{"id": "CVE-2020-3284", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "MEDIUM", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.2}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 9.8, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 3.9}]}, "published": "2020-11-06T19:15:14.267", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-pxe-unsign-code-exec-qAa78fD2", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-pxe-unsign-code-exec-qAa78fD2", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-284"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the enhanced Preboot eXecution Environment (PXE) boot loader for Cisco IOS XR 64-bit Software could allow an unauthenticated, remote attacker to execute unsigned code during the PXE boot process on an affected device. The PXE boot loader is part of the BIOS and runs over the management interface of hardware platforms that are running Cisco IOS XR Software only. The vulnerability exists because internal commands that are issued when the PXE network boot process is loading a software image are not properly verified. An attacker could exploit this vulnerability by compromising the PXE boot server and replacing a valid software image with a malicious one. Alternatively, the attacker could impersonate the PXE boot server and send a PXE boot reply with a malicious file. A successful exploit could allow the attacker to execute unsigned code on the affected device. Note: To fix this vulnerability, both the Cisco IOS XR Software and the BIOS must be upgraded. The BIOS code is included in Cisco IOS XR Software but might require additional installation steps. For further information, see the Fixed Software section of this advisory."}, {"lang": "es", "value": "Una vulnerabilidad en el cargador de arranque mejorado Preboot eXecution Environment (PXE) para Cisco IOS XR 64-bit Software, podr\u00eda permitir a un atacante remoto no autenticado ejecutar c\u00f3digo sin firmar durante el proceso de arranque de PXE en un dispositivo afectado. El cargador de arranque PXE es parte del BIOS y se ejecuta en la interfaz de administraci\u00f3n de las plataformas de hardware que se ejecutan en Cisco IOS XR Software \u00fanicamente. La vulnerabilidad se presenta porque los comandos internos que son emitidos cuando el proceso de inicio de red de PXE est\u00e1 cargando una imagen de software no es verificada apropiadamente. Un atacante podr\u00eda explotar esta vulnerabilidad al comprometer el servidor de arranque PXE y reemplazando una imagen de software v\u00e1lida por una maliciosa. Alternativamente, el atacante podr\u00eda hacerse pasar por el servidor de arranque PXE y enviar una respuesta de arranque PXE con un archivo malicioso. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar c\u00f3digo sin firmar en el dispositivo afectado. Nota: Para corregir esta vulnerabilidad, tanto el Cisco IOS XR Software como el BIOS deben ser actualizados. El c\u00f3digo del BIOS est\u00e1 incluido en el Cisco IOS XR Software, pero puede requerir pasos de instalaci\u00f3n adicionales. Para obtener m\u00e1s informaci\u00f3n, consulte la secci\u00f3n Fixed Software de este aviso"}], "lastModified": "2024-11-21T05:30:43.397", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a9k-rsp880-se_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBDBFB13-DF54-4689-9E35-2E47B2192A97", "versionEndExcluding": "10.65"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a9k-rsp880-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4BF3547E-D324-4C13-BB0C-1039E2BA89E1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a9k-rsp880-tr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30BC8C36-E478-47DA-9702-55B8723F2CEC", "versionEndExcluding": "10.65"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a9k-rsp880-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EF4E2635-1653-4B13-8E57-0AD504C9AE0C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a99-rp2-se_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "70CE0BF5-C3CD-44A5-A55F-E3933258AEFF", "versionEndExcluding": "14.35"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a99-rp2-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7CBB4E81-D5CB-40A7-B520-561DD59043DB"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a99-rp2-tr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EEA23E2-FB12-4D55-BA67-5048EEBE3F4F", "versionEndExcluding": "14.35"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a99-rp2-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CA9DB189-45B5-458A-8A2F-F0D9DC225385"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a99-rsp-se_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BC7E9FA-9532-4118-9F25-FDC40A36F54C", "versionEndExcluding": "16.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a99-rsp-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "21D7F134-49A8-4D8D-9C04-511F9101F337"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a99-rsp-tr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7258FF33-4D04-4C2C-A6FC-8A67FA3170BF", "versionEndExcluding": "16.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a99-rsp-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E74A7A45-D7A2-4C8F-B044-AA64C551FC9C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a9k-rsp880-lt-se_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5DCF563A-91B7-4A91-9878-C5BA174BD99A", "versionEndExcluding": "17.34"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a9k-rsp880-lt-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B896EA4A-0E16-423A-9853-3C8122924D02"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a9k-rsp880-lt-tr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "538BBBFC-9D8F-4CA0-8D73-489BD7A093CF", "versionEndExcluding": "17.34"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a9k-rsp880-lt-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "13A9ABED-F7A0-4B5E-B60A-364E0F658B2E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:asr-9901-rp_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "125FD6E5-4182-4C4C-806F-745068EB9513", "versionEndExcluding": "22.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asr-9901-rp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DE36709F-DCF2-428F-8746-9C5096182E87"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a99-rp3-se_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76D9F533-8EF1-495E-9C60-BADDAAFB5688", "versionEndExcluding": "30.23"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a99-rp3-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F393681D-7EC1-46D5-BAFB-786528E259B9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a99-rp3-tr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14706D87-7762-4D04-B685-4673EDC41890", "versionEndExcluding": "30.23"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a99-rp3-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "ABE8CE5B-09CF-4138-9495-7223FFA64443"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a9k-rsp5-se_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC4C0E94-0BA0-462B-A5E2-92B22C8C8240", "versionEndExcluding": "31.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a9k-rsp5-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "326F9936-57E7-4E8F-9C51-093788454A3A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:a9k-rsp5-tr_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA656810-6E25-44CC-B184-E95C43B01B02", "versionEndExcluding": "31.20"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:a9k-rsp5-tr:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "884F1D0A-8A6F-45E4-9AC7-A8603AB8AE4E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs1001_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9990ECBC-58E3-4D99-80A2-B23FFF01341F", "versionEndExcluding": "14.60"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs1001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "28C2C545-C591-4960-9DEF-38B0474C0AC7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs1002_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F7B91BC2-2154-4CE8-9C64-6984B898BD61", "versionEndExcluding": "14.60"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs1002:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE1E3721-F2CB-41C3-BB0F-3B130B2B7BEA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs1004_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EA5FB9F-E8BC-407F-A400-DF394D53289E", "versionEndExcluding": "14.60"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs1004:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08F8DE3D-0901-419E-8CCF-C821E66A9773"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n540-12z20g-sys-a\\/d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F4F2D58-DB8B-49EA-9D4E-39B6E9762262", "versionEndExcluding": "1.15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EEE27AF-9402-4DFA-B1CF-E51972485918", "versionEndExcluding": "7.2.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n540-12z20g-sys-a\\/d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4EDA9608-1826-4558-AFC3-C1B480CD5B5F"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n540-24z8q2c-m_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E28CDF66-98EE-4814-8E8D-88B42BF2D39C", "versionEndExcluding": "1.15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n540-24z8q2c-m:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "43D99BD3-20FA-4202-83ED-046CC79A4CAD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n540-28z4c-sys-a\\/d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDCD70F2-F639-4411-8B16-404195B8F546", "versionEndExcluding": "1.15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n540-28z4c-sys-a\\/d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7BAFB4C0-D974-40C6-9B95-59D502AAB980"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n540-acc-sys_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7D6F3C1-A016-4BC2-84BD-BFBC2292DDF1", "versionEndExcluding": "1.15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n540-acc-sys:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1727912A-9D84-4E9A-904A-2909B3B0D97E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n540x-16z4g8q2c-a\\/d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21CE983F-7565-4A08-A0FC-35962E4A567F", "versionEndExcluding": "1.15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n540x-16z4g8q2c-a\\/d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B723C859-29F5-44B2-9844-577A48A65E03"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n540x-12z16g-sys-a\\/d_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18189728-A587-4ED4-AD98-7CD6B10C90E4", "versionEndExcluding": "1.15"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CED75685-A63C-4550-9820-769058BEF572", "versionEndExcluding": "6.5.2"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n540x-12z16g-sys-a\\/d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "86BA75BB-AF9D-41E3-9298-F1C3A541B06A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n560-4-sys_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99EC601E-F56C-4A73-9867-543E0B5A57F5", "versionEndExcluding": "0.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00AFC058-2750-4A6F-B321-DF159214FCA5", "versionEndExcluding": "7.0.2", "versionStartIncluding": "7.0.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n560-4-sys:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "51D2FD1C-F1C3-4EAE-AE6E-436558F64B89"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n560-7-sys_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB20CAD-BEEB-4795-BD03-626145206E6F", "versionEndExcluding": "0.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00AFC058-2750-4A6F-B321-DF159214FCA5", "versionEndExcluding": "7.0.2", "versionStartIncluding": "7.0.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n560-7-sys:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17E36FBD-12D7-459F-870F-E0F78460F354"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n560-4-sys_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99EC601E-F56C-4A73-9867-543E0B5A57F5", "versionEndExcluding": "0.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n560-4-sys:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "51D2FD1C-F1C3-4EAE-AE6E-436558F64B89"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:n560-7-sys_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AB20CAD-BEEB-4795-BD03-626145206E6F", "versionEndExcluding": "0.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:n560-7-sys:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17E36FBD-12D7-459F-870F-E0F78460F354"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs5001_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "36D31052-9774-4E53-B423-EB1DEEDB639E", "versionEndExcluding": "1.13"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EEE27AF-9402-4DFA-B1CF-E51972485918", "versionEndExcluding": "7.2.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs5001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0125AFD3-8EB6-4431-9ADB-87C4387B8DDF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs5002_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BEF787F-6354-4624-B76C-A632E0DB028D", "versionEndExcluding": "1.13"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EEE27AF-9402-4DFA-B1CF-E51972485918", "versionEndExcluding": "7.2.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs5002:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C1A6B310-2DF0-485E-825F-CBCEBB1BFFCF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs5011_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "733F26A6-B928-4A10-9C7C-95707C5519AF", "versionEndExcluding": "1.14"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9EEE27AF-9402-4DFA-B1CF-E51972485918", "versionEndExcluding": "7.2.1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs5011:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "958A8725-23BC-459E-91E4-CCDEB49206C1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nc55-rp_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "780AEF85-6223-463F-93EC-CF784F538694", "versionEndExcluding": "9.30"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:nc55-rp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "AF712093-227B-4C09-A4D7-CD8359BBC740"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nc55-rp-e_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F989B90-6955-42C0-9612-B5541C8EF207", "versionEndExcluding": "1.21"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:nc55-rp-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "52A184BC-EC19-410B-AF7B-4C84BB0078FE"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-5501_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E20EFB74-E3C7-4AC7-B01A-78EEC7C6BFC8", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A3D550E-72F5-4562-9286-09C50D8E47BF", "versionEndExcluding": "1.21"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-5501:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7617BA24-6474-49CF-B78D-0056D3F8385B"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-5501-se_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4ACEF44C-744D-4C38-9A78-95F7CE23D4FF", "versionEndExcluding": "1.21"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-5501-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C3DCE7D6-0E78-4CF3-BF7A-6A4945ADD4F1"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-5502_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A454B9B0-7BE5-43DC-8B8C-8D60B329FDCF", "versionEndExcluding": "1.21"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-5502:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "344675F6-9045-492D-9577-E0CE333AD6E9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-5502-se_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83282391-F848-47CF-9042-7FB7FCBAB674", "versionEndExcluding": "1.21"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-5502-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC7F2221-B5BE-408C-BA84-9776469EE2D5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a2-mod-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66D87D8E-DE4D-4A9E-836F-DE6D4DF998A9", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C33F0D81-1314-440B-9FC2-56D76CA4CD79"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a2-mod-hd-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB8A3FD0-139C-42B5-8251-3B2AA5FE43F4", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-hd-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A95FEA95-703B-44E0-A7CA-9E38B2EB1980"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a2-mod-hx-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2079A71E-8D69-4D05-BEE4-0A3E8C96367C", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-hx-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2D37BF94-9D5F-4A88-8115-3A88FF144845"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a2-mod-se-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DFBF8E16-9A21-4926-913A-2CFAF249FA6F", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C7A32F4-DAFC-4FC9-9941-C13E635DA6D1", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-se-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "15AE071E-0CEF-4305-A92D-9F4C324BD4ED"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a2-mod-se-h-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC4EF65B-B167-4A9F-879D-3CD5ECFFEBE4", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a2-mod-se-h-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8E50806D-115D-4903-A5B2-62654FFDD9F5"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a1-36h-se-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B41FC0C-19F4-4A36-B5E8-C76BC13FFE6E", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a1-36h-se-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "14E948CF-9891-4AC8-8734-9C121B611722"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a1-36h-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93A1889A-D692-4CB1-8A8F-9314C66B453B", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a1-36h-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4FF08FAF-67DD-4361-947A-40D5938DB8BA"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a1-24h_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4AEF4C6-2D65-43E7-BA7E-8C30CDFFF472", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a1-24h:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D8D61548-61B4-4B53-8574-9DB92B00A627"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs55-a1-48q6h_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D35D735C-DD0A-4C05-80FB-7122552FE9BC", "versionEndExcluding": "1.12"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs55-a1-48q6h:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3588C801-DA67-425E-9B97-AA2335F85BAD"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ncs-55a1-24q6h-s_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D57A9DE-FE0A-488E-868B-FCF4C7FDBC89", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CB1D9CB-0063-4E75-96E4-B476B2A63238", "versionEndExcluding": "6.6.25"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs-55a1-24q6h-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "74C8E3C6-282B-4394-A077-DF8694F7E55D"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}