{"id": "CVE-2019-1649", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 6.7, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.8}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.7, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 0.8}]}, "published": "2019-05-13T19:29:01.520", "references": [{"url": "http://www.securityfocus.com/bid/108350", "tags": ["Third Party Advisory", "VDB Entry"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://www.kb.cert.org/vuls/id/400865", "tags": ["Third Party Advisory", "US Government Resource"], "source": "ykramarz@cisco.com"}, {"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", "tags": ["Third Party Advisory", "US Government Resource"], "source": "ykramarz@cisco.com"}, {"url": "http://www.securityfocus.com/bid/108350", "tags": ["Third Party Advisory", "VDB Entry"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190513-secureboot", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.kb.cert.org/vuls/id/400865", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.us-cert.gov/ics/advisories/icsa-20-072-03", "tags": ["Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-284"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-667"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the logic that handles access control to one of the hardware components in Cisco's proprietary Secure Boot implementation could allow an authenticated, local attacker to write a modified firmware image to the component. This vulnerability affects multiple Cisco products that support hardware-based Secure Boot functionality. The vulnerability is due to an improper check on the area of code that manages on-premise updates to a Field Programmable Gate Array (FPGA) part of the Secure Boot hardware implementation. An attacker with elevated privileges and access to the underlying operating system that is running on the affected device could exploit this vulnerability by writing a modified firmware image to the FPGA. A successful exploit could either cause the device to become unusable (and require a hardware replacement) or allow tampering with the Secure Boot verification process, which under some circumstances may allow the attacker to install and boot a malicious software image. An attacker will need to fulfill all the following conditions to attempt to exploit this vulnerability: Have privileged administrative access to the device. Be able to access the underlying operating system running on the device; this can be achieved either by using a supported, documented mechanism or by exploiting another vulnerability that would provide an attacker with such access. Develop or have access to a platform-specific exploit. An attacker attempting to exploit this vulnerability across multiple affected platforms would need to research each one of those platforms and then develop a platform-specific exploit. Although the research process could be reused across different platforms, an exploit developed for a given hardware platform is unlikely to work on a different hardware platform."}, {"lang": "es", "value": "Una vulnerabilidad en la l\u00f3gica que maneja el control de acceso de uno de los componentes de hardware en la implementaci\u00f3n Secure Boot de propiedad de Cisco, podr\u00eda permitir que un atacante local autenticado escriba una imagen de firmware modificada en el componente. Esta vulnerabilidad afecta a varios productos de Cisco que admiten la funcionalidad de Secure Boot basada en hardware. La vulnerabilidad se genera por una comprobaci\u00f3n incorrecta en el \u00e1rea de c\u00f3digo que administra las actualizaciones en las instalaciones de Field Programmable Gate Array (FPGA) parte de la implementaci\u00f3n del hardware Secure Boot. Un atacante con privilegios elevados y acceso al sistema operativo subyacente que se ejecuta en el dispositivo afectado podr\u00eda explotar esta vulnerabilidad al escribir una imagen de firmware modificada en el FPGA. Una explotaci\u00f3n exitosa podr\u00eda hacer que el dispositivo se vuelva inutilizable (y requiera un reemplazo de hardware) o permitir la manipulaci\u00f3n del proceso de comprobaci\u00f3n de Secure Boot, que en algunas circunstancias puede permitir al atacante instalar y arrancar una imagen de software malicioso. Un atacante deber\u00e1 cumplir todas las condiciones siguientes para intentar explotar esta vulnerabilidad: Tener acceso administrativo privilegiado al dispositivo. Poder acceder al sistema operativo subyacente que se ejecuta en el dispositivo; Esto se puede lograr mediante el uso de un mecanismo documentado de soporte o mediante la explotaci\u00f3n de otra vulnerabilidad que proporcionar\u00eda a un atacante con dicho acceso. Desarrollar o tener acceso a un exploit espec\u00edfico de la plataforma. Un atacante que busque explotar esta vulnerabilidad en m\u00faltiples plataformas afectadas necesitar\u00e1 investigar cada una de esas plataformas y despu\u00e9s desarrollar una vulnerabilidad espec\u00edfica de la plataforma. Si bien el proceso de investigaci\u00f3n se podr\u00eda realizar en diferentes plataformas, es poco probable que una vulnerabilidad desarrollada para una plataforma de hardware determinada opere en una plataforma de hardware diferente."}], "lastModified": "2024-11-21T04:37:00.627", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asa_5500_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "524E28A1-ABD9-416B-804C-EFFD7F822DE5", "versionEndExcluding": "1.1.15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "763B801D-CA1E-4C56-8B06-3373EA307C7E"}, {"criteria": "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "30AC6907-3091-409F-967D-64A82A0C5A8C"}, {"criteria": "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D11AF728-8EB0-45EB-A7DD-F2D52B3BB7B8"}, {"criteria": "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "92AE506A-E710-465B-B795-470FDE0E0ECA"}, {"criteria": "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1E07AF10-FFB2-4AC7-BBE7-199C3EFED81F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_2100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32B7016C-C909-4F30-A80E-E30E9C2FB607", "versionEndExcluding": "2.6.1.134"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_2110:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "52D96810-5F79-4A83-B8CA-D015790FCF72"}, {"criteria": "cpe:2.3:h:cisco:firepower_2120:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "16FE2945-4975-4003-AE48-7E134E167A7F"}, {"criteria": "cpe:2.3:h:cisco:firepower_2130:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DCE7122A-5AA7-4ECD-B024-E27C9D0CFB7B"}, {"criteria": "cpe:2.3:h:cisco:firepower_2140:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "976901BF-C52C-4F81-956A-711AF8A60140"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_4000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B8DB36E-D0AC-4FFC-8FDB-C5520689013A", "versionEndExcluding": "1.0.18"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F"}, {"criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46"}, {"criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4"}, {"criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:firepower_9000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E924AE61-94D5-4A68-A586-CA7119487F67", "versionEndExcluding": "1.0.18"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "07DAFDDA-718B-4B69-A524-B0CEB80FE960"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ons_15454_mstp_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F8A7F11-B920-4C5B-B3CA-D29740FFE891", "versionEndExcluding": "11.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ons_15454_mstp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BEBE1DDE-6C69-45EC-A666-D9596E8721DA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:analog_voice_network_interface_modules_firmware:*:*:*:*:*:*:4000_series_isrs:*", "vulnerable": true, "matchCriteriaId": "00BCB49E-E2D2-4374-8D48-A287FC538F4A"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:nim-2bri-nt\\/te:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "637D7CA3-89CD-418A-BF87-0935A7805173"}, {"criteria": "cpe:2.3:h:cisco:nim-2fox:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4CBE2B16-B9AD-4ED2-AE18-7087C478FEEC"}, {"criteria": "cpe:2.3:h:cisco:nim-2fxs:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D94B415B-08E2-4845-BD11-7EBCD08215E0"}, {"criteria": "cpe:2.3:h:cisco:nim-2fxs\\/4fxo:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "784ECC2E-F4AC-4430-9F33-9B1DBD89692F"}, {"criteria": "cpe:2.3:h:cisco:nim-2fxs\\/4fxop:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8A34FAE4-7B2A-47BF-AB0A-5FAF8E8920CE"}, {"criteria": "cpe:2.3:h:cisco:nim-2fxsp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3FADBF85-52F4-468C-A44C-5107484757EA"}, {"criteria": "cpe:2.3:h:cisco:nim-4bri-nt\\/te:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "90E418C4-F91B-4E0D-B1DC-2B099D991F80"}, {"criteria": "cpe:2.3:h:cisco:nim-4e\\/m:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E22A4B07-04DF-4AF2-B2A9-E4430C4F3A64"}, {"criteria": "cpe:2.3:h:cisco:nim-4fxo:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DFDCD640-E1BB-48F8-BEB4-85AAF7099FA2"}, {"criteria": "cpe:2.3:h:cisco:nim-4fxs:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "893147FC-1AD0-441C-B031-6C432ED2FFD8"}, {"criteria": "cpe:2.3:h:cisco:nim-4fxsp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DE30FCF9-DFF6-419C-8DCA-0B695E3FADE7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:integrated_services_router_t1\\/e1_voice_and_wan_network_interface_modules_firmware:*:*:*:*:*:*:4000_series:*", "vulnerable": true, "matchCriteriaId": "239EC4DE-5E2C-44D7-9C32-BFCD854670AC"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:nim-1ce1t1-pri:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F2956624-92FC-43D7-A038-15071A90E0B4"}, {"criteria": "cpe:2.3:h:cisco:nim-1mft-t1\\/e1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "988125C4-DB88-438F-8F6D-0992424081A5"}, {"criteria": "cpe:2.3:h:cisco:nim-2ce1t1-pri:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AD9B34B9-78EC-49AE-B342-F2BAD63CD50C"}, {"criteria": "cpe:2.3:h:cisco:nim-2mft-t1\\/e1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5D258F96-93A5-455E-9542-2C95B3D31455"}, {"criteria": "cpe:2.3:h:cisco:nim-4mft-t1\\/e1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B443FC34-767F-45B4-8516-A1A8B6C8D917"}, {"criteria": "cpe:2.3:h:cisco:nim-8ce1t1-pri:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08C3403A-3943-4A69-A536-3FA6DEDFF21B"}, {"criteria": "cpe:2.3:h:cisco:nim-8mft-t1\\/e1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7259F6BC-BA31-47E4-BFA6-647068A946CD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:supervisor_a\\+_firmware:*:*:*:*:*:*:nexus_9500:*", "vulnerable": true, "matchCriteriaId": "3F825D9C-25C6-4F76-A7EE-F61A548A0CE1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n9k-sup-a\\+:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "360B9A25-5272-487A-AF1A-CE2FDFD6F23C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:supervisor_b\\+_firmware:*:*:*:*:*:*:nexus_9500:*", "vulnerable": true, "matchCriteriaId": "77C59A0F-F256-42C3-A3E1-71F02614F55A"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n9k-sup-b\\+:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3ADE8708-95D4-4D30-85ED-BE870410F3B6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:15454-m-wse-k9_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F99FC1A-2738-468B-BD01-4F715A1B7809", "versionEndExcluding": "11.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:15454-m-wse-k9:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "90242967-37AB-4124-87DE-D826A3895BE7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB99D062-EE0C-4695-AA4D-2DCE3E2B15AF", "versionEndExcluding": "16.12.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D6CCBE67-E509-43EC-9AFB-8A9B6A115126"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39C9F8C2-9E34-4027-9112-42AEC0B84F7C", "versionEndExcluding": "16.3.9"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76843179-3569-4556-9F4C-6543B8A8E1DE", "versionEndExcluding": "16.6.7", "versionStartIncluding": "16.4.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B526102-9DDC-4E23-B582-DEF7EA35E42C", "versionEndExcluding": "16.9.4", "versionStartIncluding": "16.7.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F50DDAE4-2C87-4B8B-9BCB-2FD32A6976D6", "versionEndExcluding": "16.12.1", "versionStartIncluding": "16.10.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:nim-1ge-cu-sfp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C56A1D02-3061-40C5-AD87-0BEA869838F4"}, {"criteria": "cpe:2.3:h:cisco:nim-2ge-cu-sfp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1F98C767-8E9F-4B01-A09E-359A496B2B3A"}, {"criteria": "cpe:2.3:h:cisco:sm-x-pvdm-1000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0FCAA286-6B36-4EB7-9AE5-CA082D125E78"}, {"criteria": "cpe:2.3:h:cisco:sm-x-pvdm-2000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F6B1C2CF-0EF1-428F-8FB8-D45E4C6CB340"}, {"criteria": "cpe:2.3:h:cisco:sm-x-pvdm-3000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "450EA21E-68E0-4617-85A9-9C39B96E12ED"}, {"criteria": "cpe:2.3:h:cisco:sm-x-pvdm-500:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17B65497-2EAC-4B9E-9D05-58A0B6D1F399"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35726753-BAA4-479F-AF9C-F4D012881F83", "versionEndExcluding": "15.6\\(3\\)m7"}, {"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A3FBAE1-F786-4799-AF70-6E7B5DC19BB9", "versionEndIncluding": "15.7\\(3\\)m5", "versionStartIncluding": "15.7"}, {"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72240B45-0D8E-4EA6-8208-068BF6EF8B30", "versionEndExcluding": "15.8\\(3\\)m3", "versionStartIncluding": "15.8"}, {"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7F56D01-F647-452D-A564-4198A893BC70", "versionEndExcluding": "15.9\\(3\\)m", "versionStartIncluding": "15.9"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:1120_connected_grid_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6835F8AD-B55D-4B57-B3B5-0095E309B2B3"}, {"criteria": "cpe:2.3:h:cisco:1240_connected_grid_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1AB6ACAE-8C89-48F6-95BA-DE32F4F81FE6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:industrial_security_appliances_3000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83AA5C75-B959-4167-906C-BE9C84C7E676", "versionEndExcluding": "1.0.05"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:industrial_security_appliances_3000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6FBBA8E7-14B2-4869-8ED4-72F120E547FC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:integrated_services_router_4200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CB084F19-E475-41FA-A72F-23D4D6913523", "versionEndExcluding": "1.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6C8AED7C-DDA3-4C29-BB95-6518C02C551A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:integrated_services_router_4300_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C49E8AE0-745B-459C-AAD9-D41690D48DDE", "versionEndExcluding": "1.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F"}, {"criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5"}, {"criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:integrated_services_router_4400_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC5D8FF8-60F8-4F89-A488-F815D0FB00E1", "versionEndExcluding": "1.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD"}, {"criteria": "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "697BEF89-6D9B-4870-BE85-9090152F3E6E"}, {"criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13C3D17D-DD95-49CA-918A-A0F5289B0C3D", "versionEndExcluding": "15.6\\(3\\)m6b"}, {"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DA254534-247F-47BA-B146-0E3B7E9F9269", "versionEndIncluding": "15.7\\(3\\)m4b", "versionStartIncluding": "15.7"}, {"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0F05F3A-A38F-4922-AE54-BE1BC64C4B7C", "versionEndExcluding": "15.8\\(3\\)m2a", "versionStartIncluding": "15.8"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:809_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C996F3B-0333-4B9A-B3E7-F50E64B0AAB3"}, {"criteria": "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F0D05CC9-8D04-4DE0-A854-375192B4D46C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asr_1000_series_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64C3BBBB-4349-4D2B-9944-84BE03407650"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C5C1005-0C12-4EDA-BC4A-B52201C4F516"}, {"criteria": "cpe:2.3:h:cisco:asr_1000_series:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "76B7C13F-46C5-460A-A6C9-3837A28A0CE2"}, {"criteria": "cpe:2.3:h:cisco:asr1000-2t\\+20x1ge:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "77D24BB4-6357-4BFC-A4CB-B33ECDEB3BEE"}, {"criteria": "cpe:2.3:h:cisco:asr1000-6tge:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1B1F849A-05BA-4CA2-96AA-F8DFD5E725A5"}, {"criteria": "cpe:2.3:h:cisco:asr1000-esp200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AB060D83-2924-4D1D-9FEE-F8087FA8976D"}, {"criteria": "cpe:2.3:h:cisco:asr1000-mip100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8CF4D0E5-FF09-4919-B603-B42DB535386C"}, {"criteria": "cpe:2.3:h:cisco:asr1000-rp3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "22C36989-4353-4B81-8B0F-FC6322C1C179"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asr_1001_firmware:16.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A267A86B-144D-46C3-9F63-95606106A5B1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701"}, {"criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A"}, {"criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C807F789-3038-42C3-B5EB-6CD628EBF718", "versionEndExcluding": "16.2.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a900-rsp2a-128:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DED2353D-A508-4764-975F-57F9DACD91FA"}, {"criteria": "cpe:2.3:h:cisco:a900-rsp2a-64:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9EBA765C-B6F0-4D4D-8933-06E655084AF4"}, {"criteria": "cpe:2.3:h:cisco:a900-rsp3c-200:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CC6F34E1-7DE4-459B-AF41-D973201ADC49"}, {"criteria": "cpe:2.3:h:cisco:a900-rsp3c-400\\/w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D8DAC3AF-FEFC-4B14-A7BE-7008E65FD012"}, {"criteria": "cpe:2.3:h:cisco:asr-920-10sz-pd:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7FCA2DB2-AE09-4A99-90C9-60AE0CD9A035"}, {"criteria": "cpe:2.3:h:cisco:asr-920-12cz-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "11B83BED-5A49-4CF0-9827-AA291D01F60E"}, {"criteria": "cpe:2.3:h:cisco:asr-920-12cz-d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2C1E8937-51D9-43E6-876E-5D39AD3D32C4"}, {"criteria": "cpe:2.3:h:cisco:asr-920-12sz-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2CA7AE63-99B9-4F28-8670-639A9B31E494"}, {"criteria": "cpe:2.3:h:cisco:asr-920-12sz-d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E858B4AB-49B1-4F1C-8722-6E6911194924"}, {"criteria": "cpe:2.3:h:cisco:asr-920-12sz-im-cc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "577D1BF2-5180-4301-941C-3C0ADDD23AA6"}, {"criteria": "cpe:2.3:h:cisco:asr-920-24sz-m:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9FE70CCD-6062-45D8-8566-7C9E237E030F"}, {"criteria": "cpe:2.3:h:cisco:asr-920-24tz-im:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5EA3A897-ED4E-417F-BA6C-C1A825A210F6"}, {"criteria": "cpe:2.3:h:cisco:asr-920-24tz-m:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "375F9E12-A61B-4FD3-AE07-D4E686EB112A"}, {"criteria": "cpe:2.3:h:cisco:asr-920-4sz-a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D724F932-4548-429D-8CAA-E82C3435A194"}, {"criteria": "cpe:2.3:h:cisco:asr-920-4sz-d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0BCC94C3-9EEF-4600-BE82-8AEDEB0F1446"}, {"criteria": "cpe:2.3:h:cisco:c9300-24p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "16088337-C057-4271-B5C7-74FE1573B0F0"}, {"criteria": "cpe:2.3:h:cisco:c9300-24t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A69B8AFD-17F5-4809-BDB9-3337BA52BC58"}, {"criteria": "cpe:2.3:h:cisco:c9300-24u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6A628A7B-FE58-4881-B705-C3BCBED6F201"}, {"criteria": "cpe:2.3:h:cisco:c9300-24ux:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0A9C769E-ED9C-4F06-928D-CC7FFBA54EC7"}, {"criteria": "cpe:2.3:h:cisco:c9300-48p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C5B19A31-99E3-4141-9FE8-7A5FD16FAE5C"}, {"criteria": "cpe:2.3:h:cisco:c9300-48t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB1DFCD7-F14A-4530-8E36-55FE0EE1E7C7"}, {"criteria": "cpe:2.3:h:cisco:c9300-48u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "84C89BB9-D62D-4E36-8BFD-D583F383120D"}, {"criteria": "cpe:2.3:h:cisco:c9300-48un:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "88262B7E-8C2F-49FE-9F58-8A1C78285A93"}, {"criteria": "cpe:2.3:h:cisco:c9300-48uxm:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C6109DBC-5489-4FF9-B940-E174126488AB"}, {"criteria": "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5EA59279-3504-417D-9E86-E5886EE198BD"}, {"criteria": "cpe:2.3:h:cisco:cbr-ccap-lc-40g-r:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C44B33A5-DB73-4A3B-AA5B-97B8493AD28B"}, {"criteria": "cpe:2.3:h:cisco:cbr-lc-8d31-16u31:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CAB82552-DD9D-45C9-8296-B4C8D510FFA1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82AF763B-9299-4EDC-B42D-B83736839CA1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a99-16x100ge-x-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C4EA89F6-14B5-4EC7-BAEB-E783FF1982AB"}, {"criteria": "cpe:2.3:h:cisco:a99-32x100ge-cm:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E5BF29D2-7C65-4724-B6AE-249BB22725CE"}, {"criteria": "cpe:2.3:h:cisco:a99-32x100ge-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D55DC09B-CF82-4461-8886-BE90451BFF9E"}, {"criteria": "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F393681D-7EC1-46D5-BAFB-786528E259B9"}, {"criteria": "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ABE8CE5B-09CF-4138-9495-7223FFA64443"}, {"criteria": "cpe:2.3:h:cisco:a9k-16x100ge-cm:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "15AEC57E-7851-4C8D-AB02-A932C3929F26"}, {"criteria": "cpe:2.3:h:cisco:a9k-16x100ge-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B14DB778-9B07-4AFF-8BF3-4631B23501BD"}, {"criteria": "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "326F9936-57E7-4E8F-9C51-093788454A3A"}, {"criteria": "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "884F1D0A-8A6F-45E4-9AC7-A8603AB8AE4E"}, {"criteria": "cpe:2.3:h:cisco:network_convergence_system_1002:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7D54F012-3136-4CA8-B119-FD7446EC96C6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0514874D-C8F0-496E-9B04-FA699B339EEE", "versionEndExcluding": "15.5\\(1\\)sy4"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c6800-16p10g-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F508C81E-D31B-44BA-82C8-FEDA00324B8B"}, {"criteria": "cpe:2.3:h:cisco:c6800-32p10g-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "05A9E0CA-BB70-4F74-BAD6-BE80669D1699"}, {"criteria": "cpe:2.3:h:cisco:c6800-8p10g-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4CAE1989-0E75-414E-BCB3-E0057F1492E7"}, {"criteria": "cpe:2.3:h:cisco:c6800-8p40g-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B1A1BA05-615E-4304-992D-6EEA176D852F"}, {"criteria": "cpe:2.3:h:cisco:c6800-sup6t-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D883A807-6909-4087-892B-1E505521EA7A"}, {"criteria": "cpe:2.3:h:cisco:c6816-x-le:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DE2D76C8-552A-44C2-9C30-0CF31F6BC719"}, {"criteria": "cpe:2.3:h:cisco:c6824-x-le-40g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "649A1287-A03D-48B8-ADFA-26F175366C91"}, {"criteria": "cpe:2.3:h:cisco:c6832-x-le:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8776111D-894D-4EEB-8ADD-A9AC26AE30D6"}, {"criteria": "cpe:2.3:h:cisco:c6840-x-le-40g:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "975D2EC3-3499-48FD-87F2-4BAD1CDB0E4C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27ACCA11-D39B-468E-9C3C-BBF110ED3581", "versionEndExcluding": "16.9.4"}, {"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BB36C23-9303-4E3D-8C4A-B2E2150CF3FE", "versionEndExcluding": "16.12.1", "versionStartIncluding": "16.10"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:c9500-12q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0B37D793-0EE3-49CA-98B2-3E1F3D561A9F"}, {"criteria": "cpe:2.3:h:cisco:c9500-16x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "03F5F6FA-9499-4232-A80A-494CE287A87A"}, {"criteria": "cpe:2.3:h:cisco:c9500-24q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "58918BAA-7070-4901-B1C8-344E8A4DBEE9"}, {"criteria": "cpe:2.3:h:cisco:c9500-24y4c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08B9D533-FCF5-4B35-A0D2-2EA1E4A907AE"}, {"criteria": "cpe:2.3:h:cisco:c9500-32c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C809A939-105E-471E-A150-859015641989"}, {"criteria": "cpe:2.3:h:cisco:c9500-32qc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B2C657B7-172E-4E85-8027-4B5563F2CE14"}, {"criteria": "cpe:2.3:h:cisco:c9500-40x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0B42926F-0841-4D40-BABE-852893C6020F"}, {"criteria": "cpe:2.3:h:cisco:c9500-48y4c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "381144D6-7CDE-46E6-ADE7-76372740F283"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:catalyst_9800-40_wireless_controller_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "902D1451-9E2E-4BC3-8B61-D87C142F4485"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8E283C34-43AE-49A5-A72B-32DEA185ABD3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:catalyst_9800-80_wireless_controller_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59CD23DF-9B9D-459F-A3BF-F2D53FBDAF71"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ADB3AF13-5324-42CD-8EDB-6F730BF46214"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ic3000-k9_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13174CD9-8564-4041-93EC-8E8D7F4F3443", "versionEndExcluding": "1.0.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ic3000-k9:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B443B2C3-E3C1-4ADF-BF9B-164D00318B08"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053", "versionEndExcluding": "8.4.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ds-x9334-k9:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ECE54217-EF6D-4191-9267-113041B14A08"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs2k-mr-mxp-k9_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DE58C19-66CD-45DD-BF5C-C333A30AA096", "versionEndExcluding": "11.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs2k-mr-mxp-k9:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6EFF3999-1FF6-42C0-BE62-3FA227297264"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:nc55-24h12f-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "966F7DF8-1F20-4A74-B633-8B5AEE63C193"}, {"criteria": "cpe:2.3:h:cisco:nc55-36x100g-a-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "46EA0E17-C399-4DA0-A550-F5469CC82F3F"}, {"criteria": "cpe:2.3:h:cisco:nc55-36x100g-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "41C4BF85-7077-463B-8E52-F67949849123"}, {"criteria": "cpe:2.3:h:cisco:nc55-5504-fc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F9102353-A21A-41C2-AA0B-9B00F66B693E"}, {"criteria": "cpe:2.3:h:cisco:nc55-5516-fc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1536A363-E423-42DD-928B-FC6E91264371"}, {"criteria": "cpe:2.3:h:cisco:nc55-6x200-dwdm-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AB4F5CA4-BBD2-4DC9-8F99-9CC1B2A90BF2"}, {"criteria": "cpe:2.3:h:cisco:nc55-mod-a-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A2442B13-F163-4219-AED9-7FA4CCD1A8D6"}, {"criteria": "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7617BA24-6474-49CF-B78D-0056D3F8385B"}, {"criteria": "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C3DCE7D6-0E78-4CF3-BF7A-6A4945ADD4F1"}, {"criteria": "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "344675F6-9045-492D-9577-E0CE333AD6E9"}, {"criteria": "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC7F2221-B5BE-408C-BA84-9776469EE2D5"}, {"criteria": "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D8D61548-61B4-4B53-8574-9DB92B00A627"}, {"criteria": "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4FF08FAF-67DD-4361-947A-40D5938DB8BA"}, {"criteria": "cpe:2.3:h:cisco:ncs-55a1-36h-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1CE2AD36-5D52-4489-AAC1-A7AC1B3D2581"}, {"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A95FEA95-703B-44E0-A7CA-9E38B2EB1980"}, {"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2D37BF94-9D5F-4A88-8115-3A88FF144845"}, {"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C33F0D81-1314-440B-9FC2-56D76CA4CD79"}, {"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8E50806D-115D-4903-A5B2-62654FFDD9F5"}, {"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "15AE071E-0CEF-4305-A92D-9F4C324BD4ED"}, {"criteria": "cpe:2.3:h:cisco:network_convergence_system_5001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3E007368-04AF-49C7-892F-ED2BB1E4EA61"}, {"criteria": "cpe:2.3:h:cisco:network_convergence_system_5002:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9DBEF775-EC98-4391-BAD2-61870A7DEE88"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68A586A3-0291-4BA3-9211-6EE0BBB7F39C", "versionEndExcluding": "9.3\\(2\\)"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n3k-c31108pc-v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5AEB8547-3FA8-42F5-8106-57B0F994BEC5"}, {"criteria": "cpe:2.3:h:cisco:n3k-c31108tc-v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E4D2069C-23A2-4113-B674-024D36E40BDD"}, {"criteria": "cpe:2.3:h:cisco:n3k-c3132c-z:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "572F9105-9B6C-4460-8B49-14812AC3DC28"}, {"criteria": "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01"}, {"criteria": "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE8EFEE8-FC8D-480C-917E-24C3B8D56E29"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7482F9FB-CA6A-4CA2-B6FB-FD0DCDF603ED"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6487A95B-0D04-4ABA-B491-8A935694AFD3"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F2E84307-41BC-4F85-BC9A-FF02178765F8"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55A31452-5B60-4273-BA38-8FA684DED953"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C3FCA39-927B-4C89-A58B-E6859ED8176A"}, {"criteria": "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D7B464B3-DE25-4980-ABC3-10D7C79C12E6"}, {"criteria": "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "214472EB-424C-48B7-8EF3-7B679A5042BF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D5DCCAC-A8CC-40B5-AA01-6D46CB9B7053", "versionEndExcluding": "8.4.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ds-x9648-1536k9:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "57E3CF0C-5AD0-4A30-9335-4945CBC04A60"}, {"criteria": "cpe:2.3:h:cisco:n3k-c3264c-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6C5CF4C9-3B75-4DC5-BC38-8A2B87FEAE01"}, {"criteria": "cpe:2.3:h:cisco:n77-m312cq-26l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9AFA9BC1-3386-4AAE-A1B6-D81761D3EA9B"}, {"criteria": "cpe:2.3:h:cisco:n77-m348xp-23l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8E6AC35C-29B2-42C7-862D-D9AC3461D8D6"}, {"criteria": "cpe:2.3:h:cisco:n77-sup3e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F33AB95C-62FC-48EC-84AB-5EFA5C061F3B"}, {"criteria": "cpe:2.3:h:cisco:n7k-m324fq-25l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B6BF05BA-E0CC-45D6-963F-27F0BD7B3C4F"}, {"criteria": "cpe:2.3:h:cisco:n7k-m348xp-25l:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D409BDF3-9F35-4D94-9DF0-7B58A519A005"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:sm-x-1t3\\/e3_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98B12A01-8EF8-4DDE-9A40-51A9BC7D42AC"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:sm-x-1t3\\/e3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "696AFE49-10E1-4C56-93D3-F4118B3E01AB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:encs_5100_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD6741CC-EEA4-4DC8-A21B-DB84B861316B"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:encs_5100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "678F3A32-372A-441E-8115-95181FBAF628"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:encs_5400_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF426F3E-4474-43C7-84F5-EF61957E5004"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:encs_5400:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "01AE8153-6C23-46AB-BEAA-A6F27FDFEED7"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}