fkie_cve-2009-0637
Vulnerability from fkie_nvd
Published
2009-03-27 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
The SCP server in Cisco IOS 12.2 through 12.4, when Role-Based CLI Access is enabled, does not enforce the CLI view configuration for file transfers, which allows remote authenticated users with an attached CLI view to (1) read or (2) overwrite arbitrary files via an SCP command.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.2 | |
| cisco | ios | 12.2b | |
| cisco | ios | 12.2bc | |
| cisco | ios | 12.2bw | |
| cisco | ios | 12.2bx | |
| cisco | ios | 12.2by | |
| cisco | ios | 12.2bz | |
| cisco | ios | 12.2ca | |
| cisco | ios | 12.2cx | |
| cisco | ios | 12.2cy | |
| cisco | ios | 12.2cz | |
| cisco | ios | 12.2da | |
| cisco | ios | 12.2dd | |
| cisco | ios | 12.2dx | |
| cisco | ios | 12.2ew | |
| cisco | ios | 12.2ewa | |
| cisco | ios | 12.2ex | |
| cisco | ios | 12.2ey | |
| cisco | ios | 12.2ez | |
| cisco | ios | 12.2fx | |
| cisco | ios | 12.2fy | |
| cisco | ios | 12.2fz | |
| cisco | ios | 12.2irb | |
| cisco | ios | 12.2ixa | |
| cisco | ios | 12.2ixb | |
| cisco | ios | 12.2ixc | |
| cisco | ios | 12.2ixd | |
| cisco | ios | 12.2ixe | |
| cisco | ios | 12.2ixf | |
| cisco | ios | 12.2ixg | |
| cisco | ios | 12.2ja | |
| cisco | ios | 12.2jk | |
| cisco | ios | 12.2l | |
| cisco | ios | 12.2mb | |
| cisco | ios | 12.2mc | |
| cisco | ios | 12.2rc | |
| cisco | ios | 12.2s | |
| cisco | ios | 12.2sb | |
| cisco | ios | 12.2sbc | |
| cisco | ios | 12.2sca | |
| cisco | ios | 12.2sga | |
| cisco | ios | 12.2sm | |
| cisco | ios | 12.2so | |
| cisco | ios | 12.2sr | |
| cisco | ios | 12.2sra | |
| cisco | ios | 12.2srb | |
| cisco | ios | 12.2src | |
| cisco | ios | 12.2su | |
| cisco | ios | 12.2sv | |
| cisco | ios | 12.2sva | |
| cisco | ios | 12.2svc | |
| cisco | ios | 12.2svd | |
| cisco | ios | 12.2sve | |
| cisco | ios | 12.2sw | |
| cisco | ios | 12.2sx | |
| cisco | ios | 12.2sxa | |
| cisco | ios | 12.2sxb | |
| cisco | ios | 12.2sxd | |
| cisco | ios | 12.2sxe | |
| cisco | ios | 12.2sxf | |
| cisco | ios | 12.2sy | |
| cisco | ios | 12.2sz | |
| cisco | ios | 12.2t | |
| cisco | ios | 12.2tpc | |
| cisco | ios | 12.2xa | |
| cisco | ios | 12.2xb | |
| cisco | ios | 12.2xc | |
| cisco | ios | 12.2xd | |
| cisco | ios | 12.2xe | |
| cisco | ios | 12.2xf | |
| cisco | ios | 12.2xg | |
| cisco | ios | 12.2xh | |
| cisco | ios | 12.2xi | |
| cisco | ios | 12.2xj | |
| cisco | ios | 12.2xk | |
| cisco | ios | 12.2xl | |
| cisco | ios | 12.2xm | |
| cisco | ios | 12.2xn | |
| cisco | ios | 12.2xo | |
| cisco | ios | 12.2xq | |
| cisco | ios | 12.2xr | |
| cisco | ios | 12.2xs | |
| cisco | ios | 12.2xt | |
| cisco | ios | 12.2xu | |
| cisco | ios | 12.2xv | |
| cisco | ios | 12.2xw | |
| cisco | ios | 12.2ya | |
| cisco | ios | 12.2yb | |
| cisco | ios | 12.2yc | |
| cisco | ios | 12.2yd | |
| cisco | ios | 12.2ye | |
| cisco | ios | 12.2yf | |
| cisco | ios | 12.2yg | |
| cisco | ios | 12.2yh | |
| cisco | ios | 12.2yj | |
| cisco | ios | 12.2yk | |
| cisco | ios | 12.2yl | |
| cisco | ios | 12.2ym | |
| cisco | ios | 12.2yn | |
| cisco | ios | 12.2yo | |
| cisco | ios | 12.2yp | |
| cisco | ios | 12.2yq | |
| cisco | ios | 12.2yr | |
| cisco | ios | 12.2ys | |
| cisco | ios | 12.2yt | |
| cisco | ios | 12.2yu | |
| cisco | ios | 12.2yv | |
| cisco | ios | 12.2yw | |
| cisco | ios | 12.2yx | |
| cisco | ios | 12.2yy | |
| cisco | ios | 12.2yz | |
| cisco | ios | 12.2za | |
| cisco | ios | 12.2zb | |
| cisco | ios | 12.2zc | |
| cisco | ios | 12.2zd | |
| cisco | ios | 12.2ze | |
| cisco | ios | 12.2zf | |
| cisco | ios | 12.2zg | |
| cisco | ios | 12.2zh | |
| cisco | ios | 12.2zj | |
| cisco | ios | 12.2zl | |
| cisco | ios | 12.2zp | |
| cisco | ios | 12.2zu | |
| cisco | ios | 12.2zx | |
| cisco | ios | 12.2zy | |
| cisco | ios | 12.2zya | |
| cisco | ios | 12.4 | |
| cisco | ios | 12.4\(1\) | |
| cisco | ios | 12.4\(1b\) | |
| cisco | ios | 12.4\(1c\) | |
| cisco | ios | 12.4\(2\)mr | |
| cisco | ios | 12.4\(2\)mr1 | |
| cisco | ios | 12.4\(2\)t | |
| cisco | ios | 12.4\(2\)t1 | |
| cisco | ios | 12.4\(2\)t2 | |
| cisco | ios | 12.4\(2\)t3 | |
| cisco | ios | 12.4\(2\)t4 | |
| cisco | ios | 12.4\(2\)xa | |
| cisco | ios | 12.4\(2\)xb | |
| cisco | ios | 12.4\(2\)xb2 | |
| cisco | ios | 12.4\(3\) | |
| cisco | ios | 12.4\(3\)t2 | |
| cisco | ios | 12.4\(3a\) | |
| cisco | ios | 12.4\(3b\) | |
| cisco | ios | 12.4\(3d\) | |
| cisco | ios | 12.4\(4\)mr | |
| cisco | ios | 12.4\(4\)t | |
| cisco | ios | 12.4\(4\)t2 | |
| cisco | ios | 12.4\(5\) | |
| cisco | ios | 12.4\(5b\) | |
| cisco | ios | 12.4\(6\)t | |
| cisco | ios | 12.4\(6\)t1 | |
| cisco | ios | 12.4\(7\) | |
| cisco | ios | 12.4\(7a\) | |
| cisco | ios | 12.4\(8\) | |
| cisco | ios | 12.4\(9\)t | |
| cisco | ios | 12.4\(23\) | |
| cisco | ios | 12.4ja | |
| cisco | ios | 12.4jda | |
| cisco | ios | 12.4jk | |
| cisco | ios | 12.4jl | |
| cisco | ios | 12.4jma | |
| cisco | ios | 12.4jmb | |
| cisco | ios | 12.4jx | |
| cisco | ios | 12.4md | |
| cisco | ios | 12.4mr | |
| cisco | ios | 12.4s | |
| cisco | ios | 12.4sw | |
| cisco | ios | 12.4t | |
| cisco | ios | 12.4xa | |
| cisco | ios | 12.4xb | |
| cisco | ios | 12.4xc | |
| cisco | ios | 12.4xd | |
| cisco | ios | 12.4xe | |
| cisco | ios | 12.4xf | |
| cisco | ios | 12.4xg | |
| cisco | ios | 12.4xj | |
| cisco | ios | 12.4xk | |
| cisco | ios | 12.4xl | |
| cisco | ios | 12.4xm | |
| cisco | ios | 12.4xn | |
| cisco | ios | 12.4xp | |
| cisco | ios | 12.4xt | |
| cisco | ios | 12.4xv | |
| cisco | ios | 12.4xw | |
| cisco | ios | 12.4xy | |
| cisco | ios_xr | 12.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2b:*:*:*:*:*:*:*",
"matchCriteriaId": "E314B0F7-1A27-483E-B3B3-947A5561281F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2bc:*:*:*:*:*:*:*",
"matchCriteriaId": "A3EF2531-3E6B-4FDC-B96B-2BC3F8EAF39A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2bw:*:*:*:*:*:*:*",
"matchCriteriaId": "05B838C9-E60E-46A3-A5FB-4F67291D0851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2bx:*:*:*:*:*:*:*",
"matchCriteriaId": "2B29F111-CBA4-464D-8B25-C2677BA270EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2by:*:*:*:*:*:*:*",
"matchCriteriaId": "E96C76C5-52BA-45D9-9803-048E770BAA84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2bz:*:*:*:*:*:*:*",
"matchCriteriaId": "42EB3A6A-8B37-47E6-AA9B-1B13FC08F542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ca:*:*:*:*:*:*:*",
"matchCriteriaId": "22D57BED-1D99-4077-941C-E60BEA65324E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2cx:*:*:*:*:*:*:*",
"matchCriteriaId": "F4BA2D6E-FD22-4BFD-B8B4-D6542E173C72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2cy:*:*:*:*:*:*:*",
"matchCriteriaId": "78B9E2C6-0E23-4AC9-906F-28BBC15868DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2cz:*:*:*:*:*:*:*",
"matchCriteriaId": "B7F75542-F2C5-4CEB-B655-E0620408A3B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2da:*:*:*:*:*:*:*",
"matchCriteriaId": "7B7EA3DA-33B3-4480-B3B8-413745D6C5FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2dd:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC41749-91FC-43DB-A52F-AC3E3A2205C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2dx:*:*:*:*:*:*:*",
"matchCriteriaId": "EE0195AE-24FD-43B2-892B-F646B8B5ED6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ew:*:*:*:*:*:*:*",
"matchCriteriaId": "316924D4-10D4-4C98-AF05-DDE1D530A205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ewa:*:*:*:*:*:*:*",
"matchCriteriaId": "11866346-C29A-463D-A18F-528C23DD579E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*",
"matchCriteriaId": "0912492E-565A-4559-ABB8-D2898F06CF29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD6421A-D8C4-4A3E-9497-4AC130CFE597",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*",
"matchCriteriaId": "91F44EC8-13BF-4032-9EBA-0D50C6A353BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2fx:*:*:*:*:*:*:*",
"matchCriteriaId": "370EEE74-3DAA-4BB2-9192-66672229DC39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2fy:*:*:*:*:*:*:*",
"matchCriteriaId": "4CF74B28-CD95-4BC6-97D4-D529D30E1509",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2fz:*:*:*:*:*:*:*",
"matchCriteriaId": "F2EB679F-FA51-47A1-BB3E-97AB517AFBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2irb:*:*:*:*:*:*:*",
"matchCriteriaId": "7B88D71E-C9CB-44D7-AB06-49CFF1117DA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixa:*:*:*:*:*:*:*",
"matchCriteriaId": "DEDCF5A7-14E5-4E0C-88AD-7F891B5EFC66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixb:*:*:*:*:*:*:*",
"matchCriteriaId": "F7111CAE-9279-49DA-B05A-046BB3EFA85F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixc:*:*:*:*:*:*:*",
"matchCriteriaId": "A4203A9F-BBC3-4BF2-B915-C3BF2EB73EAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixd:*:*:*:*:*:*:*",
"matchCriteriaId": "E186AB2F-8C5B-45E0-9194-BF66DA64F772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixe:*:*:*:*:*:*:*",
"matchCriteriaId": "D32DCDA3-76B6-423C-9AF1-B65F19077909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixf:*:*:*:*:*:*:*",
"matchCriteriaId": "BCCE26DD-FE65-4041-AB4D-9C7A16EE175C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ixg:*:*:*:*:*:*:*",
"matchCriteriaId": "FE88965B-D148-43EB-9FC6-2EF5E5C917FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ja:*:*:*:*:*:*:*",
"matchCriteriaId": "B98E703A-717D-4997-AFBC-CAE4B644025D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2jk:*:*:*:*:*:*:*",
"matchCriteriaId": "01A0A03A-5BFE-4A15-A983-B3EB8EE6B25A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2l:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEFEFF0-65E0-4F68-8C9E-03DAC585CA5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2mb:*:*:*:*:*:*:*",
"matchCriteriaId": "6B27825D-099A-4733-8D3F-8EF2B050E5B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2mc:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A63E2B-8C1B-4EF7-BCDD-BBF3EC2C7113",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2rc:*:*:*:*:*:*:*",
"matchCriteriaId": "A4577947-7960-4627-9A74-9C3BB6477DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2s:*:*:*:*:*:*:*",
"matchCriteriaId": "2D035A35-D53E-4C49-B4E4-F40B85866F27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sb:*:*:*:*:*:*:*",
"matchCriteriaId": "ADBDC6C0-961B-441D-8C34-AACE0902057E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sbc:*:*:*:*:*:*:*",
"matchCriteriaId": "F1579A2D-955F-4CC6-9F94-9D40C669D903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sca:*:*:*:*:*:*:*",
"matchCriteriaId": "140C7C99-1B50-431C-B55C-DFF308E7ECF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sga:*:*:*:*:*:*:*",
"matchCriteriaId": "43E166F3-931A-4997-B7B2-F2AD19C6F209",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sm:*:*:*:*:*:*:*",
"matchCriteriaId": "9A70BEC7-8A69-44B2-9DDA-DFC1A13EB7B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2so:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1A9400-571E-4955-AB84-C49A4255A5B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sr:*:*:*:*:*:*:*",
"matchCriteriaId": "BDE7C923-7CBB-4990-905B-9DD9D7D5946A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sra:*:*:*:*:*:*:*",
"matchCriteriaId": "A892B3F0-5A31-4086-8AB5-F06E68588EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2srb:*:*:*:*:*:*:*",
"matchCriteriaId": "D8E6BB50-7C0C-4E31-8DB0-40E145C8D9CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0DA930-86CE-4D17-BD41-9C4E47D8088F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2su:*:*:*:*:*:*:*",
"matchCriteriaId": "FC70491B-F701-4D33-A314-C686469DBD2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sv:*:*:*:*:*:*:*",
"matchCriteriaId": "198C24E9-6D45-44FD-B502-D14ACDA99EDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sva:*:*:*:*:*:*:*",
"matchCriteriaId": "E768F600-19DC-46A5-BDED-3C2497530CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2svc:*:*:*:*:*:*:*",
"matchCriteriaId": "16EF97B1-5150-4E88-B011-DB8F0AAFA9CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2svd:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC263E7-BA6A-41CB-8248-5DDB4404D9BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sve:*:*:*:*:*:*:*",
"matchCriteriaId": "544835A2-3AB0-4313-A731-54B1123F7498",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sw:*:*:*:*:*:*:*",
"matchCriteriaId": "5DEF14D5-1327-4012-913F-DA0E12C4E953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sx:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE0B5B8-DEB1-4021-B854-177C0D9FD73A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxa:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A672BD-87AE-424D-8735-073BBE9CE164",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxb:*:*:*:*:*:*:*",
"matchCriteriaId": "95C033E3-184B-4AC1-B10D-8318FEAF73FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxd:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1DDD7C-7921-45D3-81F7-4D9A407CBB5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxe:*:*:*:*:*:*:*",
"matchCriteriaId": "5A68D177-B028-4025-BD7B-82ACDB2D1E21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sxf:*:*:*:*:*:*:*",
"matchCriteriaId": "485ACF9E-1305-4D71-A766-5BE1D748AAA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sy:*:*:*:*:*:*:*",
"matchCriteriaId": "09458CD7-D430-4957-8506-FAB2A3E2AA65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2sz:*:*:*:*:*:*:*",
"matchCriteriaId": "6E709D6B-61DB-4905-B539-B8488D7E2DC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
"matchCriteriaId": "84900BB3-B49F-448A-9E04-FE423FBCCC4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2tpc:*:*:*:*:*:*:*",
"matchCriteriaId": "F6C1C831-556D-4634-AA24-6D64943ED275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
"matchCriteriaId": "EAC6758B-C6EE-45CB-AC2D-28C4AE709DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xb:*:*:*:*:*:*:*",
"matchCriteriaId": "075CD42D-070A-49BA-90D9-E7925BB41A38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xc:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB9967A-1EBD-4BE0-8651-1C7D42B2BF4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB8E66C-A16F-4CC5-9FDF-AE274FF035EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
"matchCriteriaId": "746DDC61-3981-4E93-A7EE-C120E0265485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xf:*:*:*:*:*:*:*",
"matchCriteriaId": "FCC88CC5-CF58-48A3-AFB6-FD38E5F40845",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xg:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF2C6C2-58E8-4EA6-84FB-4D11F31490A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
"matchCriteriaId": "4628FDA0-4260-4493-92C9-4574E5EC06A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xi:*:*:*:*:*:*:*",
"matchCriteriaId": "F9FA064A-6E1A-4415-84D4-1A33FF667011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xj:*:*:*:*:*:*:*",
"matchCriteriaId": "EE896909-F8C3-4723-B5E7-9FB5FA2B73B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xk:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9CDCE5-F6D3-4FA3-ADA0-EED2517FF7EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xl:*:*:*:*:*:*:*",
"matchCriteriaId": "7E03EE34-C398-43B4-A529-BE7BAFA4B3C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xm:*:*:*:*:*:*:*",
"matchCriteriaId": "21147732-FA22-4728-B5F2-D115B78A8EDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xn:*:*:*:*:*:*:*",
"matchCriteriaId": "4D717498-4DF9-4D15-A25B-D777FF460E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xo:*:*:*:*:*:*:*",
"matchCriteriaId": "1EE03B1E-1522-4143-A019-B19E1F605A4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*",
"matchCriteriaId": "4B40548F-3914-4227-9E4C-F1B34071C069",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xr:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C23EC9-C1C6-4F73-9FF5-24A5B97B8D91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xs:*:*:*:*:*:*:*",
"matchCriteriaId": "ECE49281-0571-49F7-95FF-68B1ACA07537",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xt:*:*:*:*:*:*:*",
"matchCriteriaId": "9B09B72E-6862-4115-9A0B-574089A94289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xu:*:*:*:*:*:*:*",
"matchCriteriaId": "EC38B64C-E246-467F-A185-669497DEA839",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xv:*:*:*:*:*:*:*",
"matchCriteriaId": "FBB42063-9DB5-42DB-825A-53C6DBB51A57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2xw:*:*:*:*:*:*:*",
"matchCriteriaId": "6E5C90EE-A9C0-461C-9E89-732BFA9BD066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ya:*:*:*:*:*:*:*",
"matchCriteriaId": "E74B6350-C2F8-4786-8E32-2ED6C188A5E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yb:*:*:*:*:*:*:*",
"matchCriteriaId": "F8E26473-A8EF-44C5-B550-5E0B86D31291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yc:*:*:*:*:*:*:*",
"matchCriteriaId": "663FE3CE-FA09-46A2-9C0D-2797D9137A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yd:*:*:*:*:*:*:*",
"matchCriteriaId": "86309E93-F2C9-4334-9A1C-989EFDC99215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ye:*:*:*:*:*:*:*",
"matchCriteriaId": "761D49D6-0624-41CE-829E-49E7EA679EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yf:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFAF394-6E9A-4CD6-B8A6-5BDDE4EC8EC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yg:*:*:*:*:*:*:*",
"matchCriteriaId": "65318A70-40FF-4BE8-962B-DFCD5C476166",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yh:*:*:*:*:*:*:*",
"matchCriteriaId": "8B6DB954-EDC8-4A81-8C26-9D3DBC68FC67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yj:*:*:*:*:*:*:*",
"matchCriteriaId": "552C1E7A-2FFA-49BC-BF09-F0DE9B0C7502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yk:*:*:*:*:*:*:*",
"matchCriteriaId": "869CEAF7-59D6-4651-8D89-0244D6C430A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yl:*:*:*:*:*:*:*",
"matchCriteriaId": "059FBAA6-3127-4DF9-99AD-AA3A16317B6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ym:*:*:*:*:*:*:*",
"matchCriteriaId": "0E0E376F-64E1-4632-9A8E-11DC99FB245F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yn:*:*:*:*:*:*:*",
"matchCriteriaId": "BF440B52-C6AE-4608-BE71-01B354D37BEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yo:*:*:*:*:*:*:*",
"matchCriteriaId": "243BEF5E-F693-450E-B274-FD7CF34B6771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yp:*:*:*:*:*:*:*",
"matchCriteriaId": "E7918C59-1678-4F24-A7C2-68824D1B59A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yq:*:*:*:*:*:*:*",
"matchCriteriaId": "DE72804E-600D-47FA-B3BF-36BD3CF13A75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yr:*:*:*:*:*:*:*",
"matchCriteriaId": "DAD14B6D-CA11-41C1-9382-70CF1F5B4C8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ys:*:*:*:*:*:*:*",
"matchCriteriaId": "7F5B9BAF-59BA-4282-B387-489264D44429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yt:*:*:*:*:*:*:*",
"matchCriteriaId": "969A5BAA-19D5-4411-BABB-FE55DBA7C7D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yu:*:*:*:*:*:*:*",
"matchCriteriaId": "54B41182-7AA8-49D1-BAC3-EAF312E43553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yv:*:*:*:*:*:*:*",
"matchCriteriaId": "E11BBB83-147B-4FBF-B263-77FCCFB2D92D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yw:*:*:*:*:*:*:*",
"matchCriteriaId": "2E84677D-793D-44C5-80E9-FC29C3183278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yx:*:*:*:*:*:*:*",
"matchCriteriaId": "E70E5B1F-E72C-4DAB-B6FA-977EF04BFBDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yy:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFA2358-6B79-472D-9092-FF99DC3DF042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2yz:*:*:*:*:*:*:*",
"matchCriteriaId": "A3C26842-FF50-436F-8DB6-15A70082CD1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2za:*:*:*:*:*:*:*",
"matchCriteriaId": "62626BB6-D4EA-4A8A-ABC1-F86B37F19EDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zb:*:*:*:*:*:*:*",
"matchCriteriaId": "9384B48D-0F62-4042-BE8F-9A8F5FE9A3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zc:*:*:*:*:*:*:*",
"matchCriteriaId": "F4A31301-AAB0-4744-98B2-695D88798D9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zd:*:*:*:*:*:*:*",
"matchCriteriaId": "ECB4BA74-BE9F-43D5-9D0F-78F4F2BB19B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2ze:*:*:*:*:*:*:*",
"matchCriteriaId": "0CEB27CF-46B5-4780-964C-C31193614B74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zf:*:*:*:*:*:*:*",
"matchCriteriaId": "0F1094F9-7222-4DE0-A368-7421ABA66E3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zg:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7EA2BB-A52A-438C-8EB5-CD283CACBACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zh:*:*:*:*:*:*:*",
"matchCriteriaId": "574FFD6F-D56C-41DB-A978-E501BA3CA5D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zj:*:*:*:*:*:*:*",
"matchCriteriaId": "11790F38-3720-45CF-9FD4-A8E5867684D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zl:*:*:*:*:*:*:*",
"matchCriteriaId": "4AE2282B-6693-4E4B-8662-501EBC14CD9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zp:*:*:*:*:*:*:*",
"matchCriteriaId": "A925BA5C-AB2F-4B73-BA93-55664A319CAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zu:*:*:*:*:*:*:*",
"matchCriteriaId": "9AE02B7C-BC2D-433C-B0A8-E60EDD62538E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zx:*:*:*:*:*:*:*",
"matchCriteriaId": "F9663D24-0D1D-4F46-961F-9D37D3776E90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zy:*:*:*:*:*:*:*",
"matchCriteriaId": "E83649EC-61A5-4937-93F4-42D082023382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2zya:*:*:*:*:*:*:*",
"matchCriteriaId": "5D8830A0-E816-40C4-8743-A9E0994BA922",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4D8C72-E7BB-40BF-9AE5-622794D63E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1\\):*:*:*:*:*:*:*",
"matchCriteriaId": "65B65738-134F-4C1A-916B-D6CD6365CB43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5331586-8380-4F77-8735-17EC0D0E503A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "93024CE7-DBA3-4C25-B7D4-4D2DA6AB880D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5769F6-8C69-4AC7-A3E3-75D275B2AC3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr1:*:*:*:*:*:*:*",
"matchCriteriaId": "35536E91-A58D-40F7-A256-34128E64B920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "0F69329B-4D37-428E-B467-E3B9314A4D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "9615B275-5748-46CC-8A77-4A9550A39050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "421CD923-6282-4404-A642-C04E1F57F12F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD4411CB-5EE9-455C-AE90-1770320EFD86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "593D1680-4883-43FE-A925-B87ED1D2E785",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa:*:*:*:*:*:*:*",
"matchCriteriaId": "FADF72EC-43B4-4FC0-9BA0-7CC91D4745B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb:*:*:*:*:*:*:*",
"matchCriteriaId": "EBDB772E-F9A9-4EBA-958F-CDFCB2DA6BFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb2:*:*:*:*:*:*:*",
"matchCriteriaId": "90769378-BBD1-48D0-921C-A79413B99CE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6C6DF704-8CC8-42C3-83F1-4D38734DEAEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "E636DC68-59FE-4BA0-BCFC-4DA97EE17B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7E0D6801-E9A8-416B-830B-7682A9AF65BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E4B2F9E0-E5FF-42D7-8CEF-359FDDFB4059",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "23265E4D-855C-4CCC-A875-DFCBA55B3CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB86291-EB40-4CFD-A424-898EFB3D518B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "A10AADAC-4687-4308-8E4F-B7F9549556DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(4\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A747987-5218-4C1E-87C4-0675CD4F7A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7B6483CB-7838-45F7-AE28-824AD71172A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04759B1E-8B40-460F-B33F-4E6332CFC31D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "08AF3694-9686-444B-8D92-E41D262F74E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(6\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "C5595E7D-3CFD-4FF2-A6BE-59645058C54F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(7\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F4235428-5E2E-4BCB-98B7-8844B19C7AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(7a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9A1E17AB-F645-4636-9337-3158556E85A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(8\\):*:*:*:*:*:*:*",
"matchCriteriaId": "86150D11-94D7-43F9-9D19-33778558255F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(9\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "EDC43701-8A3A-42FB-B4F5-566DE59E542E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(23\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6A3B5CC3-A83E-4241-ACE1-0FFEE8A5EFE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4ja:*:*:*:*:*:*:*",
"matchCriteriaId": "4EB2B390-A39F-4082-BBCB-712BDD95886D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jda:*:*:*:*:*:*:*",
"matchCriteriaId": "5F782741-0F18-4FBC-9D00-AAABB8BC6A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jk:*:*:*:*:*:*:*",
"matchCriteriaId": "ACB11851-BCF8-485B-91F9-6A39B2354826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jl:*:*:*:*:*:*:*",
"matchCriteriaId": "65C61F77-6CDE-4CCA-B2DB-B76C6B5F8152",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jma:*:*:*:*:*:*:*",
"matchCriteriaId": "3DFE3FC0-79BC-4549-98BA-235A53719F82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jmb:*:*:*:*:*:*:*",
"matchCriteriaId": "4691CEAD-47F1-4A97-84A4-72B794D3F714",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4jx:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A28452-000C-4BBB-A34E-1AA63D69925D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4md:*:*:*:*:*:*:*",
"matchCriteriaId": "A2222EED-6CB2-4D18-8AF5-FAE55BC6213F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4mr:*:*:*:*:*:*:*",
"matchCriteriaId": "C7414D32-88A1-416E-A717-3F47B6D1BE74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "85A4F6A3-1806-489A-85CF-7CA107513336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4sw:*:*:*:*:*:*:*",
"matchCriteriaId": "370DC543-AC01-4B91-88C7-60C323E35929",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4t:*:*:*:*:*:*:*",
"matchCriteriaId": "BEAD7398-D1B2-47FB-952D-8C3162D5A363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xa:*:*:*:*:*:*:*",
"matchCriteriaId": "99235FFB-4439-40B2-ADBD-B08E5DBBCCB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xb:*:*:*:*:*:*:*",
"matchCriteriaId": "C1797E4E-E15C-4148-9B3D-4FF6D1D815AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xc:*:*:*:*:*:*:*",
"matchCriteriaId": "544BD924-2CBD-4130-BBD3-5AD084C85FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xd:*:*:*:*:*:*:*",
"matchCriteriaId": "6B78181E-E1D1-4C25-85DE-CA46BBF21765",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xe:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F36C3D-E9A2-41A1-BE71-4D8B00D228E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xf:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1CD80F-E898-41CE-8A86-28C2F48B928A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xg:*:*:*:*:*:*:*",
"matchCriteriaId": "9C3C3B97-7F1E-4B87-AD44-E4230BCDAB7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xj:*:*:*:*:*:*:*",
"matchCriteriaId": "BF610051-1638-4C1B-9864-11E34EFC4DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xk:*:*:*:*:*:*:*",
"matchCriteriaId": "78260223-50C0-48F8-9A65-AE67489E602C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xl:*:*:*:*:*:*:*",
"matchCriteriaId": "18E39462-4CEE-4C29-8B60-50E05FCF3E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xm:*:*:*:*:*:*:*",
"matchCriteriaId": "3FF16123-CCA0-4ECD-9B8C-AC1534C3F244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xn:*:*:*:*:*:*:*",
"matchCriteriaId": "CC7454AF-7610-4CD3-BD2B-95A6C3283811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xp:*:*:*:*:*:*:*",
"matchCriteriaId": "AB633E6C-025C-4B31-ABE7-8318C813376B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xt:*:*:*:*:*:*:*",
"matchCriteriaId": "DFED1FFB-899D-4A48-9CCA-0B8737AE1408",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xv:*:*:*:*:*:*:*",
"matchCriteriaId": "883FA166-2973-42BA-842D-28FBDBFEAC4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xw:*:*:*:*:*:*:*",
"matchCriteriaId": "4362045B-7065-4FF9-A977-B3DA7894F831",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4xy:*:*:*:*:*:*:*",
"matchCriteriaId": "BC27E79D-6B4B-4839-9664-DFE821C45C2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xr:12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0859B147-5D40-43FD-BA55-002DB292FDC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SCP server in Cisco IOS 12.2 through 12.4, when Role-Based CLI Access is enabled, does not enforce the CLI view configuration for file transfers, which allows remote authenticated users with an attached CLI view to (1) read or (2) overwrite arbitrary files via an SCP command."
},
{
"lang": "es",
"value": "El servidor SCP en Cisco IOS v12.2 hasta la versi\u00f3n v12.4, cuando se ha habilitado el acceso CLI basado en roles, no refuerza la configuraci\u00f3n de la visualizaci\u00f3n CLI para transferencias de ficheros, permitiendo a atacantes remotos autenticados con una vista CLI adjunta (1) leer o (2) sobreescribir ficheros de su elecci\u00f3n mediante un comando SCP."
}
],
"id": "CVE-2009-0637",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-03-27T16:30:02.127",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34438"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://securitytracker.com/id?1021899"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c8.shtml"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/34247"
},
{
"source": "psirt@cisco.com",
"tags": [
"Not Applicable"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49423"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/34438"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://securitytracker.com/id?1021899"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a90469.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cisco.com/en/US/products/products_security_advisory09186a0080a904c8.shtml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/34247"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "http://www.vupen.com/english/advisories/2009/0851"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49423"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…