Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-3860 (GCVE-0-2017-3860)
Vulnerability from cvelistv5 – Published: 2017-04-20 22:00 – Updated: 2024-08-05 14:39| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Cisco IOS and IOS XE |
Affected:
Cisco IOS and IOS XE
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:39:41.088Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1038313",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038313"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
},
{
"name": "97935",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/97935"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS and IOS XE",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Cisco IOS and IOS XE"
}
]
}
],
"datePublic": "2017-04-20T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T09:57:01.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1038313",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038313"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
},
{
"name": "97935",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/97935"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2017-3860",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE",
"version": {
"version_data": [
{
"version_value": "Cisco IOS and IOS XE"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1038313",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038313"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
},
{
"name": "97935",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97935"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2017-3860",
"datePublished": "2017-04-20T22:00:00.000Z",
"dateReserved": "2016-12-21T00:00:00.000Z",
"dateUpdated": "2024-08-05T14:39:41.088Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2017-3860
Vulnerability from fkie_nvd - Published: 2017-04-20 22:59 - Updated: 2025-04-20 01:37| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.2\(33\)sxi4 | |
| cisco | ios | 12.2\(33\)sxi4a | |
| cisco | ios | 12.2\(33\)sxi5 | |
| cisco | ios | 12.2\(33\)sxi6 | |
| cisco | ios | 12.2\(33\)sxi7 | |
| cisco | ios | 12.2\(33\)sxi8 | |
| cisco | ios | 12.2\(33\)sxi8a | |
| cisco | ios | 12.2\(33\)sxi9 | |
| cisco | ios | 12.2\(33\)sxi10 | |
| cisco | ios | 12.2\(33\)sxi11 | |
| cisco | ios | 12.2\(33\)sxi12 | |
| cisco | ios | 12.2\(33\)sxi13 | |
| cisco | ios | 12.2\(33\)sxi14 | |
| cisco | ios | 12.2\(33\)sxj | |
| cisco | ios | 12.2\(33\)sxj1 | |
| cisco | ios | 12.2\(33\)sxj2 | |
| cisco | ios | 12.2\(33\)sxj3 | |
| cisco | ios | 12.2\(33\)sxj4 | |
| cisco | ios | 12.2\(33\)sxj5 | |
| cisco | ios | 12.2\(33\)sxj6 | |
| cisco | ios | 12.2\(33\)sxj7 | |
| cisco | ios | 12.2\(33\)sxj8 | |
| cisco | ios | 12.2\(33\)sxj9 | |
| cisco | ios | 12.2\(33\)sxj10 | |
| cisco | ios | 12.2\(52\)ex | |
| cisco | ios | 12.2\(52\)ex1 | |
| cisco | ios | 12.2\(52\)ey | |
| cisco | ios | 12.2\(52\)ey1 | |
| cisco | ios | 12.2\(52\)ey1b | |
| cisco | ios | 12.2\(52\)ey1c | |
| cisco | ios | 12.2\(52\)ey2 | |
| cisco | ios | 12.2\(52\)ey2a | |
| cisco | ios | 12.2\(52\)ey3 | |
| cisco | ios | 12.2\(52\)ey3a | |
| cisco | ios | 12.2\(52\)ey4 | |
| cisco | ios | 12.2\(53\)ex | |
| cisco | ios | 12.2\(53\)ey | |
| cisco | ios | 12.2\(53\)ez | |
| cisco | ios | 12.2\(53\)se | |
| cisco | ios | 12.2\(53\)se1 | |
| cisco | ios | 12.2\(53\)se2 | |
| cisco | ios | 12.2\(54\)se | |
| cisco | ios | 12.2\(54\)sg | |
| cisco | ios | 12.2\(54\)sg1 | |
| cisco | ios | 12.2\(54\)wo | |
| cisco | ios | 12.2\(54\)xo | |
| cisco | ios | 12.2\(55\)ex | |
| cisco | ios | 12.2\(55\)ex1 | |
| cisco | ios | 12.2\(55\)ex2 | |
| cisco | ios | 12.2\(55\)ex3 | |
| cisco | ios | 12.2\(55\)ey | |
| cisco | ios | 12.2\(55\)ez | |
| cisco | ios | 12.2\(55\)se | |
| cisco | ios | 12.2\(55\)se1 | |
| cisco | ios | 12.2\(55\)se2 | |
| cisco | ios | 12.2\(55\)se3 | |
| cisco | ios | 12.2\(55\)se4 | |
| cisco | ios | 12.2\(55\)se5 | |
| cisco | ios | 12.2\(55\)se6 | |
| cisco | ios | 12.2\(55\)se7 | |
| cisco | ios | 12.2\(55\)se8 | |
| cisco | ios | 12.2\(55\)se9 | |
| cisco | ios | 12.2\(55\)se10 | |
| cisco | ios | 12.2\(55\)se11 | |
| cisco | ios | 12.2\(58\)ey | |
| cisco | ios | 12.2\(58\)ey1 | |
| cisco | ios | 12.2\(58\)ey2 | |
| cisco | ios | 12.2\(58\)se | |
| cisco | ios | 12.2\(58\)se1 | |
| cisco | ios | 12.2\(58\)se2 | |
| cisco | ios | 12.2\(60\)ez | |
| cisco | ios | 12.2\(60\)ez1 | |
| cisco | ios | 12.2\(60\)ez2 | |
| cisco | ios | 12.2\(60\)ez3 | |
| cisco | ios | 12.2\(60\)ez4 | |
| cisco | ios | 12.2\(60\)ez5 | |
| cisco | ios | 12.2\(60\)ez6 | |
| cisco | ios | 12.2\(60\)ez7 | |
| cisco | ios | 12.2\(60\)ez8 | |
| cisco | ios | 12.2\(60\)ez9 | |
| cisco | ios | 15.0\(1\)m2 | |
| cisco | ios | 15.0\(1\)m3 | |
| cisco | ios | 15.0\(1\)m4 | |
| cisco | ios | 15.0\(1\)m5 | |
| cisco | ios | 15.0\(1\)m6 | |
| cisco | ios | 15.0\(1\)m7 | |
| cisco | ios | 15.0\(1\)m8 | |
| cisco | ios | 15.0\(1\)m9 | |
| cisco | ios | 15.0\(1\)m10 | |
| cisco | ios | 15.0\(1\)se | |
| cisco | ios | 15.0\(1\)se1 | |
| cisco | ios | 15.0\(1\)se2 | |
| cisco | ios | 15.0\(1\)se3 | |
| cisco | ios | 15.0\(1\)sy1 | |
| cisco | ios | 15.0\(1\)sy2 | |
| cisco | ios | 15.0\(1\)sy3 | |
| cisco | ios | 15.0\(1\)sy4 | |
| cisco | ios | 15.0\(1\)sy5 | |
| cisco | ios | 15.0\(1\)sy6 | |
| cisco | ios | 15.0\(1\)sy7 | |
| cisco | ios | 15.0\(1\)sy7a | |
| cisco | ios | 15.0\(1\)sy8 | |
| cisco | ios | 15.0\(1\)sy9 | |
| cisco | ios | 15.0\(1\)sy10 | |
| cisco | ios | 15.0\(1\)xo | |
| cisco | ios | 15.0\(1\)xo1 | |
| cisco | ios | 15.0\(2\)ed | |
| cisco | ios | 15.0\(2\)ed1 | |
| cisco | ios | 15.0\(2\)eh | |
| cisco | ios | 15.0\(2\)ej | |
| cisco | ios | 15.0\(2\)ej1 | |
| cisco | ios | 15.0\(2\)ek | |
| cisco | ios | 15.0\(2\)ek1 | |
| cisco | ios | 15.0\(2\)ex | |
| cisco | ios | 15.0\(2\)ex1 | |
| cisco | ios | 15.0\(2\)ex2 | |
| cisco | ios | 15.0\(2\)ex3 | |
| cisco | ios | 15.0\(2\)ex4 | |
| cisco | ios | 15.0\(2\)ex5 | |
| cisco | ios | 15.0\(2\)ex8 | |
| cisco | ios | 15.0\(2\)ex10 | |
| cisco | ios | 15.0\(2\)ez | |
| cisco | ios | 15.0\(2\)se | |
| cisco | ios | 15.0\(2\)se1 | |
| cisco | ios | 15.0\(2\)se2 | |
| cisco | ios | 15.0\(2\)se3 | |
| cisco | ios | 15.0\(2\)se4 | |
| cisco | ios | 15.0\(2\)se5 | |
| cisco | ios | 15.0\(2\)se6 | |
| cisco | ios | 15.0\(2\)se7 | |
| cisco | ios | 15.0\(2\)se9 | |
| cisco | ios | 15.0\(2\)se10 | |
| cisco | ios | 15.0\(2\)sg | |
| cisco | ios | 15.0\(2\)sg1 | |
| cisco | ios | 15.0\(2\)sg2 | |
| cisco | ios | 15.0\(2\)sg3 | |
| cisco | ios | 15.0\(2\)sg4 | |
| cisco | ios | 15.0\(2\)sg5 | |
| cisco | ios | 15.0\(2\)sg6 | |
| cisco | ios | 15.0\(2\)sg7 | |
| cisco | ios | 15.0\(2\)sg8 | |
| cisco | ios | 15.0\(2\)xo | |
| cisco | ios | 15.0\(2a\)ex5 | |
| cisco | ios | 15.0\(2a\)se9 | |
| cisco | ios | 15.1\(1\)sg | |
| cisco | ios | 15.1\(1\)sg1 | |
| cisco | ios | 15.1\(1\)sg2 | |
| cisco | ios | 15.1\(1\)sy | |
| cisco | ios | 15.1\(1\)sy2 | |
| cisco | ios | 15.1\(1\)sy3 | |
| cisco | ios | 15.1\(1\)sy4 | |
| cisco | ios | 15.1\(1\)sy5 | |
| cisco | ios | 15.1\(1\)sy6 | |
| cisco | ios | 15.1\(1\)t | |
| cisco | ios | 15.1\(1\)t1 | |
| cisco | ios | 15.1\(1\)t2 | |
| cisco | ios | 15.1\(1\)t3 | |
| cisco | ios | 15.1\(1\)t4 | |
| cisco | ios | 15.1\(1\)t5 | |
| cisco | ios | 15.1\(2\)gc | |
| cisco | ios | 15.1\(2\)gc1 | |
| cisco | ios | 15.1\(2\)gc2 | |
| cisco | ios | 15.1\(2\)sg | |
| cisco | ios | 15.1\(2\)sg1 | |
| cisco | ios | 15.1\(2\)sg2 | |
| cisco | ios | 15.1\(2\)sg3 | |
| cisco | ios | 15.1\(2\)sg4 | |
| cisco | ios | 15.1\(2\)sg5 | |
| cisco | ios | 15.1\(2\)sg6 | |
| cisco | ios | 15.1\(2\)sg7 | |
| cisco | ios | 15.1\(2\)sg8 | |
| cisco | ios | 15.1\(2\)sy | |
| cisco | ios | 15.1\(2\)sy1 | |
| cisco | ios | 15.1\(2\)sy2 | |
| cisco | ios | 15.1\(2\)sy3 | |
| cisco | ios | 15.1\(2\)sy4 | |
| cisco | ios | 15.1\(2\)sy4a | |
| cisco | ios | 15.1\(2\)sy5 | |
| cisco | ios | 15.1\(2\)sy6 | |
| cisco | ios | 15.1\(2\)sy7 | |
| cisco | ios | 15.1\(2\)sy8 | |
| cisco | ios | 15.1\(2\)sy10 | |
| cisco | ios | 15.1\(2\)t | |
| cisco | ios | 15.1\(2\)t0a | |
| cisco | ios | 15.1\(2\)t1 | |
| cisco | ios | 15.1\(2\)t2 | |
| cisco | ios | 15.1\(2\)t2a | |
| cisco | ios | 15.1\(2\)t3 | |
| cisco | ios | 15.1\(2\)t4 | |
| cisco | ios | 15.1\(2\)t5 | |
| cisco | ios | 15.1\(3\)t | |
| cisco | ios | 15.1\(3\)t1 | |
| cisco | ios | 15.1\(3\)t2 | |
| cisco | ios | 15.1\(3\)t3 | |
| cisco | ios | 15.1\(3\)t4 | |
| cisco | ios | 15.1\(4\)gc | |
| cisco | ios | 15.1\(4\)gc1 | |
| cisco | ios | 15.1\(4\)gc2 | |
| cisco | ios | 15.1\(4\)m | |
| cisco | ios | 15.1\(4\)m1 | |
| cisco | ios | 15.1\(4\)m2 | |
| cisco | ios | 15.1\(4\)m3 | |
| cisco | ios | 15.1\(4\)m3a | |
| cisco | ios | 15.1\(4\)m4 | |
| cisco | ios | 15.1\(4\)m5 | |
| cisco | ios | 15.1\(4\)m6 | |
| cisco | ios | 15.1\(4\)m7 | |
| cisco | ios | 15.1\(4\)m8 | |
| cisco | ios | 15.1\(4\)m9 | |
| cisco | ios | 15.1\(4\)m10 | |
| cisco | ios | 15.2\(1\)e | |
| cisco | ios | 15.2\(1\)e1 | |
| cisco | ios | 15.2\(1\)e2 | |
| cisco | ios | 15.2\(1\)e3 | |
| cisco | ios | 15.2\(1\)gc | |
| cisco | ios | 15.2\(1\)gc1 | |
| cisco | ios | 15.2\(1\)gc2 | |
| cisco | ios | 15.2\(1\)sy | |
| cisco | ios | 15.2\(1\)sy0a | |
| cisco | ios | 15.2\(1\)sy1 | |
| cisco | ios | 15.2\(1\)sy1a | |
| cisco | ios | 15.2\(1\)sy2 | |
| cisco | ios | 15.2\(1\)sy3 | |
| cisco | ios | 15.2\(1\)t | |
| cisco | ios | 15.2\(1\)t1 | |
| cisco | ios | 15.2\(1\)t2 | |
| cisco | ios | 15.2\(1\)t3 | |
| cisco | ios | 15.2\(1\)t3a | |
| cisco | ios | 15.2\(1\)t4 | |
| cisco | ios | 15.2\(2\)e | |
| cisco | ios | 15.2\(2\)e1 | |
| cisco | ios | 15.2\(2\)e2 | |
| cisco | ios | 15.2\(2\)e4 | |
| cisco | ios | 15.2\(2\)e5 | |
| cisco | ios | 15.2\(2\)e5a | |
| cisco | ios | 15.2\(2\)eb | |
| cisco | ios | 15.2\(2\)eb1 | |
| cisco | ios | 15.2\(2\)eb2 | |
| cisco | ios | 15.2\(2\)gc | |
| cisco | ios | 15.2\(2\)sy | |
| cisco | ios | 15.2\(2\)sy1 | |
| cisco | ios | 15.2\(2\)sy2 | |
| cisco | ios | 15.2\(2\)t | |
| cisco | ios | 15.2\(2\)t1 | |
| cisco | ios | 15.2\(2\)t2 | |
| cisco | ios | 15.2\(2\)t3 | |
| cisco | ios | 15.2\(2\)t4 | |
| cisco | ios | 15.2\(2a\)e1 | |
| cisco | ios | 15.2\(3\)e | |
| cisco | ios | 15.2\(3\)e1 | |
| cisco | ios | 15.2\(3\)e2 | |
| cisco | ios | 15.2\(3\)e3 | |
| cisco | ios | 15.2\(3\)gc | |
| cisco | ios | 15.2\(3\)gc1 | |
| cisco | ios | 15.2\(3\)t | |
| cisco | ios | 15.2\(3\)t1 | |
| cisco | ios | 15.2\(3\)t2 | |
| cisco | ios | 15.2\(3\)t3 | |
| cisco | ios | 15.2\(3\)t4 | |
| cisco | ios | 15.2\(3a\)e | |
| cisco | ios | 15.2\(3m\)e2 | |
| cisco | ios | 15.2\(4\)e | |
| cisco | ios | 15.2\(4\)gc | |
| cisco | ios | 15.2\(4\)gc1 | |
| cisco | ios | 15.2\(4\)gc2 | |
| cisco | ios | 15.2\(4\)gc3 | |
| cisco | ios | 15.2\(4\)m | |
| cisco | ios | 15.2\(4\)m1 | |
| cisco | ios | 15.2\(4\)m2 | |
| cisco | ios | 15.2\(4\)m3 | |
| cisco | ios | 15.2\(4\)m4 | |
| cisco | ios | 15.2\(4\)m5 | |
| cisco | ios | 15.2\(4\)m6 | |
| cisco | ios | 15.2\(4\)m6a | |
| cisco | ios | 15.2\(4\)m7 | |
| cisco | ios | 15.2\(4\)m8 | |
| cisco | ios | 15.2\(4\)m9 | |
| cisco | ios | 15.2\(4\)m10 | |
| cisco | ios | 15.2\(4\)m11 | |
| cisco | ios | 15.3\(1\)sy | |
| cisco | ios | 15.3\(1\)sy2 | |
| cisco | ios | 15.3\(1\)t | |
| cisco | ios | 15.3\(1\)t1 | |
| cisco | ios | 15.3\(1\)t2 | |
| cisco | ios | 15.3\(1\)t3 | |
| cisco | ios | 15.3\(1\)t4 | |
| cisco | ios | 15.3\(2\)t | |
| cisco | ios | 15.3\(2\)t1 | |
| cisco | ios | 15.3\(2\)t2 | |
| cisco | ios | 15.3\(2\)t3 | |
| cisco | ios | 15.3\(2\)t4 | |
| cisco | ios | 15.3\(3\)m | |
| cisco | ios | 15.3\(3\)m1 | |
| cisco | ios | 15.3\(3\)m2 | |
| cisco | ios | 15.3\(3\)m3 | |
| cisco | ios | 15.3\(3\)m4 | |
| cisco | ios | 15.3\(3\)m5 | |
| cisco | ios | 15.3\(3\)m6 | |
| cisco | ios | 15.3\(3\)m7 | |
| cisco | ios | 15.3\(3\)m9 | |
| cisco | ios | 15.4\(1\)cg | |
| cisco | ios | 15.4\(1\)cg1 | |
| cisco | ios | 15.4\(1\)sy | |
| cisco | ios | 15.4\(1\)sy1 | |
| cisco | ios | 15.4\(1\)t | |
| cisco | ios | 15.4\(1\)t1 | |
| cisco | ios | 15.4\(1\)t2 | |
| cisco | ios | 15.4\(1\)t3 | |
| cisco | ios | 15.4\(1\)t4 | |
| cisco | ios | 15.4\(2\)cg | |
| cisco | ios | 15.4\(2\)t | |
| cisco | ios | 15.4\(2\)t1 | |
| cisco | ios | 15.4\(2\)t2 | |
| cisco | ios | 15.4\(2\)t3 | |
| cisco | ios | 15.4\(2\)t4 | |
| cisco | ios | 15.4\(3\)m | |
| cisco | ios | 15.4\(3\)m1 | |
| cisco | ios | 15.4\(3\)m2 | |
| cisco | ios | 15.4\(3\)m3 | |
| cisco | ios | 15.4\(3\)m4 | |
| cisco | ios | 15.4\(3\)m5 | |
| cisco | ios | 15.4\(3\)m6 | |
| cisco | ios | 15.4\(3\)m6a | |
| cisco | ios | 15.4\(3\)m7 | |
| cisco | ios | 15.5\(1\)t | |
| cisco | ios | 15.5\(1\)t1 | |
| cisco | ios | 15.5\(1\)t2 | |
| cisco | ios | 15.5\(1\)t3 | |
| cisco | ios | 15.5\(2\)t | |
| cisco | ios | 15.5\(2\)t1 | |
| cisco | ios | 15.5\(2\)t2 | |
| cisco | ios | 15.5\(2\)t3 | |
| cisco | ios | 15.5\(2\)t4 | |
| cisco | ios | 15.5\(3\)m0a | |
| cisco | ios | 15.5\(3\)m1 | |
| cisco | ios | 15.5\(3\)m2 | |
| cisco | ios | 15.5\(3\)m4 | |
| cisco | ios | 15.5\(3\)m4a | |
| cisco | ios | 15.5\(3\)m5 | |
| cisco | ios | 15.5\(3\)s5 | |
| cisco | ios | 15.6\(1\)t | |
| cisco | ios | 15.6\(1\)t0a | |
| cisco | ios | 15.6\(1\)t1 | |
| cisco | ios | 15.6\(1\)t2 | |
| cisco | ios | 15.6\(2\)t | |
| cisco | ios | 15.6\(2\)t1 | |
| cisco | ios | 15.6\(2\)t2 | |
| cisco | ios | 15.6\(3\)m | |
| cisco | ios | 15.6\(3\)m0a | |
| cisco | ios | 15.6\(3\)m1 | |
| cisco | ios | 15.6\(3\)m1b | |
| cisco | ios | 15.6\(3\)m2 | |
| cisco | ios_xe | 3.2.1sg | |
| cisco | ios_xe | 3.2.8sg | |
| cisco | ios_xe | 3.3.1sg | |
| cisco | ios_xe | 3.3.1sq | |
| cisco | ios_xe | 3.4.1sg | |
| cisco | ios_xe | 3.4.2sg | |
| cisco | ios_xe | 3.4.3sg | |
| cisco | ios_xe | 3.4.6sg | |
| cisco | ios_xe | 3.4.8sg | |
| cisco | ios_xe | 3.5.1e | |
| cisco | ios_xe | 3.5.3e | |
| cisco | ios_xe | 3.6.0e | |
| cisco | ios_xe | 3.6.1e | |
| cisco | ios_xe | 3.6.2ae | |
| cisco | ios_xe | 3.6.2e | |
| cisco | ios_xe | 3.6.4e | |
| cisco | ios_xe | 3.6.5ae | |
| cisco | ios_xe | 3.6.5e | |
| cisco | ios_xe | 3.7.0e | |
| cisco | ios_xe | 3.7.1e | |
| cisco | ios_xe | 3.7.2e | |
| cisco | ios_xe | 3.7.3e | |
| cisco | ios_xe | 3.8.0e | |
| cisco | ios_xe | 3.18.1sp |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4:*:*:*:*:*:*:*",
"matchCriteriaId": "8940ECBB-CA08-4292-AA5C-55AB95D98580",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4a:*:*:*:*:*:*:*",
"matchCriteriaId": "0C29F00F-1779-46BB-9964-8692AB4AD04F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi5:*:*:*:*:*:*:*",
"matchCriteriaId": "950F3BA6-DEEB-4EA5-96E3-88B33B0331D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi6:*:*:*:*:*:*:*",
"matchCriteriaId": "C48E7E3A-61B2-4188-831C-26EB583ECD71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi7:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C54AA9-EFDB-43A5-AD00-4E9965881927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8:*:*:*:*:*:*:*",
"matchCriteriaId": "B7497ED9-109E-4B44-8C16-D43F7FA1A326",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8a:*:*:*:*:*:*:*",
"matchCriteriaId": "2E9F3020-E327-4DA0-BD2A-22677BEA0629",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi9:*:*:*:*:*:*:*",
"matchCriteriaId": "B8B34634-EAEA-4FAC-98DD-E50EB7FE9286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi10:*:*:*:*:*:*:*",
"matchCriteriaId": "875897DB-094B-41BD-9205-9D4564B52998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi11:*:*:*:*:*:*:*",
"matchCriteriaId": "7B119CD4-DA82-4F35-B5CD-71E2434C23B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi12:*:*:*:*:*:*:*",
"matchCriteriaId": "0D581EB8-FBAC-4F48-82B5-6F8BEE2D8CBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi13:*:*:*:*:*:*:*",
"matchCriteriaId": "9C3855C5-86C9-4408-B644-78E0B17F6F62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi14:*:*:*:*:*:*:*",
"matchCriteriaId": "68B47AFB-BFB5-4DF1-9F05-695BBDC21CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB7463C-01C6-4483-8EF1-1E1257738CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj1:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFE2CEF-595A-4D4D-A741-4562CD03B67F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6EC6DC5-E871-43E3-991E-0EE4B310CA9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj3:*:*:*:*:*:*:*",
"matchCriteriaId": "102395E9-4110-4C7C-B152-5C60EB17D1DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4200124-000B-49C0-B380-A478C1CF4A71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj5:*:*:*:*:*:*:*",
"matchCriteriaId": "B40BAA65-D2A7-42BB-BAD7-C9F7FCE7B123",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj6:*:*:*:*:*:*:*",
"matchCriteriaId": "831B9DB1-8AB9-45A7-8DC4-FD6CED335D88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj7:*:*:*:*:*:*:*",
"matchCriteriaId": "9F17158D-9CCD-4186-B97D-51242AB92547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj8:*:*:*:*:*:*:*",
"matchCriteriaId": "1E920061-80A8-41E0-BA64-A20264020C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj9:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB5FB44-0CD9-40E1-80EC-C8CFBA023FD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj10:*:*:*:*:*:*:*",
"matchCriteriaId": "8F3509F6-5475-4924-9E5C-4E2E03D65F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0BE6E0-3D82-4B2A-9B4B-C50021F0687A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD063290-8E11-43E3-B55E-411551074C60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "B48A6E72-A63C-487C-BD50-3902D328C011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "F2D964C2-D315-45AA-BA20-F3723EDCF413",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey1b:*:*:*:*:*:*:*",
"matchCriteriaId": "070A8CD5-93F3-4A40-A533-98DFE63FB699",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey1c:*:*:*:*:*:*:*",
"matchCriteriaId": "43938EBD-70E9-415E-83C0-8CED61EB84DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "95FC422E-1DCC-48BF-84BC-9082F559644B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey2a:*:*:*:*:*:*:*",
"matchCriteriaId": "AAB3C3CD-1E42-4E59-AA9C-4AB91DAE917B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey3:*:*:*:*:*:*:*",
"matchCriteriaId": "FBF9F501-FC58-489F-9662-4DD30DEBDF82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey3a:*:*:*:*:*:*:*",
"matchCriteriaId": "42FB6BD4-CFCA-4BE6-8C82-9F83A3F41C70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey4:*:*:*:*:*:*:*",
"matchCriteriaId": "0520B01C-956E-4C74-AA03-F028C25C2DF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "BADE2AE1-346A-462F-AF0A-3022EB2ED66F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "41DADD4F-B761-406B-8BF1-A7AF0C6896D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "9600F1FE-17F6-4F6D-886A-ED95FEA9A3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "17356A3C-0C05-46A7-89EF-A2C48DDEC4A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5C5C5D-B40A-4DD6-A10C-C8713CCF2E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE68EAC3-05F4-46C5-8A48-4ECFF1844BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "83184158-7C5F-4294-895E-7CF5B76A0F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A081B105-AD3F-4529-B3E7-D8B0851C83B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "B3142DA6-0FA9-4CEC-95FC-938AFD944BAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
"matchCriteriaId": "1644E8D2-E3F2-4ACB-A0D0-F374B565D121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC24BF9-DCD1-4974-A2C7-654E9B469C1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6F8F86-8C63-4A29-A384-62A849848EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "19D89B24-5DE1-4E15-B539-EC3FF6BA0658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "87760068-4255-4D18-A62D-FDC156F7A654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "D8AF551C-1482-489C-AC4B-DF3E9BBB0F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "904C4D5C-F603-42CE-9CAD-28B01223452B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "06D0BBED-E68E-43B7-93F5-FC5DEE7BEB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "63C5C43F-67A3-4000-845E-FDA620AD1B90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "565F3777-89E2-4159-9D8E-629EB7A56837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E3912E-11F7-421B-A5C4-35568A6E386B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "5362C676-5002-4ABC-9C60-97D4B65A399D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D14EB41-CD6A-483A-8F68-9072E436807D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "A61323E0-9CBA-4629-87C8-9F8B59ABD4A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "8D2A859E-3B77-4CAE-A38D-C1CF3FFB6DAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "91CCEA43-40D6-4A6A-A235-2301DE7C4056",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D38633-31AE-42E9-8FFA-77C8EFA9AABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D6D9CC-70F0-475C-8AB0-48980596BE47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "69AB39F8-5D39-4E8A-A8A5-B91718D37A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez1:*:*:*:*:*:*:*",
"matchCriteriaId": "63328822-DC2E-41A3-9E12-F5F824847AFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez2:*:*:*:*:*:*:*",
"matchCriteriaId": "350D9AFE-66AD-486B-B42D-E6A3CE62640C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez3:*:*:*:*:*:*:*",
"matchCriteriaId": "73D67BDA-AEA7-4ED2-AFA4-20283B446602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"matchCriteriaId": "8D593974-6D7B-4AF8-85B2-A77D8BE5CD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B4BFC4-F2C9-4D5E-AD22-3AAF36CFB12A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez6:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2E6D25-7528-4433-9BB3-4F45DB0FE8B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez7:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E1ADA5-C782-4F8A-A77C-A895B402A792",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez8:*:*:*:*:*:*:*",
"matchCriteriaId": "698C897E-CE32-4350-9315-DEE4EA5FF02C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez9:*:*:*:*:*:*:*",
"matchCriteriaId": "76C7FF79-0AFF-4DB5-BDCA-797B8FAB7F8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "A801C7F1-7E15-4B40-A2F0-DD181F13DB3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A735690-4813-486E-929A-2F97F51FDEBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "A6BB6662-6683-4EA7-B2E2-984FB68977AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "5C8720B1-11DF-47E6-90C3-F0D3F77E69D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "50FA81AE-B37E-4F38-ABAD-44EF200FA5CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "3083C5E7-A17A-4744-A700-697FF50B5444",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "3E760F98-3A9B-48BE-83AD-22672B15C619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "049F7107-B407-4F99-8688-738AF3AF4CBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m10:*:*:*:*:*:*:*",
"matchCriteriaId": "97EC3675-6213-4AA2-9C91-73A89AD7D98C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "971AAF00-63AA-4B3F-8E0F-B8FBD011C071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "551A0087-5926-46AF-B1DA-3AA18FAB87E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "E19A2402-F662-4900-8137-B14EB2537173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "5757C194-AF18-434C-9F19-2FC775720556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "DF5B2E97-12F4-4B3B-90C6-106667787472",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "68BFDF59-CDED-4A52-9E24-673E86B00C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "331D55CC-055A-47E9-9019-B6AEAE0F8576",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "9AE53F4B-83D6-4E40-8117-D1983E798CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy5:*:*:*:*:*:*:*",
"matchCriteriaId": "21941E6C-4DE9-45EA-8B14-CCEF208C458F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy6:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC8D765-D1F3-43E9-BCBA-DBC4FA7BAB6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7:*:*:*:*:*:*:*",
"matchCriteriaId": "6C06387D-C32E-4C3A-9A02-C0748DB88D7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7a:*:*:*:*:*:*:*",
"matchCriteriaId": "D754113E-26FE-4E2E-AFF0-680866C32CB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy8:*:*:*:*:*:*:*",
"matchCriteriaId": "0489630E-150D-4C80-8E93-045B89A83631",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy9:*:*:*:*:*:*:*",
"matchCriteriaId": "39832F23-3841-44CA-B1C0-321CA9B59627",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy10:*:*:*:*:*:*:*",
"matchCriteriaId": "CD804E72-BAB3-4471-9EB2-11D607895357",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ed:*:*:*:*:*:*:*",
"matchCriteriaId": "BD560277-FD93-413C-B1ED-9B7DA6658753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ed1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5D3C419-D1FF-45E8-A5B1-AFFC59567478",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)eh:*:*:*:*:*:*:*",
"matchCriteriaId": "59065FF7-E644-4927-9A3D-21431A5D91D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5D50E8-99DB-4B15-B0F2-84674A9346A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A101303-CFB2-4EF9-AD68-AF6D8E1E8148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
"matchCriteriaId": "114E5F13-3F15-418B-A0AF-038BEABF8445",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
"matchCriteriaId": "694AA98F-2705-477E-B2EE-75D2CEDB263B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "8422A740-0029-4C05-A7FE-12F12CD73B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "815EAC82-48B1-47A2-80D7-8CEE806E4B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "F68B4687-CC90-45D8-989D-8DF38940C8A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F755B9BE-3DF6-49AE-847E-F74B696A49A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF429A0-4A54-48FA-B69B-D34898E987EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A867AA1-E46F-4027-A41B-6AE1A27EB2F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF4082D-8F3E-4274-83DD-431E99C395B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "230ACE85-877C-45D7-A2A9-0085C421292A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "D37BA5F4-9D5C-4D92-A6D3-055B79049719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC9108D-B313-4C07-A9E3-5C2591304919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "5AD483E0-66F9-4DD1-85FA-C125C9617E10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "115E901C-94B4-4EC7-AA85-03A20CFA90DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "C97051EE-8C42-4546-8EDC-FAD60B3EE1EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "FB435D9A-FA6C-4CBD-8647-3A61B3DAB338",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*",
"matchCriteriaId": "14181F4B-9A5C-40B4-BD15-FED694E9AE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*",
"matchCriteriaId": "B62E402E-5D8B-4261-906C-C5668B4A12BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "85017D3F-5CEF-48BA-847E-7DCB39AC7636",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "2D4DD419-4BA3-4E3F-935C-2A6C9C71BD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "277D20C6-DAD1-455F-91E8-E5E091C1E7D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B33D730-0E80-46AF-8B53-FCEFF457EBAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "BF2D383F-F5A1-4BF6-9334-356E3CEEE897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t5:*:*:*:*:*:*:*",
"matchCriteriaId": "E3AE0230-D1A0-4A9E-A0A3-037C7977D450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "3CF70487-4E51-4570-927B-1B74D73E9D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc1:*:*:*:*:*:*:*",
"matchCriteriaId": "242A4DC2-C9C7-4ACB-99F0-317959B0CA2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc2:*:*:*:*:*:*:*",
"matchCriteriaId": "ED4ECF5C-1B91-4B54-BAB4-2DF17A1BBF56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "07DCF559-9324-4CE1-A986-EF4A174DCEFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "38CC9728-4E4A-4536-BC81-031AFE1A74E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9DECC49-1DF8-4925-9232-04DA748428B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "B736A1E0-89F4-418C-BC12-7E6A7AC7891F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "2BDC0B5A-E59C-454E-AA0E-6EB9C8888480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*",
"matchCriteriaId": "2363876E-0E3B-44BA-8157-FA96554302B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D3131A-74F7-4465-826E-5F6C90240C4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0D1E17-9A5C-4B74-B780-F31364FD9F06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*",
"matchCriteriaId": "F70ADF53-D937-4CB1-8D17-8B4DB9A5458C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0F30A4-C088-4ECC-ABE0-33D4A7BC8D1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*",
"matchCriteriaId": "A807560F-7111-40AB-BCC8-F3D7A2F92D2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "5D14775C-95F5-4507-9837-CA818489CF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t0a:*:*:*:*:*:*:*",
"matchCriteriaId": "A9895119-8DE1-4D27-A5B6-5FFA46A9B8C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "43CDBE37-FFAF-4EB1-834B-6972D16FA222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "FFC3E04D-52F8-4C36-9B6C-086FD3BFFD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t2a:*:*:*:*:*:*:*",
"matchCriteriaId": "B6FE3400-AF89-4A5F-AFF5-3521B1CC1AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "014EEE0B-4158-49F1-B2B1-692FF481991F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3D239A-CB65-46BA-8048-73439B8DA3E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A3D04B-CA03-4CAF-8AE6-44B89DDAA104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "855B1020-7FB6-46D1-ABAF-5618590CF329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DDD05CF-2C4D-484D-AEB0-C5C28F432A7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "485923CB-D5BD-400D-8324-3FA94D11C4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "A99DA1B7-18E9-43CF-BD77-050B971D75FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "75634752-042C-4E27-972E-E0D5DCD38BE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD00484-39D2-4CD5-ABEA-3C5AD9977BB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc1:*:*:*:*:*:*:*",
"matchCriteriaId": "5AAD9B95-0D54-49CA-824D-68175D6B4A8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*",
"matchCriteriaId": "B082C941-CE02-440F-8DD7-87873504B964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "8DEBAA67-9C88-48CE-88F7-4B5463B87B68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "2B71E784-53C0-46AE-AB6E-9B4CB5FAFFFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "6777AC09-8BA9-4595-89C2-1EAD0310B78B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "C4334D40-9B30-483E-9154-E0956D8849A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m3a:*:*:*:*:*:*:*",
"matchCriteriaId": "F14897FA-0E55-425C-9048-5987A0A6CE17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C4BCB9-8FE1-4B69-8245-F0F2955CAA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "112C4EA9-2FB4-4C2F-B550-036FCC289DFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "B770E747-517E-42FE-9197-8E654F294B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "B59D6811-BF02-436B-808A-DF21682561CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE752C6-250E-47CE-93EA-536958874386",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "71B3103F-9381-40A5-A7BD-D1251B3EA5A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m10:*:*:*:*:*:*:*",
"matchCriteriaId": "B990E413-C863-4613-803F-1E492982C70C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CBD931B-9D7F-452A-A567-60ED7EA1D2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "98EB6A3F-DDAB-4FC6-A857-6E106E815505",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc1:*:*:*:*:*:*:*",
"matchCriteriaId": "7741D6E0-2507-44D9-8476-AE11DADEC611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc2:*:*:*:*:*:*:*",
"matchCriteriaId": "0318BB57-8001-4F2A-954C-AD8DB2A94356",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE57C85-794E-405B-841F-A806D32C08EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*",
"matchCriteriaId": "7B91687C-A8F8-45FB-BF03-8534E9230AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "E082DB05-253F-4C6F-BD0A-524699309D10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*",
"matchCriteriaId": "B43D4858-AE1C-4372-97F9-5983EEE6ED4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "9678A6F2-0624-4A8A-9991-9DADCDDB2687",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
"matchCriteriaId": "D9F6D655-D3A3-4BEE-9DEF-19ADD41D1663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D1F5C8-F388-4999-BE87-33BE68976EA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA8D05A1-996F-408D-AC4D-F6B0538E8956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4EEC19-209E-4CED-8348-60E34F7EE419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "98F7E13A-AAFD-428C-9C4D-395460EFB8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t3a:*:*:*:*:*:*:*",
"matchCriteriaId": "F8EE036B-F8F4-47A0-B192-807899B87885",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F6C6D6-ED67-4ECA-8FD1-9C3890C061DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"matchCriteriaId": "F7316ED4-FABD-49E0-AA21-394D327435F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"matchCriteriaId": "24A56EF3-4E88-4220-846A-A9BE1E496311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "C89D14BC-1718-4AE9-B107-1709C2CE965E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "B05373F4-E820-4D22-A86A-904854F04C7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "4C38969D-65EB-4C80-BB2A-A1245C4E718B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "A429CFF2-A288-4CD5-9C06-8D18647C67E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "73B24B56-CCD1-4DD0-B042-C6296338BAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "632FFFE6-5FF5-478C-8C57-A6590840219E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1246D88-D206-453B-8EB6-A9848BB09781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "A9AEA886-C40F-4C2E-86F5-A4A8707E7DF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "4E759D97-682F-4EFC-9885-14B1CBC80C41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "D80852CE-8D91-4E85-A97F-C7A9AF5278CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*",
"matchCriteriaId": "AF777880-43BF-4D4A-9BA1-B2E925B5DE11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "57D89FF8-F1AF-43A9-894F-2B57A3A415D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA8F1123-AB39-4D42-BD2B-B4F75705D645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "8823287A-86A3-447E-9B25-87CA5CBCE743",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB88A4B-6A77-4B8F-BA6B-D4B9C50DC7D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "A597644C-023A-4EA0-99CC-2EBCF1FBB382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA06788C-E529-4024-9565-EAF5D90D68C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*",
"matchCriteriaId": "E3714E18-9A21-4D04-BB5E-0299AF443E2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FE61C7-3B61-4085-AD91-137459DA29D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*",
"matchCriteriaId": "71080D8B-BC81-4CDF-8626-D0F35DA40AEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*",
"matchCriteriaId": "CF10596D-457A-4DA8-8037-5E92E1D39232",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "A37D2CBE-2B93-45CB-AB59-AFDF14277E4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2911989-D074-42DF-AB58-6849B3E0B72D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "34299D29-96EC-4AAA-8137-49B292FC2D67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "5092DFCF-FEE9-4BE3-9116-01F3CBCE8A42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "7BCBDFC3-13C3-45D3-80C9-E533082FAF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "B213D7CC-AD3D-4241-AF59-5B4CFC9BA930",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E88FA32-5EBE-44BA-979B-60FE8340E8C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*",
"matchCriteriaId": "C4CE0E6F-A277-48BE-8F1D-BCA48C57666C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "96FDDD94-40C9-47F0-9D43-0C0267F439C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*",
"matchCriteriaId": "4E77BE16-C28C-43C2-B2CC-5AC4F33F7E13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3BBE82-E29A-4FD6-A897-1D80DE6ACA4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*",
"matchCriteriaId": "0322D5E9-FE05-49EF-A210-A276D69B9F16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*",
"matchCriteriaId": "F188F2EB-60D2-47BB-8FA8-2F832289345E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "249D78EB-A125-4731-A41B-62F8302D7246",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*",
"matchCriteriaId": "21F58CEE-636B-460E-91D1-330965FA7FE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "FCA5302F-0F9E-4E0A-AA59-CB23B9A89F32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "F943E4AE-F0EE-4643-B34D-44896C8CBF6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E6ED45F-4479-445D-8970-F90413C51B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "8922A697-63B0-480E-B91F-4C16E2F325B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "6B1EB55A-4D3A-42ED-9EA0-DF31DE62086C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "3376544F-A13B-4800-952D-08A2F429E9A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "79DA9DD7-A350-4A62-B19A-6AF90CF798F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "7113699B-762C-48BD-AD99-19D1A25995E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E178E6C-D717-48B1-B79A-4E071BDFE6AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "6BF7DF14-DD6F-4D24-8F12-AAB145FBDB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "6E0A47B7-5AD3-4B4C-A2FD-4EE0381B3FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "499C6196-2D34-4312-9C3E-B1A6E8D21112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "A12F00E7-8134-4CF4-ACD3-1E7E6F1C6332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "9B828AA0-E0B2-4897-AF28-FC80B9FF81BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "9279A96A-43B2-4FD4-97F0-DA331EACF918",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "3479B06E-1B67-4399-BA3A-E02331E21BE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "7855CC38-5E3E-486D-9322-7BF0DC1FF623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "496E2D60-AEEF-4D34-ABE4-9A9B101643D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*",
"matchCriteriaId": "E10916E9-6105-46F9-993D-F09C223003B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*",
"matchCriteriaId": "D962FBA3-CE59-401B-9451-45001775BA66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*",
"matchCriteriaId": "C13F2837-174B-4437-BF3F-CB6BFBF8F64D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
"matchCriteriaId": "4220D3B1-BD05-4169-91BA-B1AA45084C46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*",
"matchCriteriaId": "84BAF351-4C7F-44F8-812E-9C402CBBB5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EE552E-226C-46DE-9861-CB148AD8FB44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "CAF02C8E-9BB2-4DC2-8BF1-932835191F09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "C5AC88EB-7A67-4CDE-9C69-94734966E677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*",
"matchCriteriaId": "EA8E0069-21AB-497F-9F4C-6F7C041BA0E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "74E1226B-46CF-4C82-911A-86C818A75DFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "100DA24F-464E-4273-83DF-6428D0ED6641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "063C0C47-25EB-4AA4-9332-8E43CD60FF39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "A6004A94-FF96-4A34-B3CC-D4B4E555CFB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "02866AED-A1B4-4D89-A11F-27089EF935BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "1C85BAAF-819B-40E7-9099-04AA8D9AB114",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED684DB4-527A-4268-B197-4719B0178429",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "88F41406-0F55-4D74-A4F6-4ABD5A803907",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*",
"matchCriteriaId": "7082C083-7517-4CD4-BF95-CC7AF08D4053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "370EF3DC-151F-4724-A026-3AD8ED6D801C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B8FB86F-2A89-413B-BED7-97E3D392804E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*",
"matchCriteriaId": "005EAD76-34BE-4E3F-8840-23F613661FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*",
"matchCriteriaId": "2595B3E3-7FD4-4EFF-98A2-89156A657A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*",
"matchCriteriaId": "FB998A1F-BAEA-4B8F-BE49-1C282ED3952E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "59F21FEC-A536-45CB-9AE5-61CE45EAD1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "0340EC20-7099-4F13-8DE6-84475B2A52CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "6994F100-864F-4512-9141-F7D1050F9DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "FC0CC364-FF3A-4FB3-8004-6628400BC7DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "7A4E00DF-60FD-48F2-A69A-D709A5657F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F5D3761-16C8-413A-89AD-C076B9B92FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "F690BEC9-FAE9-4C02-9993-34BF14FA99EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*",
"matchCriteriaId": "2BEA314F-8C89-4D6C-A6B6-3E9247A35B7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B8565B-3EE6-48DC-AE92-9F16AFFC509C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "39166A66-859D-43A7-9947-3F3C32FBFAAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "097D1950-6159-45A2-8653-D3F90044D0C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "F421AC3C-B0BC-4177-ACDB-87792C1636EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*",
"matchCriteriaId": "47C580D9-A2EC-4CBB-87F5-1F5CBA23F73F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*",
"matchCriteriaId": "3C427BA8-3A8C-4934-997B-6DDF9CEB96AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*",
"matchCriteriaId": "C7809674-4738-463E-B522-FC6C419E2A09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "B00BF54E-CBFB-4ECD-9EDF-0A8331AF2BE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "5E25B3DC-B9A7-4DFC-8566-3F790F460DDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
"matchCriteriaId": "679DCA8C-F64B-4716-BCC9-9C461A89CB29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "EF662E36-0831-4892-850F-844B0E0B54DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "1E71F49D-E405-4AB4-9188-DA7B338DFD7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"matchCriteriaId": "09578DDF-5D13-47C1-9BD1-A1A8B9B0C87D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
"matchCriteriaId": "5BBF8B70-DFBE-4F6E-83F0-171F03E97606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
"matchCriteriaId": "CA55D660-66C6-4278-8C27-25DB2712CC1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
"matchCriteriaId": "8320F23D-F6BE-405B-B645-1CEB984E8267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
"matchCriteriaId": "4CE2670E-8C17-448D-A5BD-5A4FBCAEC35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7C5C705-6A8C-4834-9D24-CFE26A232C15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
"matchCriteriaId": "CC270E40-CABA-44B4-B4DD-E9C47A97770B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
"matchCriteriaId": "EC1DB8C1-7F7D-4562-A317-87E925CAD524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "895D2447-BD8A-473C-B26E-06897080DD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "E312CE6B-F3F5-40B3-8862-3BB1314376E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades en el modulo EnergyWise de Cisco IOS (12.2 y 15.0 en versiones hasta 15.6) y Cisco IOS XE (3.2 en versiones hasta 3.18) podr\u00eda permitir a un atacante remoto no autenticado provocar una condici\u00f3n del desbordamiento de b\u00fafer o una recarga de un dispositivo afectado, dando lugar a una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Estas vulnerabilidades se deben a un an\u00e1lisis incorrecto de los paquetes manipulados de EnergyWise destinados a un dispositivo afectado. Un atacante podr\u00eda explotar estas vulnerabilidades enviando paquetes de EnergyWise manipulados para ser procesados por un dispositivo afectado. Un exploit podr\u00eda permitir al atacante causar una condici\u00f3n de desbordamiento de b\u00fafer o una recarga del dispositivo afectado, lo que conducir\u00eda a una condici\u00f3n DoS. El Cisco IOS Software y el Cisco IOS XE Software admiten EnergyWise para la comunicaci\u00f3n IPv4. S\u00f3lo los paquetes IPv4 destinados a un dispositivo configurado como miembro del dominio de EnergyWise pueden desencadenar estas vulnerabilidades. Los paquetes IPv6 no pueden ser utilizadas para activar estas vulnerabilidades. Cisco Bug ID CSCur29331."
}
],
"id": "CVE-2017-3860",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-04-20T22:59:00.323",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/97935"
},
{
"source": "psirt@cisco.com",
"url": "http://www.securitytracker.com/id/1038313"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/97935"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1038313"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2017-06093
Vulnerability from cnvd - Published: 2017-05-08用户可参考如下供应商提供的安全公告获得补丁信息: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise
| Name | ['Cisco Ios >=15.0,<=15.5', 'Cisco IOS XE >=3.2,<=3.18'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "97935"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-3860",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3860"
}
},
"description": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002EnergyWise\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u80fd\u6e90\u7ba1\u7406\u67b6\u6784\u6a21\u5757\u3002\r\n\r\nCisco IOS\u548cCisco IOS XE\u4e2d\u7684EnergyWise\u6a21\u5757\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u89e3\u6790EnergyWise\u6570\u636e\u5305\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u91cd\u8f7d\u3002",
"discovererName": "Cisco",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-06093",
"openTime": "2017-05-08",
"patchDescription": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002EnergyWise\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u80fd\u6e90\u7ba1\u7406\u67b6\u6784\u6a21\u5757\u3002\r\n\r\nCisco IOS\u548cCisco IOS XE\u4e2d\u7684EnergyWise\u6a21\u5757\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u7684\u89e3\u6790EnergyWise\u6570\u636e\u5305\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u7f13\u51b2\u533a\u6ea2\u51fa\u6216\u91cd\u8f7d\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco IOS\u548cIOS XE Software\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2017-06093\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco Ios \u003e=15.0\uff0c\u003c=15.5",
"Cisco IOS XE \u003e=3.2\uff0c\u003c=3.18"
]
},
"referenceLink": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-3860",
"serverity": "\u9ad8",
"submitTime": "2017-04-24",
"title": "Cisco IOS\u548cIOS XE Software\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2017-06093\uff09"
}
CERTFR-2017-AVI-127
Vulnerability from certfr_avis - Published: 2017-04-20 - Updated: 2017-04-20
De multiples vulnérabilités ont été corrigées dans les produits Cisco. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | Adaptive Security Appliance | Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Cisco ASA 5500 Series Adaptive Security Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
| Cisco | Unified Communications Manager | Cisco Unified Communications Manager (CallManager) sans le dernier correctif de sécurité | ||
| Cisco | N/A | Firepower 9300 Series Security Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | Adaptive Security Appliance | Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Cisco ISA 3000 Industrial Security Appliance (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
| Cisco | N/A | Sourcefire 3D System Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Cisco Adaptive Security Virtual Appliance (ASAv, voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
| Cisco | N/A | Cisco ASA 1000V Cloud Firewall (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
| Cisco | N/A | Firepower 4100 Series Security Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Cisco ASA Services Module pour les commutateurs Cisco Catalyst séries 6500 et les routeurs Cisco séries 7600 (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
| Cisco | Firepower Threat Defense | FirePOWER Threat Defense for Integrated Services Routers (ISRs, voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Industrial Security Appliance 3000 (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | FirePOWER 7000 Series Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | IOS XE | Cisco IOS et Cisco IOS XE avec le module EnergyWise activé, sans le dernier correctif de sécurité | ||
| Cisco | N/A | FirePOWER 8000 Series Appliances (voir sur le site du constructeur pour les versions vulnérables de Cisco Firepower System) | ||
| Cisco | N/A | Cisco Firepower 9300 ASA Security Module (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) | ||
| Cisco | N/A | Cisco ASA 5500-X Series Next-Generation Firewalls (voir sur le site du constructeur pour les versions vulnérables de Cisco ASA) |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Adaptive Security Appliance (ASA) 5500-X Series Next-Generation Firewalls (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "Adaptive Security Appliance",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA 5500 Series Adaptive Security Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Unified Communications Manager (CallManager) sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Unified Communications Manager",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Firepower 9300 Series Security Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Advanced Malware Protection (AMP) for Networks, 8000 Series Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Adaptive Security Appliance (ASA) 5500-X Series with FirePOWER Services (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "Adaptive Security Appliance",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ISA 3000 Industrial Security Appliance (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Sourcefire 3D System Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Virtual Next-Generation Intrusion Prevention System (NGIPSv) for VMware (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Adaptive Security Virtual Appliance (ASAv, voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA 1000V Cloud Firewall (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Firepower 4100 Series Security Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Advanced Malware Protection (AMP) for Networks, 7000 Series Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA Services Module pour les commutateurs Cisco Catalyst s\u00e9ries 6500 et les routeurs Cisco s\u00e9ries 7600 (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "FirePOWER Threat Defense for Integrated Services Routers (ISRs, voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "Firepower Threat Defense",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Industrial Security Appliance 3000 (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "FirePOWER 7000 Series Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS et Cisco IOS XE avec le module EnergyWise activ\u00e9, sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "FirePOWER 8000 Series Appliances (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco Firepower System)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Firepower 9300 ASA Security Module (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASA 5500-X Series Next-Generation Firewalls (voir sur le site du constructeur pour les versions vuln\u00e9rables de Cisco ASA)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-3862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3862"
},
{
"name": "CVE-2017-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3863"
},
{
"name": "CVE-2017-3861",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3861"
},
{
"name": "CVE-2017-6609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6609"
},
{
"name": "CVE-2017-3808",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3808"
},
{
"name": "CVE-2016-6368",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6368"
},
{
"name": "CVE-2017-6608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6608"
},
{
"name": "CVE-2017-6607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6607"
},
{
"name": "CVE-2017-3860",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3860"
},
{
"name": "CVE-2017-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6610"
}
],
"initial_release_date": "2017-04-20T00:00:00",
"last_revision_date": "2017-04-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-xauth du 19 avril 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-xauth"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-fpsnort du 19 avril 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-fpsnort"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-ipsec du 19 avril 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-ipsec"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-tls du 19 avril 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-tls"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-dns du 19 avril 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-asa-dns"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-energywise du 19 avril 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-ucm du 19 avril 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-ucm"
}
],
"reference": "CERTFR-2017-AVI-127",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-04-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Cisco\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-xauth du 19 avril 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-ipsec du 19 avril 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-dns du 19 avril 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-energywise du 19 avril 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-fpsnort du 19 avril 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-ucm du 19 avril 2017",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170419-asa-tls du 19 avril 2017",
"url": null
}
]
}
GHSA-F7GJ-54HP-MR7V
Vulnerability from github – Published: 2022-05-17 02:32 – Updated: 2022-05-17 02:32Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331.
{
"affected": [],
"aliases": [
"CVE-2017-3860"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-04-20T22:59:00Z",
"severity": "HIGH"
},
"details": "Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331.",
"id": "GHSA-f7gj-54hp-mr7v",
"modified": "2022-05-17T02:32:19Z",
"published": "2022-05-17T02:32:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3860"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/97935"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1038313"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2017-3860
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-3860",
"description": "Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331.",
"id": "GSD-2017-3860"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-3860"
],
"details": "Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331.",
"id": "GSD-2017-3860",
"modified": "2023-12-13T01:21:16.433933Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2017-3860",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE",
"version": {
"version_data": [
{
"version_value": "Cisco IOS and IOS XE"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1038313",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038313"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
},
{
"name": "97935",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97935"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ed:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ed1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)eh:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ek:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)cg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey3a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)sy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(2\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(2\\)t4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)gc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)m7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(3\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(1\\)cg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)t2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.3\\(1\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(4\\)m:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)m0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(2\\)t1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)m8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)t3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)t2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2017-3860"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple vulnerabilities in the EnergyWise module of Cisco IOS (12.2 and 15.0 through 15.6) and Cisco IOS XE (3.2 through 3.18) could allow an unauthenticated, remote attacker to cause a buffer overflow condition or a reload of an affected device, leading to a denial of service (DoS) condition. These vulnerabilities are due to improper parsing of crafted EnergyWise packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted EnergyWise packets to be processed by an affected device. An exploit could allow the attacker to cause a buffer overflow condition or a reload of the affected device, leading to a DoS condition. Cisco IOS Software and Cisco IOS XE Software support EnergyWise for IPv4 communication. Only IPv4 packets destined to a device configured as an EnergyWise domain member can trigger these vulnerabilities. IPv6 packets cannot be used to trigger these vulnerabilities. Cisco Bug ID CSCur29331."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170419-energywise"
},
{
"name": "97935",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/97935"
},
{
"name": "1038313",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id/1038313"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
},
"lastModifiedDate": "2017-07-11T01:33Z",
"publishedDate": "2017-04-20T22:59Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.