{"id": "CVE-2018-5391", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2018-09-06T21:29:00.363", "references": [{"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en", "tags": ["Broken Link"], "source": "cret@cert.org"}, {"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2", "tags": ["Mailing List", "Third Party Advisory"], "source": "cret@cert.org"}, {"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3", "tags": ["Mailing List", "Third Party Advisory"], "source": "cret@cert.org"}, {"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4", "tags": ["Mailing List", "Third Party Advisory"], "source": "cret@cert.org"}, {"url": "http://www.securityfocus.com/bid/105108", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cret@cert.org"}, {"url": "http://www.securitytracker.com/id/1041476", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cret@cert.org"}, {"url": "http://www.securitytracker.com/id/1041637", "tags": ["Third Party Advisory", "VDB Entry"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2785", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2791", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2846", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2924", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2925", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2933", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2948", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3083", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3096", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3459", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3540", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3586", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3590", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f", "tags": ["Patch", "Vendor Advisory"], "source": "cret@cert.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html", "tags": ["Mailing List", "Mitigation", "Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://security.netapp.com/advisory/ntap-20181003-0002/", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://support.f5.com/csp/article/K74374841?utm_source=f5support&%3Butm_medium=RSS", "source": "cret@cert.org"}, {"url": "https://usn.ubuntu.com/3740-1/", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://usn.ubuntu.com/3740-2/", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://usn.ubuntu.com/3741-1/", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://usn.ubuntu.com/3741-2/", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://usn.ubuntu.com/3742-1/", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://usn.ubuntu.com/3742-2/", "tags": ["Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://www.debian.org/security/2018/dsa-4272", "tags": ["Mitigation", "Third Party Advisory"], "source": "cret@cert.org"}, {"url": "https://www.kb.cert.org/vuls/id/641765", "tags": ["Third Party Advisory", "US Government Resource"], "source": "cret@cert.org"}, {"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-linux-en", "tags": ["Broken Link"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2019/06/28/2", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2019/07/06/3", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.openwall.com/lists/oss-security/2019/07/06/4", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/105108", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1041476", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1041637", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2785", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2791", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2846", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2924", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2925", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2933", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:2948", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3083", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3096", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3459", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3540", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3586", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://access.redhat.com/errata/RHSA-2018:3590", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git/commit/?id=c30f1fc041b74ecdb072dd44f858750414b8b19f", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html", "tags": ["Mailing List", "Mitigation", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html", "tags": ["Mailing List", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://security.netapp.com/advisory/ntap-20181003-0002/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.f5.com/csp/article/K74374841?utm_source=f5support&%3Butm_medium=RSS", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3740-1/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3740-2/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3741-1/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3741-2/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3742-1/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://usn.ubuntu.com/3742-2/", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.debian.org/security/2018/dsa-4272", "tags": ["Mitigation", "Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.kb.cert.org/vuls/id/641765", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "cret@cert.org", "description": [{"lang": "en", "value": "CWE-400"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size."}, {"lang": "es", "value": "El kernel de Linux en versiones a partir de la 3.9 es vulnerable a un ataque de denegaci\u00f3n de servicio (DoS) con tasas bajas de paquetes especialmente modificados que apuntan hacia el reensamblado de fragmentos de IP. Un atacante podr\u00eda provocar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) mediante el env\u00edo de fragmentos de IP especialmente manipulados. Se han descubierto varias vulnerabilidades en la fragmentaci\u00f3n de IP, que se han ido solucionando a lo largo de los a\u00f1os. La vulnerabilidad actual (CVE-2018-5391) se volvi\u00f3 explotable en el kernel de Linux con el aumento del tama\u00f1o de la cola de reensamblado de fragmentos de IP."}], "lastModified": "2024-11-21T04:08:43.897", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "686948B0-67CE-46FB-87DF-D4A796614CF8", "versionEndIncluding": "4.18", "versionStartIncluding": "3.9"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C81647C-9A53-481D-A54C-36770A093F90"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"}, {"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"}, {"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "vulnerable": true, "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"}, {"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "vulnerable": true, "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"}, {"criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64"}, {"criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98"}, {"criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3"}, {"criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB"}, {"criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46"}, {"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"}, {"criteria": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6CE5198-C498-4672-AF4C-77AB4BE06C5C"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:itanium:*:*", "vulnerable": true, "matchCriteriaId": "1BC405FE-D553-4F6E-A524-E0535B21BEBB"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B454BFE-D3AB-4CDC-B79B-F60EA3F57DBA"}, {"criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "627558CA-2606-4497-A232-0522D1CC8239", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9264B296-3445-4B9F-927D-7865BF3D8AF6", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F7CF1E3-B1DA-4920-A37B-522CBA915535", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58C8E163-2A45-4C64-A7C2-5686C1EB3C78", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "471EEDFE-F399-4DA4-A229-F35570514346", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72900780-80F2-470C-AED6-92736CC5EFC7", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FE43D60-C369-4806-B10A-97B02D715DFD", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4EDF69DE-310C-4C01-AA98-5EFB76C4E639", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E17D443D-9E5D-4F41-A539-6D7842B21E25", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EB7CEBE-7EB5-48BD-89F5-DE3B20C0946A", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D76F8CD6-1E23-4CB1-BE04-2F74E660120F", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6925A921-F946-4746-AE60-18919E44DAE2", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59C1988C-A886-4040-A640-81C8E6732813", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FA8C03D-3661-446D-B502-BEB52B7B6305", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0239DD74-6914-4B1C-9DA4-8D8D799A9B58", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86641EEE-52C4-4A09-9D0C-CC3254CFC256", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4F65BFF-8F85-487E-850A-DFF8DA9D8F59", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E12292F-25C7-48CD-A96A-097779B73DEC", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1503B2F8-3549-4E52-87E9-6F0FD91F1428", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D36C6B19-D8ED-4E32-AEA1-D045F3B922DC", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1D20BE1-7450-45AB-8A36-5AA1A84C3B54", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3FFD367-E47B-4491-9364-1BA3FA481964", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65A931C9-4301-49E2-B3C8-235862664E36", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8BA9BE0-1646-41EF-BCE2-7BD4021196C5", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AAA2418-D5A0-44D9-B4C7-D55553D374C1", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "068DD700-87D5-4979-A000-84A4D630F653", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB505ABB-7752-4590-9E8A-C5EAC190B349", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F46B8BF4-6DB9-48C1-8CB6-1FE0DE5B08C7", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7B34FC0-168E-4CA8-B1F4-BDC0D2213280", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F10D272B-F8F8-4D67-B562-3B2AC9F30E52", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71BBF6B3-6F7E-468C-9723-4C13049259D0", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F13E6EC1-5BC4-4A17-928A-667DA7A93EBD", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3F1C894-A475-457E-9AD9-934151E76200", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "678B7FC3-6796-4159-BF2B-8FAD49E0F566", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBCF9B1E-E4DF-46FE-BB85-E51657595936", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98117B55-838B-47C5-84AE-8F84357F1BAE", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "670C542A-63F1-4FC2-B215-ADE94FCF3512", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F104C6F4-47BB-416D-AB73-BBEA8A1BAE4B", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0E47FF6-A851-4588-9F39-B292D4147AE6", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A8809FF-F8DF-48E8-9885-CD0C2AD79024", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0972BE5-3E14-4BB3-A635-C346FA49AA85", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBDBCC20-D7F8-4125-862F-E5596302DC90", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7FFD156-606F-40DC-90D0-60B3DB5E3D90", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D960933D-9476-4473-A3FB-0032C051BE50", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3092DC8B-088E-45D2-BF0E-2E99C5395431", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1383A6A-60CF-4C10-9CFB-7B4FAEBEA3E6", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29D81E70-82D9-4FE8-B0D0-214149C30CF0", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C126233-AEE0-4E51-A738-CB6D098C4478", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44D33B41-F19D-4B46-9F9E-FC03051EBB0C", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1D72DB2-91EA-4DBB-A68F-DC5127930755", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6065C3C1-1C16-48A5-B879-0F2A4B757D66", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BB3A6AE-0CE4-4A5D-AFA6-6AC0AE49B616", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B330C1A9-F937-4DE5-B111-46970DA853C2", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63529AEA-8B74-4CA1-BADF-14514D243DC5", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4B00FFF-D49D-4C1C-9416-F6E95049945C", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54E61F23-BDD2-4938-AE39-D95C03B471B6", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7BBC3D4-9B4E-4185-B327-8902DDFD4234", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C497F2ED-D143-4207-BCDA-68C3DB856529", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE65180C-47C8-41CF-B6C7-181259605B2C", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD3A8B31-C29E-4F5C-A95E-DB3F88E83A6D", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40B3C644-1703-4599-9021-F2C919B11AEC", "versionEndExcluding": "11.6.5.1", "versionStartIncluding": "11.5.1"}, {"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D518DD68-B336-43A8-883C-1CE7B9BB5B0F", "versionEndExcluding": "12.1.5", "versionStartIncluding": "12.1.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABF432A4-76B4-4D32-B864-60F30568CABF", "versionEndExcluding": "13.1.3", "versionStartIncluding": "13.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54E703A5-F9F1-4DDA-8B70-D3C6F51038B6", "versionEndExcluding": "14.0.1.1", "versionStartIncluding": "14.0.0"}, {"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BDB13A0E-C1C4-403C-9990-AB7729F9585D", "versionEndExcluding": "14.1.2.4", "versionStartIncluding": "14.1.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:ruggedcom_rm1224_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "755BF920-21B8-4D5C-AFF3-5566A0FF9FE4", "versionEndExcluding": "6.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:ruggedcom_rm1224:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "284DF779-D900-48B4-A177-7281CD445AB5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:ruggedcom_rox_ii_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CB10E02-C5CA-42AC-AD48-72CE508CD627", "versionEndExcluding": "2.13.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:ruggedcom_rox_ii:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1EA04F52-40D0-4A4B-9767-265A26EFD98D"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E409347-918D-4C13-AC0D-B76867A78786", "versionEndExcluding": "6.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_m-800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DFB9921A-5204-40A3-88AB-B7755F5C6875"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DB470D9-102A-429B-81C2-F9C28ABB627F", "versionEndExcluding": "6.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E917CBBB-EF41-4113-B0CA-EB91889235E7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_sc-600_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCBF7633-A3E7-4CEF-AC2A-085AF303FF27", "versionEndExcluding": "2.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_sc-600:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "725C671B-D7A0-48CF-8A31-5F9C4173F1DD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_w1700_ieee_802.11ac_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0AF4337-C610-4E5B-9F6E-E0AE059E9D2E", "versionEndExcluding": "2.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_w1700_ieee_802.11ac:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55CA7B83-9295-451A-9B78-832761A6BA79"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_w700_ieee_802.11a\\/b\\/g\\/n_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C4A8F09-A7B9-4569-A3AE-F3572CBD9AA5", "versionEndExcluding": "6.4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_w700_ieee_802.11a\\/b\\/g\\/n:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DEAC9491-87D0-480B-B49A-4EC5D2A2C802"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1242-7_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58AACBFB-F828-4A17-816E-0BCA406B063D", "versionEndExcluding": "3.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1242-7:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "122D4621-9DBD-4BB7-8CEF-2E9F69E6F8DA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FB9F6B9-7A43-4669-AEB8-30644609C5D9", "versionEndExcluding": "3.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1243-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "65278BA0-3C81-4D81-9801-D7BE3A1D7680"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-7_lte_eu_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E5B6CE8-F314-43C4-A01A-79DA4C71A34F", "versionEndExcluding": "3.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1243-7_lte_eu:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "555FAB7F-8D8C-46E8-91E2-83AA93A41940"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-7_lte_us_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9C1A675-67F8-4A1C-A67F-E081AC647A55", "versionEndExcluding": "3.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1243-7_lte_us:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F5179046-6D98-46A2-BDB8-2D5EF3C6D46F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1243-8_irc_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "251E49C6-735C-492F-BD26-6994A6BB40BD", "versionEndExcluding": "3.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1243-8_irc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "350FD323-C876-4C7A-A2E7-4B0660C87F6C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47EDF46E-8273-478A-A1F4-3CE781CB5E24", "versionEndExcluding": "2.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1542sp-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0602DEEA-AE39-4A44-9D78-6623943DDCD6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52ED214A-EA23-43A7-B7F8-F0017B1063F8", "versionEndExcluding": "2.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1542sp-1_irc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C1EE2F10-A7A6-486F-AE5C-53AE25BAF200"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "951CDCA7-73BD-4494-9ED9-FD741A01DF93", "versionEndExcluding": "2.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1543-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F56C2BDC-928E-491A-8E7C-F976B3787C7A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_net_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2D103B7-B693-4E35-AF55-9238B6A16E77", "versionEndExcluding": "2.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_net_cp_1543sp-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "783B50B8-2FB7-4982-88AA-B4F2AD094796"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_rf185c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31BF3B2C-98D9-455F-BCB4-EEAC7EE84C9A", "versionEndExcluding": "1.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_rf185c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "82494B5E-80EE-47ED-B87E-CF8C8907B6FE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_rf186c_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "63E0D36E-1DF9-4DB8-B563-EF77D947FA9E", "versionEndExcluding": "1.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_rf186c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9B0933EB-82BE-42BB-978B-C9EC2FE1C795"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_rf186ci_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E39C5C7A-543C-4271-80EF-C728FFFA50D2", "versionEndExcluding": "1.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_rf186ci:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1EAEB335-BD22-4CEF-A3EA-9D98A09FEBF0"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_rf188_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34F52786-B328-4066-8F3C-457358E42989", "versionEndExcluding": "1.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_rf188:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "91E776EC-16DD-404D-A8AA-2344BA306E3C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:simatic_rf188ci_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "361C68A1-6FDE-47EB-84C5-31AB100E8F30", "versionEndExcluding": "1.3"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:simatic_rf188ci:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B0927991-E820-4FC3-9EFE-96E4C9BFCCCD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:siemens:sinema_remote_connect_server_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "284428BD-FF75-4D48-9137-2D64B46B6ED4", "versionEndExcluding": "2.0.1", "versionStartIncluding": "1.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:siemens:sinema_remote_connect_server:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "50360459-773D-4B1C-B28D-02A01BE5A0EA"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cret@cert.org"}