gsd-2017-6663
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. More Information: CSCvd88936. Known Affected Releases: Denali-16.2.1 Denali-16.3.1.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2017-6663",
    "description": "A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. More Information: CSCvd88936. Known Affected Releases: Denali-16.2.1 Denali-16.3.1.",
    "id": "GSD-2017-6663"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2017-6663"
      ],
      "details": "A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. More Information: CSCvd88936. Known Affected Releases: Denali-16.2.1 Denali-16.3.1.",
      "id": "GSD-2017-6663",
      "modified": "2023-12-13T01:21:10.174487Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cisa.gov": {
      "cveID": "CVE-2017-6663",
      "dateAdded": "2022-03-03",
      "dueDate": "2022-03-24",
      "product": "IOS and IOS XE Software",
      "requiredAction": "Apply updates per vendor instructions.",
      "shortDescription": "A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in denial-of-service (DoS).",
      "vendorProject": "Cisco",
      "vulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software Denial-of-Service Vulnerability"
    },
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "psirt@cisco.com",
        "ID": "CVE-2017-6663",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Cisco IOS and IOS XE",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "Cisco IOS and IOS XE"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. More Information: CSCvd88936. Known Affected Releases: Denali-16.2.1 Denali-16.3.1."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "Denial of Service Vulnerability"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "1038999",
            "refsource": "SECTRACK",
            "url": "http://www.securitytracker.com/id/1038999"
          },
          {
            "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos",
            "refsource": "CONFIRM",
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos"
          },
          {
            "name": "99973",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/99973"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "cisaActionDue": "2022-03-24",
        "cisaExploitAdd": "2022-03-03",
        "cisaRequiredAction": "Apply updates per vendor instructions.",
        "cisaVulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software Denial-of-Service Vulnerability",
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3EE651A7-D75C-4641-9AD3-C3FDB1B96792",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BA06788C-E529-4024-9565-EAF5D90D68C0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4FD5D14D-A9F8-4323-A67B-FF983900D99D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e6:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BD5C39A9-F4FC-4190-9AE3-3D3FC34CF0FF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6FD15D65-9471-4755-9EDB-04ECF34DFD8B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3A2EB46D-16E0-4C31-8634-C33D70B5381A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AB84CE04-F2D0-4A37-B2BA-25126D1824D8",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E32C83FA-EBE9-4A84-B34A-25BBA4D47E3F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s1a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8957EB38-37CF-47FA-853D-7A1AA6079874",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "63ACFACC-23B7-4EAC-BDC0-E3C403642D88",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0F3A95D5-157D-4335-87B4-8DA080A496FF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5E613BC4-AC20-4E43-8FB3-2EE9F0A2610D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8D54B325-22D5-4F21-BE28-BE28F6135FBF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s6:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0444FAA1-6613-45DF-93E2-B19DF8FE157C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0BAA5367-F81E-425A-A93C-B9220D1BB37A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2B1ED4F8-3B6C-452D-A3D0-D2F1A24AF994",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s8a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FAF32BC7-57DF-4BF0-BF97-69E97CC048CA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s9:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B3836108-E847-4BB6-BFFE-7C81E9D94A10",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)s10:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D38466E0-40AC-45C6-9C14-1BE309B079CD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "237D305E-016D-4E84-827C-44D04E3E0999",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E993A32E-D2AF-4519-B4C9-7F576649D20F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7260A66D-D477-440E-9A87-C05F9BD9E67C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "31059ED1-4D82-43D7-8EF7-042125289CF1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3B813F19-1B37-48F4-99EC-05E0CAA861FD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4151B2B1-B17F-4F1D-A211-34C7DB84E442",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "37B550C9-B2E4-44EE-8E0B-54D150C69A0F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BEBBA614-74E7-43C7-8D33-ADF4BD79D477",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A7A852A3-7CAC-4D35-A583-556D17A0F7E5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DBF5D54D-4403-4C5E-AA65-9FD8661E283B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C63FF7C4-D9CE-4D6C-B36E-0C0DC06F453E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D4408CD8-DC1D-4102-924B-E9E28FC5CECF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C2A39749-3A95-41B6-850B-4D388E6242B0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "67B663F9-DBF4-4EEE-836D-C83BF99A682A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "55E780F3-D378-4201-AC69-79C356EE9CE5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "28FE5158-FA37-476B-8289-11733BB9AFF3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s5a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E5F13E87-E45B-462A-8334-78C8245D6464",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6:*:*:*:*:*:*:*",
                    "matchCriteriaId": "24AE7F08-FB39-4E35-81AD-0186F2A539D7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "447FAF3B-8E93-4A2C-A8B1-1A2F7D958754",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s6b:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5BC40192-6A93-423C-8907-60CC39077668",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7:*:*:*:*:*:*:*",
                    "matchCriteriaId": "08E2628F-456D-4471-A914-D92157725CB2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s7a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B9359056-42C8-4031-9E5A-433DFB3DF482",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)s8:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CCA37E61-7EA5-45F3-87F6-432B591A79BB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9613EE90-A90A-4817-A5A1-F78A9F3BA571",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "87A96A92-02E7-440C-9E46-0FBE8CE75E44",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "03F1AEF3-08BD-4CC0-A36A-D26D550853E0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8DD9FF45-C8C2-42E2-B329-48C037A10521",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "36CBB93A-A8C8-477E-B530-B0058C3D15B7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3A259566-AA04-4DE8-900D-865384E56C8E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6CF70F3C-FAC8-4691-AF95-1B5B828A9D41",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AF08E7CE-DE01-43B2-A9F0-1CE657E79260",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BC500D08-0DE1-4AA8-AE97-0CF17A706430",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E86EA2EC-7FEA-4AE8-8CE0-45CA3C21B943",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1194A7BD-CB51-42CD-96E6-9ACF126DD8CA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s0a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CB52603C-CED4-4330-BB53-DDDFEA83882A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F40A87C1-5EDB-4B50-84CF-729F5037E870",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E3BFDBE4-7AD9-418F-8DA5-F97BB37E46BD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "42C9B84C-F9DC-4F9E-82F2-04004D539C36",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9E1AA87D-33F3-4153-BD59-331E9AD82623",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s2b:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2FA64C4F-8D3E-43AE-BD13-70D5E10205A2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5E246B9E-F93F-4BB2-9BA4-438FCC4A711B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s3a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "047B501B-FBEC-445B-9CC8-A3B83EBF5925",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DE884ADE-FD51-4F10-89A8-D871E7407C83",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E9EBAF71-E476-44F2-8D3E-1D0989F95A19",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4b:*:*:*:*:*:*:*",
                    "matchCriteriaId": "43C68169-0271-4C6C-975B-32112B04AB11",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s4d:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BFE308E0-89DA-4BE8-BF81-6D802D7B1B04",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C84498B4-7002-44D1-B2B7-B43F3081D258",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0F61B07A-7933-476F-951A-AD0019D2443D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "41939712-5075-4924-ABF2-467430B37197",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s1a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "55064D6F-6E4F-4F04-BC19-E6D4110D89EF",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E7CBC8C7-E3B2-4659-9B47-C0F16817F46A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3DC59C3E-A2A4-4A1A-B561-E411D7DE85E7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "945363EE-FE7A-44ED-A4A0-942A1F9B2702",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "679DCA8C-F64B-4716-BCC9-9C461A89CB29",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "700D0D31-138B-4F9A-8C76-3AF8B9D2C59C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s0a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CE18163D-C81F-49DC-996F-DE340C623539",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B843CEE5-4D53-414D-95C7-4BA515818E87",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1BB5DABC-4DAF-4696-A8AE-D4B6B188B9EB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "72480900-6E08-425F-965D-143B348E374A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)s4:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1EBA0926-E790-4B1C-A549-5B7D2F040E5A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sn:*:*:*:*:*:*:*",
                    "matchCriteriaId": "12D439A6-E8A8-4389-A7C8-2F4BCB7C3854",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4E903D9F-530D-4597-ABA9-4C1CFB79814B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9AE10B51-53FB-4F30-BAA0-0BD92C3D5C88",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1b:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BD5600F2-BE56-480F-B9BC-256960878B87",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp1c:*:*:*:*:*:*:*",
                    "matchCriteriaId": "06E8589D-1F50-4CE8-BF95-1134F0BBF21D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5060BAEA-DF8F-4B85-84F5-1410FD45C733",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D1F03EF8-1276-4193-8901-228148E76042",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CB56857D-029C-4DA8-B439-F1B89EA32074",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
                    "matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5609B342-D98E-4850-A0FE-810699A80A1F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2a:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1A1887D9-E339-4DC6-BE24-A5FF15438B2F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8AB2645F-C3BF-458F-9D07-6D66E1953730",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9C8A00BF-4522-467B-A96E-5C33623DCA2D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0ex:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DC33B0BB-BB47-42AD-9EA4-6B4D63C34E71",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3598539F-0EEB-45D6-8BA5-A2A3F69D556C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A7DA3731-E719-4DB7-9783-1C00481141EB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.3s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "09A930B7-7B9B-426E-A296-9F29F4A03F5B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.4s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "309952D7-B220-4678-A16D-AA5FF005F782",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "278ACF0A-949B-486D-8F6C-ADC2AF25FC17",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "37A30BA4-D760-4321-AAC8-04093AAAEA3E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "42616EA2-DDCF-4B57-BF2A-37968C82DDC6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "09F35F75-75E8-4A20-94C4-5908E404C8CB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9C01C1D8-A191-45B7-A6C5-EE225F05A49E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "16D7ACF1-6A30-4D6E-AA69-D2F365E2791C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7E50FF89-8E71-4EA0-9AEC-2F800ED9D995",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7E70C455-E41C-4B17-847A-5F4281139252",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3DD0A60B-6848-4B9A-B11D-2C2952D2D48C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "64A07329-3A7D-4483-AE69-4786FEB23D92",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F84E4463-DB0F-4B06-B403-B3606B386F02",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.7as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BAE50185-23ED-4640-9037-E45810793C85",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B9247665-BBE7-4DEF-B97B-4981A0EA5CE4",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E61E0102-B9B6-41F4-9041-0A5F144D849A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2A076E1F-3457-410A-8AB6-64416ECB20A7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FAD93CD1-4188-40B7-A20E-9C3FE8344A27",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2972E680-5A19-4858-9B35-0B959ED319A3",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F1BFE916-916F-4936-A331-21A0E8193920",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D0EC9A19-26E6-4E69-B4E7-852CB6327EAD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5C5484A4-D116-4B79-8369-47979E20AACA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
                    "matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
                    "matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
                    "matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. More Information: CSCvd88936. Known Affected Releases: Denali-16.2.1 Denali-16.3.1."
          },
          {
            "lang": "es",
            "value": "Una vulnerabilidad en la caracter\u00edstica Autonomic Networking de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante no autenticado y en redes adyacentes provoque que los nodos auton\u00f3micos de un sistema afectado se vuelvan a cargar, lo que resultar\u00eda en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). M\u00e1s informaci\u00f3n: CSCvd88936. Lanzamientos afectados conocidos: Denali-16.2.1 Denali-16.3.1."
          }
        ],
        "id": "CVE-2017-6663",
        "lastModified": "2024-03-04T22:59:19.157",
        "metrics": {
          "cvssMetricV2": [
            {
              "acInsufInfo": false,
              "baseSeverity": "MEDIUM",
              "cvssData": {
                "accessComplexity": "LOW",
                "accessVector": "ADJACENT_NETWORK",
                "authentication": "NONE",
                "availabilityImpact": "COMPLETE",
                "baseScore": 6.1,
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
                "version": "2.0"
              },
              "exploitabilityScore": 6.5,
              "impactScore": 6.9,
              "obtainAllPrivilege": false,
              "obtainOtherPrivilege": false,
              "obtainUserPrivilege": false,
              "source": "nvd@nist.gov",
              "type": "Primary",
              "userInteractionRequired": false
            }
          ],
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "ADJACENT_NETWORK",
                "availabilityImpact": "HIGH",
                "baseScore": 6.5,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "NONE",
                "integrityImpact": "NONE",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 2.8,
              "impactScore": 3.6,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2017-08-07T06:29:00.230",
        "references": [
          {
            "source": "ykramarz@cisco.com",
            "tags": [
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "http://www.securityfocus.com/bid/99973"
          },
          {
            "source": "ykramarz@cisco.com",
            "tags": [
              "Third Party Advisory",
              "VDB Entry"
            ],
            "url": "http://www.securitytracker.com/id/1038999"
          },
          {
            "source": "ykramarz@cisco.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos"
          }
        ],
        "sourceIdentifier": "ykramarz@cisco.com",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "NVD-CWE-noinfo"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.