
"CSAFPID-226174",
"CSAFPID-226202",
"CSAFPID-227048",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227789",
"CSAFPID-227791",
"CSAFPID-227960",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-228955",
"CSAFPID-228956",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230596",
"CSAFPID-230598",
"CSAFPID-230603",
"CSAFPID-230605",
"CSAFPID-230606",
"CSAFPID-230712",
"CSAFPID-230824",
"CSAFPID-230826",
"CSAFPID-230915",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230992",
"CSAFPID-230994",
"CSAFPID-230995",
"CSAFPID-231000",
"CSAFPID-231001",
"CSAFPID-231017",
"CSAFPID-231245",
"CSAFPID-231679",
"CSAFPID-231796",
"CSAFPID-232061",
"CSAFPID-232122",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-232852",
"CSAFPID-234115",
"CSAFPID-234926",
"CSAFPID-236205",
"CSAFPID-238504",
"CSAFPID-238999",
"CSAFPID-239225",
"CSAFPID-239279",
"CSAFPID-239361",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241765",
"CSAFPID-241916",
"CSAFPID-242313",
"CSAFPID-243144",
"CSAFPID-243525",
"CSAFPID-244911",
"CSAFPID-244913",
"CSAFPID-245380",
"CSAFPID-247630",
"CSAFPID-251487",
"CSAFPID-252156",
"CSAFPID-255002",
"CSAFPID-257209",
"CSAFPID-257830",
"CSAFPID-259238",
"CSAFPID-259869",
"CSAFPID-259985",
"CSAFPID-260691",
"CSAFPID-260993",
"CSAFPID-261487",
"CSAFPID-262300",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-262684",
"CSAFPID-263981",
"CSAFPID-264643",
"CSAFPID-271140",
"CSAFPID-271286",
"CSAFPID-273350",
"CSAFPID-273510",
"CSAFPID-274199",
"CSAFPID-274202",
"CSAFPID-274203",
"CSAFPID-275845",
"CSAFPID-276903",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-277339",
"CSAFPID-277340",
"CSAFPID-277341",
"CSAFPID-277352",
"CSAFPID-277354",
"CSAFPID-277355",
"CSAFPID-278029",
"CSAFPID-278403",
"CSAFPID-278804",
"CSAFPID-278880",
"CSAFPID-278884",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280472",
"CSAFPID-280661",
"CSAFPID-280759",
"CSAFPID-280778",
"CSAFPID-280779",
"CSAFPID-280832",
"CSAFPID-280833",
"CSAFPID-282026",
"CSAFPID-282027",
"CSAFPID-282114",
"CSAFPID-282651",
"CSAFPID-282669",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284349",
"CSAFPID-284566",
"CSAFPID-284567",
"CSAFPID-284785",
"CSAFPID-284786",
"CSAFPID-285319",
"CSAFPID-285320",
"CSAFPID-285321",
"CSAFPID-285323",
"CSAFPID-286029",
"CSAFPID-286030",
"CSAFPID-286111",
"CSAFPID-286352",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286452",
"CSAFPID-286497",
"CSAFPID-286520",
"CSAFPID-286559",
"CSAFPID-286843",
"CSAFPID-286844",
"CSAFPID-286860",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-287121",
"CSAFPID-287185",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289303",
"CSAFPID-289371",
"CSAFPID-290465",
"CSAFPID-290479",
"CSAFPID-290557",
"CSAFPID-290587",
"CSAFPID-290618",
"CSAFPID-290656",
"CSAFPID-292482",
"CSAFPID-292654",
"CSAFPID-292655",
"CSAFPID-292769",
"CSAFPID-294791",
"CSAFPID-294801",
"CSAFPID-296664",
"CSAFPID-296759",
"CSAFPID-299941",
"CSAFPID-299944",
"CSAFPID-300502",
"CSAFPID-300783",
"CSAFPID-300835",
"CSAFPID-300837",
"CSAFPID-300949",
"CSAFPID-300950",
"CSAFPID-301223",
"CSAFPID-301225",
"CSAFPID-301233",
"CSAFPID-301472",
"CSAFPID-301579",
"CSAFPID-301721",
"CSAFPID-302624",
"CSAFPID-302781",
"CSAFPID-302978",
"CSAFPID-303044",
"CSAFPID-222435",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-248242",
"CSAFPID-252271",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262994",
"CSAFPID-264096",
"CSAFPID-264514",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271633",
"CSAFPID-271938",
"CSAFPID-273649",
"CSAFPID-274832",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-283835",
"CSAFPID-284346",
"CSAFPID-286453",
"CSAFPID-290562",
"CSAFPID-290669"
]
},
"release_date": "2020-06-03T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-222435",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-248242",
"CSAFPID-252271",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262994",
"CSAFPID-264096",
"CSAFPID-264514",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271633",
"CSAFPID-271938",
"CSAFPID-273649",
"CSAFPID-274832",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-283835",
"CSAFPID-284346",
"CSAFPID-286453",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-103763",
"CSAFPID-103955",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104101",
"CSAFPID-104342",
"CSAFPID-104376",
"CSAFPID-104855",
"CSAFPID-105253",
"CSAFPID-105394",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-106016",
"CSAFPID-106072",
"CSAFPID-106684",
"CSAFPID-106997",
"CSAFPID-107209",
"CSAFPID-107630",
"CSAFPID-107852",
"CSAFPID-109098",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109808",
"CSAFPID-111005",
"CSAFPID-111674",
"CSAFPID-114665",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117282",
"CSAFPID-184125",
"CSAFPID-187057",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-191928",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-195481",
"CSAFPID-195528",
"CSAFPID-195544",
"CSAFPID-195770",
"CSAFPID-197462",
"CSAFPID-197468",
"CSAFPID-198063",
"CSAFPID-198542",
"CSAFPID-200492",
"CSAFPID-200503",
"CSAFPID-201074",
"CSAFPID-204097",
"CSAFPID-204102",
"CSAFPID-204103",
"CSAFPID-204186",
"CSAFPID-204228",
"CSAFPID-204310",
"CSAFPID-204324",
"CSAFPID-204826",
"CSAFPID-204831",
"CSAFPID-205672",
"CSAFPID-205723",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209067",
"CSAFPID-209068",
"CSAFPID-209073",
"CSAFPID-209074",
"CSAFPID-209075",
"CSAFPID-209077",
"CSAFPID-209080",
"CSAFPID-209081",
"CSAFPID-209083",
"CSAFPID-209085",
"CSAFPID-209086",
"CSAFPID-209087",
"CSAFPID-209089",
"CSAFPID-209090",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209419",
"CSAFPID-209474",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209930",
"CSAFPID-209935",
"CSAFPID-210137",
"CSAFPID-210189",
"CSAFPID-210203",
"CSAFPID-210262",
"CSAFPID-210410",
"CSAFPID-210411",
"CSAFPID-210491",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210937",
"CSAFPID-210958",
"CSAFPID-211256",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-212266",
"CSAFPID-212497",
"CSAFPID-212686",
"CSAFPID-213089",
"CSAFPID-213654",
"CSAFPID-213655",
"CSAFPID-213770",
"CSAFPID-213788",
"CSAFPID-213843",
"CSAFPID-213954",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214382",
"CSAFPID-214556",
"CSAFPID-214764",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-216277",
"CSAFPID-216295",
"CSAFPID-216573",
"CSAFPID-216632",
"CSAFPID-217048",
"CSAFPID-217078",
"CSAFPID-217194",
"CSAFPID-217779",
"CSAFPID-217803",
"CSAFPID-218891",
"CSAFPID-218946",
"CSAFPID-218948",
"CSAFPID-220038",
"CSAFPID-220235",
"CSAFPID-220441",
"CSAFPID-220446",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220657",
"CSAFPID-220658",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222258",
"CSAFPID-222342",
"CSAFPID-222412",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222537",
"CSAFPID-222630",
"CSAFPID-222716",
"CSAFPID-222924",
"CSAFPID-222930",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224442",
"CSAFPID-224738",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225167",
"CSAFPID-225358",
"CSAFPID-225662",
"CSAFPID-225740",
"CSAFPID-225790",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-226172",
"CSAFPID-226174",
"CSAFPID-226202",
"CSAFPID-227048",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227789",
"CSAFPID-227791",
"CSAFPID-227960",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-228955",
"CSAFPID-228956",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230596",
"CSAFPID-230598",
"CSAFPID-230603",
"CSAFPID-230605",
"CSAFPID-230606",
"CSAFPID-230712",
"CSAFPID-230824",
"CSAFPID-230826",
"CSAFPID-230915",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230992",
"CSAFPID-230994",
"CSAFPID-230995",
"CSAFPID-231000",
"CSAFPID-231001",
"CSAFPID-231017",
"CSAFPID-231245",
"CSAFPID-231679",
"CSAFPID-231796",
"CSAFPID-232061",
"CSAFPID-232122",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-232852",
"CSAFPID-234115",
"CSAFPID-234926",
"CSAFPID-236205",
"CSAFPID-238504",
"CSAFPID-238999",
"CSAFPID-239225",
"CSAFPID-239279",
"CSAFPID-239361",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241765",
"CSAFPID-241916",
"CSAFPID-242313",
"CSAFPID-243144",
"CSAFPID-243525",
"CSAFPID-244911",
"CSAFPID-244913",
"CSAFPID-245380",
"CSAFPID-247630",
"CSAFPID-251487",
"CSAFPID-252156",
"CSAFPID-255002",
"CSAFPID-257209",
"CSAFPID-257830",
"CSAFPID-259238",
"CSAFPID-259869",
"CSAFPID-259985",
"CSAFPID-260691",
"CSAFPID-260993",
"CSAFPID-261487",
"CSAFPID-262300",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-262684",
"CSAFPID-263981",
"CSAFPID-264643",
"CSAFPID-271140",
"CSAFPID-271286",
"CSAFPID-273350",
"CSAFPID-273510",
"CSAFPID-274199",
"CSAFPID-274202",
"CSAFPID-274203",
"CSAFPID-275845",
"CSAFPID-276903",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-277339",
"CSAFPID-277340",
"CSAFPID-277341",
"CSAFPID-277352",
"CSAFPID-277354",
"CSAFPID-277355",
"CSAFPID-278029",
"CSAFPID-278403",
"CSAFPID-278804",
"CSAFPID-278880",
"CSAFPID-278884",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280472",
"CSAFPID-280661",
"CSAFPID-280759",
"CSAFPID-280778",
"CSAFPID-280779",
"CSAFPID-280832",
"CSAFPID-280833",
"CSAFPID-282026",
"CSAFPID-282027",
"CSAFPID-282114",
"CSAFPID-282651",
"CSAFPID-282669",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284349",
"CSAFPID-284566",
"CSAFPID-284567",
"CSAFPID-284785",
"CSAFPID-284786",
"CSAFPID-285319",
"CSAFPID-285320",
"CSAFPID-285321",
"CSAFPID-285323",
"CSAFPID-286029",
"CSAFPID-286030",
"CSAFPID-286111",
"CSAFPID-286352",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286452",
"CSAFPID-286497",
"CSAFPID-286520",
"CSAFPID-286559",
"CSAFPID-286843",
"CSAFPID-286844",
"CSAFPID-286860",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-287121",
"CSAFPID-287185",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289303",
"CSAFPID-289371",
"CSAFPID-290465",
"CSAFPID-290479",
"CSAFPID-290557",
"CSAFPID-290587",
"CSAFPID-290618",
"CSAFPID-290656",
"CSAFPID-292482",
"CSAFPID-292654",
"CSAFPID-292655",
"CSAFPID-292769",
"CSAFPID-294791",
"CSAFPID-294801",
"CSAFPID-296664",
"CSAFPID-296759",
"CSAFPID-299941",
"CSAFPID-299944",
"CSAFPID-300502",
"CSAFPID-300783",
"CSAFPID-300835",
"CSAFPID-300837",
"CSAFPID-300949",
"CSAFPID-300950",
"CSAFPID-301223",
"CSAFPID-301225",
"CSAFPID-301233",
"CSAFPID-301472",
"CSAFPID-301579",
"CSAFPID-301721",
"CSAFPID-302624",
"CSAFPID-302781",
"CSAFPID-302978",
"CSAFPID-303044"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-103763",
"CSAFPID-103955",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104101",
"CSAFPID-104342",
"CSAFPID-104376",
"CSAFPID-104855",
"CSAFPID-105253",
"CSAFPID-105394",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-106016",
"CSAFPID-106072",
"CSAFPID-106684",
"CSAFPID-106997",
"CSAFPID-107209",
"CSAFPID-107630",
"CSAFPID-107852",
"CSAFPID-109098",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109808",
"CSAFPID-111005",
"CSAFPID-111674",
"CSAFPID-114665",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117282",
"CSAFPID-184125",
"CSAFPID-187057",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-191928",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-195481",
"CSAFPID-195528",
"CSAFPID-195544",
"CSAFPID-195770",
"CSAFPID-197462",
"CSAFPID-197468",
"CSAFPID-198063",
"CSAFPID-198542",
"CSAFPID-200492",
"CSAFPID-200503",
"CSAFPID-201074",
"CSAFPID-204097",
"CSAFPID-204102",
"CSAFPID-204103",
"CSAFPID-204186",
"CSAFPID-204228",
"CSAFPID-204310",
"CSAFPID-204324",
"CSAFPID-204826",
"CSAFPID-204831",
"CSAFPID-205672",
"CSAFPID-205723",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209067",
"CSAFPID-209068",
"CSAFPID-209073",
"CSAFPID-209074",
"CSAFPID-209075",
"CSAFPID-209077",
"CSAFPID-209080",
"CSAFPID-209081",
"CSAFPID-209083",
"CSAFPID-209085",
"CSAFPID-209086",
"CSAFPID-209087",
"CSAFPID-209089",
"CSAFPID-209090",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209419",
"CSAFPID-209474",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209930",
"CSAFPID-209935",
"CSAFPID-210137",
"CSAFPID-210189",
"CSAFPID-210203",
"CSAFPID-210262",
"CSAFPID-210410",
"CSAFPID-210411",
"CSAFPID-210491",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210937",
"CSAFPID-210958",
"CSAFPID-211256",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-212266",
"CSAFPID-212497",
"CSAFPID-212686",
"CSAFPID-213089",
"CSAFPID-213654",
"CSAFPID-213655",
"CSAFPID-213770",
"CSAFPID-213788",
"CSAFPID-213843",
"CSAFPID-213954",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214382",
"CSAFPID-214556",
"CSAFPID-214764",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-216277",
"CSAFPID-216295",
"CSAFPID-216573",
"CSAFPID-216632",
"CSAFPID-217048",
"CSAFPID-217078",
"CSAFPID-217194",
"CSAFPID-217779",
"CSAFPID-217803",
"CSAFPID-218891",
"CSAFPID-218946",
"CSAFPID-218948",
"CSAFPID-220038",
"CSAFPID-220235",
"CSAFPID-220441",
"CSAFPID-220446",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220657",
"CSAFPID-220658",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-222258",
"CSAFPID-222342",
"CSAFPID-222412",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222537",
"CSAFPID-222630",
"CSAFPID-222716",
"CSAFPID-222924",
"CSAFPID-222930",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224442",
"CSAFPID-224738",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225167",
"CSAFPID-225358",
"CSAFPID-225662",
"CSAFPID-225740",
"CSAFPID-225790",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-226172",
"CSAFPID-226174",
"CSAFPID-226202",
"CSAFPID-227048",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227789",
"CSAFPID-227791",
"CSAFPID-227960",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-228955",
"CSAFPID-228956",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230596",
"CSAFPID-230598",
"CSAFPID-230603",
"CSAFPID-230605",
"CSAFPID-230606",
"CSAFPID-230712",
"CSAFPID-230824",
"CSAFPID-230826",
"CSAFPID-230915",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230992",
"CSAFPID-230994",
"CSAFPID-230995",
"CSAFPID-231000",
"CSAFPID-231001",
"CSAFPID-231017",
"CSAFPID-231245",
"CSAFPID-231679",
"CSAFPID-231796",
"CSAFPID-232061",
"CSAFPID-232122",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-232852",
"CSAFPID-234115",
"CSAFPID-234926",
"CSAFPID-236205",
"CSAFPID-238504",
"CSAFPID-238999",
"CSAFPID-239225",
"CSAFPID-239279",
"CSAFPID-239361",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241765",
"CSAFPID-241916",
"CSAFPID-242313",
"CSAFPID-243144",
"CSAFPID-243525",
"CSAFPID-244911",
"CSAFPID-244913",
"CSAFPID-245380",
"CSAFPID-247630",
"CSAFPID-251487",
"CSAFPID-252156",
"CSAFPID-255002",
"CSAFPID-257209",
"CSAFPID-257830",
"CSAFPID-259238",
"CSAFPID-259869",
"CSAFPID-259985",
"CSAFPID-260691",
"CSAFPID-260993",
"CSAFPID-261487",
"CSAFPID-262300",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-262684",
"CSAFPID-263981",
"CSAFPID-264643",
"CSAFPID-271140",
"CSAFPID-271286",
"CSAFPID-273350",
"CSAFPID-273510",
"CSAFPID-274199",
"CSAFPID-274202",
"CSAFPID-274203",
"CSAFPID-275845",
"CSAFPID-276903",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-277339",
"CSAFPID-277340",
"CSAFPID-277341",
"CSAFPID-277352",
"CSAFPID-277354",
"CSAFPID-277355",
"CSAFPID-278029",
"CSAFPID-278403",
"CSAFPID-278804",
"CSAFPID-278880",
"CSAFPID-278884",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280472",
"CSAFPID-280661",
"CSAFPID-280759",
"CSAFPID-280778",
"CSAFPID-280779",
"CSAFPID-280832",
"CSAFPID-280833",
"CSAFPID-282026",
"CSAFPID-282027",
"CSAFPID-282114",
"CSAFPID-282651",
"CSAFPID-282669",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284349",
"CSAFPID-284566",
"CSAFPID-284567",
"CSAFPID-284785",
"CSAFPID-284786",
"CSAFPID-285319",
"CSAFPID-285320",
"CSAFPID-285321",
"CSAFPID-285323",
"CSAFPID-286029",
"CSAFPID-286030",
"CSAFPID-286111",
"CSAFPID-286352",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286452",
"CSAFPID-286497",
"CSAFPID-286520",
"CSAFPID-286559",
"CSAFPID-286843",
"CSAFPID-286844",
"CSAFPID-286860",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-287121",
"CSAFPID-287185",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289303",
"CSAFPID-289371",
"CSAFPID-290465",
"CSAFPID-290479",
"CSAFPID-290557",
"CSAFPID-290587",
"CSAFPID-290618",
"CSAFPID-290656",
"CSAFPID-292482",
"CSAFPID-292654",
"CSAFPID-292655",
"CSAFPID-292769",
"CSAFPID-294791",
"CSAFPID-294801",
"CSAFPID-296664",
"CSAFPID-296759",
"CSAFPID-299941",
"CSAFPID-299944",
"CSAFPID-300502",
"CSAFPID-300783",
"CSAFPID-300835",
"CSAFPID-300837",
"CSAFPID-300949",
"CSAFPID-300950",
"CSAFPID-301223",
"CSAFPID-301225",
"CSAFPID-301233",
"CSAFPID-301472",
"CSAFPID-301579",
"CSAFPID-301721",
"CSAFPID-302624",
"CSAFPID-302781",
"CSAFPID-302978",
"CSAFPID-303044",
"CSAFPID-222435",
"CSAFPID-225856",
"CSAFPID-225858",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-248242",
"CSAFPID-252271",
"CSAFPID-257955",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262389",
"CSAFPID-262390",
"CSAFPID-262994",
"CSAFPID-264096",
"CSAFPID-264514",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271633",
"CSAFPID-271938",
"CSAFPID-273649",
"CSAFPID-274832",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-283835",
"CSAFPID-284346",
"CSAFPID-286453",
"CSAFPID-290562",
"CSAFPID-290669"
]
}
],
"title": "Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities"
}
]
}
CERTFR-2020-AVI-340
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Cisco IOx sans le dernier correctif de sécurité (voir le site du constructeur pour la liste des produits vulnérables) | ||
| Cisco | IOS | Cisco IOS pour routeurs Cisco séries CGR1000 sans le dernier correctif de sécurité | ||
| Cisco | NX-OS | Cisco NX-OS sans le dernier correctif de sécurité (voir le site du constructeur pour la liste des produits vulnérables) | ||
| Cisco | IOS XE | Cisco IOS et IOS XE sans le dernier correctif de sécurité (voir le site du constructeur pour la liste des produits vulnérables) | ||
| Cisco | IOS | Cisco IOS pour routeurs Cisco 809 et 829 (Industrial ISRs) sans le dernier correctif de sécurité | ||
| Cisco | IOS XR | Cisco IOS XR versions 5.2 et 5.3 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco IOx sans le dernier correctif de s\u00e9curit\u00e9 (voir le site du constructeur pour la liste des produits vuln\u00e9rables)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS pour routeurs Cisco s\u00e9ries CGR1000 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco NX-OS sans le dernier correctif de s\u00e9curit\u00e9 (voir le site du constructeur pour la liste des produits vuln\u00e9rables)",
"product": {
"name": "NX-OS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS et IOS XE sans le dernier correctif de s\u00e9curit\u00e9 (voir le site du constructeur pour la liste des produits vuln\u00e9rables)",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS pour routeurs Cisco 809 et 829 (Industrial ISRs) sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XR versions 5.2 et 5.3",
"product": {
"name": "IOS XR",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-3211",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3211"
},
{
"name": "CVE-2020-3257",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3257"
},
{
"name": "CVE-2020-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3212"
},
{
"name": "CVE-2020-3205",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3205"
},
{
"name": "CVE-2020-3218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3218"
},
{
"name": "CVE-2020-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3200"
},
{
"name": "CVE-2020-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3234"
},
{
"name": "CVE-2020-3229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3229"
},
{
"name": "CVE-2020-3217",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3217"
},
{
"name": "CVE-2020-3208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3208"
},
{
"name": "CVE-2020-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3235"
},
{
"name": "CVE-2020-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3219"
},
{
"name": "CVE-2020-3230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3230"
},
{
"name": "CVE-2020-3209",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3209"
},
{
"name": "CVE-2020-3258",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3258"
},
{
"name": "CVE-2020-3199",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3199"
},
{
"name": "CVE-2020-3227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3227"
},
{
"name": "CVE-2020-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3203"
},
{
"name": "CVE-2020-3210",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3210"
},
{
"name": "CVE-2020-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3198"
},
{
"name": "CVE-2020-3225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3225"
},
{
"name": "CVE-2020-3224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3224"
},
{
"name": "CVE-2020-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3238"
},
{
"name": "CVE-2020-3221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3221"
}
],
"initial_release_date": "2020-06-04T00:00:00",
"last_revision_date": "2020-06-05T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-340",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-06-04T00:00:00.000000"
},
{
"description": "Correction de la date de certains avis.",
"revision_date": "2020-06-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-vds-cmd-inj-VfJtqGhE du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cmd-inj-VfJtqGhE"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-digsig-bypass-FYQ3bmVq du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-digsig-bypass-FYQ3bmVq"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-udp-vds-inj-f2D5Jzrt"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-vds-cred-uPMp9zbY du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-vds-cred-uPMp9zbY"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-fnfv9-dos-HND6Fc9u du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-fnfv9-dos-HND6Fc9u"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-sip-Cv28sQw2 du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sip-Cv28sQw2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-webui-cmdinj-zM283Zdw du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-cmdinj-zM283Zdw"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ioxPE-KgGvCAf9 du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ioxPE-KgGvCAf9"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-web-cmdinj2-fOnjk2LD du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj2-fOnjk2LD"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-caf-3dXM8exv du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-caf-3dXM8exv"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-snmp-dos-USxSyTk5 du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-USxSyTk5"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ngwc-cmdinj-KEwWVWR du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ngwc-cmdinj-KEwWVWR"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-webui-rce-uk8BXcUD du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-webui-rce-uk8BXcUD"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cipdos-hkfTZXEx du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-web-cmdinj4-S2TmH7GA du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj4-S2TmH7GA"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-onepk-rce-6Hhyt4dC"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-webui-PZgQxjfG du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-PZgQxjfG"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-iosxe-ewlc-dos-TkuPVmZN du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewlc-dos-TkuPVmZN"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-web-cmdinj3-44st5CcA du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-web-cmdinj3-44st5CcA"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-gos-vuln-s9qS8kYL du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-gos-vuln-s9qS8kYL"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ssh-dos-Un22sd2A du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ssh-dos-Un22sd2A"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ikev2-9p23Jj2a du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ikev2-9p23Jj2a"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-iot-rce-xYRSeMNH du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-iot-rce-xYRSeMNH"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-ios-ir800-img-verif-wHhLYHjK du 03 juin 2020",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-ir800-img-verif-wHhLYHjK"
}
]
}
var-202006-1092
Vulnerability from variot
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco IOS and IOS XE The software contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202006-1092",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(58\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(52\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jk"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnd1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ey3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd17"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jb"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnd"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)ey2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.1xo"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.0xo"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnp1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jk1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn14"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnb1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jj"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnb4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.5be"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)ea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.5f"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnp"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf8"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn15"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e5b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)ea2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jbb1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpd"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ec2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpc3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ey2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnc4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc14"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)ea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(7\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpb"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2b\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jj1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)eb2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.10.3e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5a\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jh1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(60\\)ez16"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd16"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se13"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.9e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jbb6a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ji3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jbb4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e5a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(52\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jax2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1d"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf99"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg11a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e7b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(7\\)e0b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jaa"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnb6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ec1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jbb8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)eb"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ji4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e0c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.10e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jax"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jk99"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(7a\\)e0b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpc2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1w"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ji5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ey1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnc3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jk2a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e2c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jk1t"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnc"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnb3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jaa1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(7b\\)e0b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnc2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jbb6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf5"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)eb"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e1s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se10a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpc5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e0a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnd3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpc"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jbb2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jbb5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnp3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnb2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.2xo"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ek1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1g"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e2a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jf2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)eb1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja1n"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)jaz1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd14"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(7\\)e0s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn11"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.3.9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e2b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.6.7a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(58\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.4c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jk3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpj"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se13a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jbb"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(1\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpi"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpi3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnb"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpc99"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jh"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)ey1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ji1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)ex1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se13a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)je"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnc1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpb1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)jaz"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(58\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)ea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.1e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1t"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)ja11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)se2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.10.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ek"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jax1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnb5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)ea3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jnd2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jc9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jn2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se6"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.11.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jd2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.3\\(3\\)jpc1"
},
{
"model": "ios",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "ios xe",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"db": "NVD",
"id": "CVE-2020-3225"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cisco:ios",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
}
]
},
"cve": "CVE-2020-3225",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2020-3225",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.1,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2020-006135",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-181350",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-3225",
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "ykramarz@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-3225",
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.6,
"baseSeverity": "High",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2020-006135",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2020-3225",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2020-3225",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-006135",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-202006-312",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-181350",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-3225",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-181350"
},
{
"db": "VULMON",
"id": "CVE-2020-3225"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-312"
},
{
"db": "NVD",
"id": "CVE-2020-3225"
},
{
"db": "NVD",
"id": "CVE-2020-3225"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco IOS and IOS XE The software contains an input verification vulnerability.Service operation interruption (DoS) It may be put into a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-3225"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"db": "VULHUB",
"id": "VHN-181350"
},
{
"db": "VULMON",
"id": "CVE-2020-3225"
}
],
"trust": 1.8
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-3225",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006135",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202006-312",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "47284",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2020.1940",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-181350",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-3225",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-181350"
},
{
"db": "VULMON",
"id": "CVE-2020-3225"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-312"
},
{
"db": "NVD",
"id": "CVE-2020-3225"
}
]
},
"id": "VAR-202006-1092",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-181350"
}
],
"trust": 0.01
},
"last_update_date": "2024-11-23T23:11:24.531000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-cipdos-hkfTZXEx",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx"
},
{
"title": "Cisco IOS and IOS XE Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=120219"
},
{
"title": "Cisco: Cisco IOS and IOS XE Software Common Industrial Protocol Denial of Service Vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-cipdos-hkfTZXEx"
},
{
"title": "CVE-2020-3225",
"trust": 0.1,
"url": "https://github.com/AlAIAL90/CVE-2020-3225 "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2020-3225"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-312"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-181350"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"db": "NVD",
"id": "CVE-2020-3225"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-cipdos-hkftzxex"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-3225"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-3225"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/cisco-ios-ios-xe-denial-of-service-via-cip-32412"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/47284"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.1940/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/20.html"
},
{
"trust": 0.1,
"url": "https://github.com/alaial90/cve-2020-3225"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-181350"
},
{
"db": "VULMON",
"id": "CVE-2020-3225"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-312"
},
{
"db": "NVD",
"id": "CVE-2020-3225"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-181350"
},
{
"db": "VULMON",
"id": "CVE-2020-3225"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"db": "CNNVD",
"id": "CNNVD-202006-312"
},
{
"db": "NVD",
"id": "CVE-2020-3225"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-06-03T00:00:00",
"db": "VULHUB",
"id": "VHN-181350"
},
{
"date": "2020-06-03T00:00:00",
"db": "VULMON",
"id": "CVE-2020-3225"
},
{
"date": "2020-07-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"date": "2020-06-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202006-312"
},
{
"date": "2020-06-03T18:15:20.543000",
"db": "NVD",
"id": "CVE-2020-3225"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-09-17T00:00:00",
"db": "VULHUB",
"id": "VHN-181350"
},
{
"date": "2021-09-17T00:00:00",
"db": "VULMON",
"id": "CVE-2020-3225"
},
{
"date": "2020-07-01T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2020-006135"
},
{
"date": "2020-07-28T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202006-312"
},
{
"date": "2024-11-21T05:30:36.133000",
"db": "NVD",
"id": "CVE-2020-3225"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202006-312"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco IOS and IOS XE Input verification vulnerabilities in software",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-006135"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202006-312"
}
],
"trust": 0.6
}
}
cnvd-2020-31975
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx
| Name | ['Cisco IOS Software', 'Cisco IOS XE Software'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2020-3225"
}
},
"description": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nCisco IOS Software\u548cCisco IOS XE Software\u4e2d\u7684CIP\u529f\u80fd\u5b9e\u73b0\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u5904\u7406\u8f93\u5165\u7684CIP\u6d41\u91cf\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u7279\u5236\u7684CIP\u6d41\u91cf\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u8bbe\u5907\u91cd\u8f7d\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-31975",
"openTime": "2020-06-09",
"patchDescription": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS Software\u548cCisco IOS XE Software\u4e2d\u7684CIP\u529f\u80fd\u5b9e\u73b0\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u5145\u5206\u5904\u7406\u8f93\u5165\u7684CIP\u6d41\u91cf\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u7279\u5236\u7684CIP\u6d41\u91cf\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u8bbe\u5907\u91cd\u8f7d\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco IOS\u548cIOS XE\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2020-31975\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco IOS Software",
"Cisco IOS XE Software"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-3225",
"serverity": "\u9ad8",
"submitTime": "2020-06-04",
"title": "Cisco IOS\u548cIOS XE\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2020-31975\uff09"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.