{"id": "CVE-2021-1514", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.6, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV30": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "UNCHANGED", "version": "3.0", "baseScore": 4.4, "attackVector": "LOCAL", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 2.5, "exploitabilityScore": 1.8}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.8, "attackVector": "LOCAL", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "LOW", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.8}]}, "published": "2021-05-06T13:15:10.887", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-QVszVUPy", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-privesc-QVszVUPy", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-20"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-78"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the CLI of Cisco SD-WAN Software could allow an authenticated, local attacker to inject arbitrary commands to be executed with Administrator privileges on the underlying operating system. This vulnerability is due to insufficient input validation on certain CLI commands. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the CLI. The attacker must be authenticated as a low-privileged user to execute the affected commands. A successful exploit could allow the attacker to execute commands with Administrator privileges."}, {"lang": "es", "value": "Una vulnerabilidad en la CLI de Cisco SD-WAN Software, podr\u00eda permitir a un atacante local autenticado inyectar comandos arbitrarios para que sean ejecutados con privilegios de administrador en el Sistema Operativo subyacente. Esta vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de la entrada en determinados comandos de la CLI. Un atacante podr\u00eda explotar esta vulnerabilidad si se autentica en el dispositivo y env\u00eda una entrada dise\u00f1ada a la CLI. El atacante debe estar autenticado como un usuario poco privilegiado para ejecutar los comandos afectados. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante ejecutar comandos con privilegios de administrador"}], "lastModified": "2024-11-21T05:44:31.353", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "294BFF76-0352-4778-B6DA-3F8D5C69B5EE", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3366F4EC-9DCD-44F8-8430-1B3BA7A9B95F", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2D155FE-14C5-4658-A5D4-974DCE7FED4F", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:a:cisco:catalyst_sd-wan_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BE2C4782-DD4D-4113-A367-13DA609AD5F4", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}, {"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBCB1ED4-B8F6-454A-A50E-1E6C5799A38B", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52660B0F-9951-4720-9243-C04D19E1C900", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43CB0C13-B19C-4716-9079-E3187C6A8F60", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CBDDA10-0C6A-4AE2-A79D-6ACE91BCE422", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:a:cisco:sd-wan_vbond_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3079495E-BB87-48EF-92F2-5C0DFBBDFB2D", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}, {"criteria": "cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA56832C-0BA7-49F8-B03D-F7A8DDBA2D76", "versionEndExcluding": "18.3"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9F385B4-A7C9-4964-9A2F-9B246C2A4219", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35D792D2-7C42-4E49-A024-7D8F10A5CD03", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "89290824-9E80-4DA6-B943-500A9DC80EF4", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57361E3C-D8AD-4971-8015-96B8910B847D", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vsmart_controller_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6B61FD2-6C23-4A1A-AED4-CAD54D0715C4", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vsmart_controller:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FF370668-127C-409B-83FE-293B830D4FB4"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E03063D-9DB6-4D3A-8FFF-C530635371CC", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43E988F6-8D4D-4E75-9C43-31E92AA3F85A", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C67D65F-5DBD-4DCE-84CF-F1F2FBA4A250", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7BFED2F3-4C18-4BE5-9F97-2CFCE37E7A2E", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge_100_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B89D5AE2-3ED3-4C57-AF93-E9750D38F029", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "00AAB4DD-1C45-412F-84AA-C056A0BBFB9A"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBF226AE-FF8F-4203-8DAC-438E82AEC85A", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1AD6B70F-1356-4AB4-A8DB-6BB3BAD854A6", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "669F7796-2CBF-42BF-91C4-F861DF09D4B7", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50C849A5-EBF4-4CD7-93AE-503C3E0B7A05", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge_1000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "834192CC-585D-445E-B2AD-D73E9CDF3FED", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F019975D-3A45-4522-9CB9-F4258C371DF6"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A5A7F2E-0B61-4C4C-AE1F-BAFB735DA905", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1158B505-4DAC-42BB-A9E5-533BCA7545F4", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "427DC9A5-3374-440C-A797-DC7BBCCCB13D", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12136AD8-9113-46B9-B6A9-0C330ABB05B9", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge_100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "632EBFCA-132A-4AC9-A244-7D6EBCAEAC16", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0811E0B5-889E-451E-B754-A8FEE32BDFA2"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E77822B-DEF3-44C3-9AFE-A406ECD26EE5", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9A4C603C-9858-4048-AA20-7C7F7BB84DBD", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A51AE026-39C0-400B-8E78-21ACBF6D560F", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "829BA8C4-8E99-4338-817B-9F9FF37105BE", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge_100m_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6375DFCF-2EEB-482B-AAD4-8FAB8F03C9C0", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36973815-F46D-4ADA-B9DF-BCB70AC60BD3"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "646D2962-5FB3-45E1-B743-CFDF6219742B", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B55B533F-0942-4848-A823-8D17BD9C70AC", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04BBF912-56A4-4B0D-AEDE-3B4A66E46DC6", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "200199EC-2819-4DE0-828C-0F56790CA1B4", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge_100wm_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "104BBAE4-C7C1-4E5A-A540-AF679FCE1CD2", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "061A302C-8D35-4E80-93DA-916DA7E90C06"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66F09F72-2D64-4952-8ED1-5B1D8817B065", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28170198-23CE-48F9-8502-3C0F51EDCB33", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48758B17-6BB7-45BB-AB83-36AF55238250", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E479E1A4-0F80-4FDC-8F9F-9E23A885179A", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge_2000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "584863D2-B181-4CDF-8266-EEBA56A5AA85", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "140AF13E-4463-478B-AA94-97406A80CB86"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5488D32F-808B-4327-8C57-13F270C02C1B", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B559B94-0730-4F3D-90AB-E71D2E684C19", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2090A040-270A-4BD1-8430-603C709F64E8", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4288CD57-CDEE-4B03-8163-7CDDE7767914", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge_5000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50C0D971-E2C4-4048-A08F-0A5D437866F8", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1356861D-E6CA-4973-9597-629507E8C07E"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge-100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F1B097C-09B1-4DC6-B0F9-92E01C415DF3", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge-100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FA95C6C-72C5-4DDF-B036-5AB2900C9C71", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge-100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C8123987-EAD3-47D2-AD9F-167A1D52AEF7", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge-100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25953689-6E4F-477A-A251-54C1D8ED8880", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge-100b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3414238A-002E-48F7-82DE-FE4122B1A10A", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge-100b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "07E7851F-3E72-4677-B907-CF777EBED2FF"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83F5CAE4-CB80-441B-928D-86C13570AA1B", "versionEndExcluding": "18.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC788143-279B-4325-988A-5FBAA4B438CC", "versionEndExcluding": "20.1.1", "versionStartIncluding": "20.1"}, {"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FBE16B1-8E2A-4DF8-B362-86874FAC1F0C", "versionEndExcluding": "20.3.1", "versionStartIncluding": "20.3"}, {"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "430D9FAC-36E8-4AB0-85F2-88D7EF1F6B7A", "versionEndExcluding": "20.4.1", "versionStartIncluding": "20.4"}, {"criteria": "cpe:2.3:o:cisco:vedge_cloud_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDBBDE43-BBAE-431B-AF56-73D9CC8743F7", "versionEndExcluding": "20.5.1", "versionStartIncluding": "20.5"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:vedge_cloud:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "94999112-9EAA-4707-B002-F867D7628C49"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}