Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-3881 (GCVE-0-2017-3881)
Vulnerability from cvelistv5 – Published: 2017-03-17 22:00 – Updated: 2026-01-12 20:45- Remote Code Execution Vulnerability
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Cisco IOS and IOS XE Software |
Affected:
Cisco IOS and IOS XE Software
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:39:41.294Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "41872",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/41872/"
},
{
"name": "41874",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/41874/"
},
{
"name": "97391",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/97391"
},
{
"name": "96960",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/96960"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"name": "1038059",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038059"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2017-3881",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T16:05:33.301931Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-03-25",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-12T20:45:44.634Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS and IOS XE Software",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Cisco IOS and IOS XE Software"
}
]
}
],
"datePublic": "2017-03-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Remote Code Execution Vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-15T09:57:01.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "41872",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/41872/"
},
{
"name": "41874",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/41874/"
},
{
"name": "97391",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/97391"
},
{
"name": "96960",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/96960"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"name": "1038059",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038059"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2017-3881",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE Software",
"version": {
"version_data": [
{
"version_value": "Cisco IOS and IOS XE Software"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution Vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "41872",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41872/"
},
{
"name": "41874",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41874/"
},
{
"name": "97391",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97391"
},
{
"name": "96960",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96960"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"name": "1038059",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038059"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2017-3881",
"datePublished": "2017-03-17T22:00:00.000Z",
"dateReserved": "2016-12-21T00:00:00.000Z",
"dateUpdated": "2026-01-12T20:45:44.634Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2017-3881",
"cwes": "[\"CWE-20\"]",
"dateAdded": "2022-03-25",
"dueDate": "2022-04-15",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-3881",
"product": "IOS and IOS XE",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.",
"vendorProject": "Cisco",
"vulnerabilityName": "Cisco IOS and IOS XE Remote Code Execution Vulnerability"
},
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.exploit-db.com/exploits/41872/\", \"name\": \"41872\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41874/\", \"name\": \"41874\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/97391\", \"name\": \"97391\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/96960\", \"name\": \"96960\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1038059\", \"name\": \"1038059\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T14:39:41.294Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-3881\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-08T16:05:33.301931Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-03-25\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881\"}}}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-08T16:07:18.170Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Cisco IOS and IOS XE Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"Cisco IOS and IOS XE Software\"}]}], \"datePublic\": \"2017-03-17T00:00:00.000Z\", \"references\": [{\"url\": \"https://www.exploit-db.com/exploits/41872/\", \"name\": \"41872\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41874/\", \"name\": \"41874\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://www.securityfocus.com/bid/97391\", \"name\": \"97391\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"http://www.securityfocus.com/bid/96960\", \"name\": \"96960\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securitytracker.com/id/1038059\", \"name\": \"1038059\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Remote Code Execution Vulnerability\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2017-08-15T09:57:01.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Cisco IOS and IOS XE Software\"}]}, \"product_name\": \"Cisco IOS and IOS XE Software\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.exploit-db.com/exploits/41872/\", \"name\": \"41872\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"https://www.exploit-db.com/exploits/41874/\", \"name\": \"41874\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://www.securityfocus.com/bid/97391\", \"name\": \"97391\", \"refsource\": \"BID\"}, {\"url\": \"http://www.securityfocus.com/bid/96960\", \"name\": \"96960\", \"refsource\": \"BID\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\", \"name\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securitytracker.com/id/1038059\", \"name\": \"1038059\", \"refsource\": \"SECTRACK\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Remote Code Execution Vulnerability\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-3881\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@cisco.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2017-3881\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-01-12T20:45:44.634Z\", \"dateReserved\": \"2016-12-21T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2017-03-17T22:00:00.000Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GSD-2017-3881
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-3881",
"description": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.",
"id": "GSD-2017-3881",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2017-3881"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-3881"
],
"details": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.",
"id": "GSD-2017-3881",
"modified": "2023-12-13T01:21:16.536440Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cisa.gov": {
"cveID": "CVE-2017-3881",
"dateAdded": "2022-03-25",
"dueDate": "2022-04-15",
"product": "IOS and IOS XE",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.",
"vendorProject": "Cisco",
"vulnerabilityName": "Cisco IOS and IOS XE Remote Code Execution Vulnerability"
},
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2017-3881",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE Software",
"version": {
"version_data": [
{
"version_value": "Cisco IOS and IOS XE Software"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution Vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "41872",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41872/"
},
{
"name": "41874",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/41874/"
},
{
"name": "97391",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97391"
},
{
"name": "96960",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96960"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"name": "1038059",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038059"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "15.1\\(3\\)svs",
"versionStartIncluding": "12.2s",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.9e",
"versionStartIncluding": "3.2sg",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960pd-8tt-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2970g-24t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2970g-24ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_2975:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_12g:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_12t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_dc_smi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_emi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_fx_smi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_pwr:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_smi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_48_emi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_48_smi:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-12pc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-24ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-24ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-48ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-48ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-8pc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-12d-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-12d-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-12sd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-12sd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-24pd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-24pd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-24td-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-24td-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48pd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48pd-ef:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48pd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48pd-sf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48td-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48td-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560g-24ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560g-24ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560g-48ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560g-48ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-24dc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-24ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-24ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-48ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-48ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-24fs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-24ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-24ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-48ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-48ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750_metro_24-ac:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750_metro_24-dc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-24pd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-24pd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-24td-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-24td-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48pd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48pd-ef:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48pd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48pd-sf:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48td-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48td-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-12s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-12s-sd:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-16td:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-24ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-24t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-24ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-24ts-1u:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-48ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-48ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-24fs:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-24ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-24ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-48ps:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-48ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_i:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_iv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus-ts:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_iv:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v-10ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_ii-plus-10ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500e_supervisor_engine_8-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4928_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4948:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4948_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4948e-f_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_4948e_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3030:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3032:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3040:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3130:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_switch_module_3012:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_switch_module_3110:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_switch_module_3110x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:enhanced_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:enhanced_layer_2_etherswitch_service_module:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:gigabit_ethernet_switch_module_\\(cgesm\\):-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-5000-12s12p-10g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie-5000-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_3000-4tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:ie_3000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:me_4924-10ge:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:rf_gateway_10:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:sm-x_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2017-3881"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"name": "96960",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96960"
},
{
"name": "97391",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/97391"
},
{
"name": "1038059",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038059"
},
{
"name": "41874",
"refsource": "EXPLOIT-DB",
"tags": [
"Broken Link"
],
"url": "https://www.exploit-db.com/exploits/41874/"
},
{
"name": "41872",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41872/"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-08-07T20:08Z",
"publishedDate": "2017-03-17T22:59Z"
}
}
}
GHSA-G37W-QG7V-7FJQ
Vulnerability from github – Published: 2022-05-13 01:24 – Updated: 2025-10-22 00:31A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
{
"affected": [],
"aliases": [
"CVE-2017-3881"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-03-17T22:59:00Z",
"severity": "CRITICAL"
},
"details": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.",
"id": "GHSA-g37w-qg7v-7fjq",
"modified": "2025-10-22T00:31:19Z",
"published": "2022-05-13T01:24:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3881"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/41872"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/41874"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/96960"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/97391"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1038059"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CVE-2017-3881
Vulnerability from fstec - Published: 17.03.2017{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": null,
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Catalyst 2350-48TD-S Switch), - (Catalyst 2350-48TD-SD Switch), - (Catalyst 2360-48TD-S Switch), - (Catalyst 2918-24TC-C Switch), - (Catalyst 2918-24TT-C Switch), - (Catalyst 2918-48TC-C Switch), - (Catalyst 2918-48TT-C Switch), - (Catalyst 2928-24TC-C Switch), - (Catalyst 2960-24-S Switch), - (Catalyst 2960-24LC-S Switch), - (Catalyst 2960-24LT-L Switch), - (Catalyst 2960-24PC-L Switch), - (Catalyst 2960-24PC-S Switch), - (Catalyst 2960-24TC-L Switch), - (Catalyst 2960-24TC-S Switch), - (Catalyst 2960-24TT-L Switch), - (Catalyst 2960-48PST-L Switch), - (Catalyst 2960-48PST-S Switch), - (Catalyst 2960-48TC-L Switch), - (Catalyst 2960-48TC-S Switch), - (Catalyst 2960-48TT-L Switch), - (Catalyst 2960-48TT-S Switch), - (Catalyst 2960-8TC-L Compact Switch), - (Catalyst 2960-8TC-S Compact Switch), - (Cisco Catalyst 2960-Plus 24LC-L Switch), - (Cisco Catalyst 2960-Plus 24LC-S Switch), - (Cisco Catalyst 2960-Plus 24PC-L Switch), - (Cisco Catalyst 2960-Plus 24PC-S Switch), - (Cisco Catalyst 2960-Plus 24TC-L Switch), - (Cisco Catalyst 2960-Plus 24TC-S Switch), - (Cisco Catalyst 2960-Plus 48PST-L Switch), - (Cisco Catalyst 2960-Plus 48PST-S Switch), - (Cisco Catalyst 2960-Plus 48TC-L Switch), - (Cisco Catalyst 2960-Plus 48TC-S Switch), - (Catalyst 2960C-12PC-L Switch), - (Catalyst 2960C-8PC-L Switch), - (Catalyst 2960C-8TC-L Switch), - (Catalyst 2960C-8TC-S Switch), - (Catalyst 2960CG-8TC-L Compact Switch), - (Catalyst 2960CPD-8PT-L Switch), - (Cisco Catalyst 2960CPD-8TT-L Switch), - (Cisco Catalyst 2960CX-8PC-L Switch), - (Cisco Catalyst 2960CX-8TC-L Switch), - (Cisco Catalyst 2960G-24TC-L Switch), - (Cisco Catalyst 2960G-48TC-L Switch), - (Cisco Catalyst 2960G-8TC-L Compact Switch), - (Cisco Catalyst 2960L-16PS-LL Switch), - (Cisco Catalyst 2960L-16TS-LL Switch), - (Cisco Catalyst 2960L-24PS-LL Switch), - (Cisco Catalyst 2960L-24TS-LL Switch), - (Cisco Catalyst 2960L-48PS-LL Switch), - (Cisco Catalyst 2960L-48TS-LL Switch), - (Cisco Catalyst 2960L-8PS-LL Switch), - (Cisco Catalyst 2960L-8TS-LL Switch), - (Cisco Catalyst 2960PD-8TT-L Compact Switch), - (Cisco Catalyst 2960S-24PD-L Switch), - (Cisco Catalyst 2960S-24PS-L Switch), - (Cisco Catalyst 2960S-24TD-L Switch), - (Cisco Catalyst 2960S-24TS-L Switch), - (Cisco Catalyst 2960S-24TS-S Switch), - (Cisco Catalyst 2960S-48FPD-L Switch), - (Cisco Catalyst 2960S-48FPS-L Switch), - (Cisco Catalyst 2960S-48LPD-L Switch), - (Cisco Catalyst 2960S-48LPS-L Switch), - (Cisco Catalyst 2960S-48TD-L Switch), - (Cisco Catalyst 2960S-48TS-L Switch), - (Cisco Catalyst 2960S-48TS-S Switch), - (Cisco Catalyst 2960S-F24PS-L Switch), - (Cisco Catalyst 2960S-F24TS-L Switch), - (Cisco Catalyst 2960S-F24TS-S Switch), - (Cisco Catalyst 2960S-F48FPS-L Switch), - (Cisco Catalyst 2960S-F48LPS-L Switch), - (Cisco Catalyst 2960S-F48TS-L Switch), - (Cisco Catalyst 2960S-F48TS-S Switch), - (Cisco Catalyst 2960X-24PD-L Switch), - (Cisco Catalyst 2960X-24PS-L Switch), - (Cisco Catalyst 2960X-24PSQ-L Cool Switch), - (Cisco Catalyst 2960X-24TD-L Switch), - (Cisco Catalyst 2960X-24TS-L Switch), - (Cisco Catalyst 2960X-24TS-LL Switch), - (Cisco Catalyst 2960X-48FPD-L Switch), - (Cisco Catalyst 2960X-48FPS-L Switch), - (Cisco Catalyst 2960X-48LPD-L Switch), - (Cisco Catalyst 2960X-48LPS-L Switch), - (Cisco Catalyst 2960X-48TD-L Switch), - (Cisco Catalyst 2960X-48TS-L Switch), - (Cisco Catalyst 2960X-48TS-LL Switch), - (Cisco Catalyst 2960XR-24PD-I Switch), - (Cisco Catalyst 2960XR-24PD-L Switch), - (Cisco Catalyst 2960XR-24PS-I Switch), - (Cisco Catalyst 2960XR-24PS-L Switch), - (Cisco Catalyst 2960XR-24TD-I Switch), - (Cisco Catalyst 2960XR-24TD-L Switch), - (Cisco Catalyst 2960XR-24TS-I Switch), - (Cisco Catalyst 2960XR-24TS-L Switch), - (Cisco Catalyst 2960XR-48FPD-I Switch), - (Cisco Catalyst 2960XR-48FPS-I Switch), - (Cisco Catalyst 2960XR-48FPS-L Switch), - (Cisco Catalyst 2960XR-48LPD-I Switch), - (Cisco Catalyst 2960XR-48LPD-L Switch), - (Cisco Catalyst 2960XR-48LPS-I Switch), - (Cisco Catalyst 2960XR-48LPS-L Switch), - (Cisco Catalyst 2960XR-48TD-I Switch), - (Cisco Catalyst 2960XR-48TD-L Switch), - (Cisco Catalyst 2960XR-48TS-I Switch), - (Cisco Catalyst 2960XR-48TS-L Switch), - (Cisco Catalyst 2970G-24T Switch), - (Cisco Catalyst 2970G-24TS Switch), - (Cisco Catalyst 2975 Switch), - (Cisco Catalyst 3550 12G Switch), - (Cisco Catalyst 3550 12T Switch), - (Cisco Catalyst 3550 24 DC SMI Switch), - (Cisco Catalyst 3550 24 EMI Switch), - (Cisco Catalyst 3550 24 FX SMI Switch), - (Cisco Catalyst 3550 24 PWR Switch), - (Cisco Catalyst 3550 24 SMI Switch), - (Cisco Catalyst 3550 48 EMI Switch), - (Cisco Catalyst 3550 48 SMI Switch), - (Cisco Catalyst 3560-12PC-S Compact Switch), - (Cisco Catalyst 3560-24PS Switch), - (Cisco Catalyst 3560-24TS Switch), - (Cisco Catalyst 3560-48PS Switch), - (Cisco Catalyst 3560-48TS Switch), - (Cisco Catalyst 3560-8PC Compact Switch), - (Cisco Catalyst 3560C-12PC-S Switch), - (Cisco Catalyst 3560C-8PC-S Switch), - (Cisco Catalyst 3560CG-8PC-S Compact Switch), - (Cisco Catalyst 3560CG-8TC-S Compact Switch), - (Cisco Catalyst 3560CPD-8PT-S Compact Switch), - (Cisco Catalyst 3560CX-12PC-S Switch), - (Cisco Catalyst 3560CX-12PD-S Switch), - (Cisco Catalyst 3560CX-12TC-S Switch), - (Cisco Catalyst 3560CX-8PC-S Switch), - (Cisco Catalyst 3560CX-8PT-S Switch), - (Cisco Catalyst 3560CX-8TC-S Switch), - (Cisco Catalyst 3560CX-8XPD-S Switch), - (Cisco Catalyst 3560E-12D-E Switch), - (Cisco Catalyst 3560E-12D-S Switch), - (Cisco Catalyst 3560E-12SD-E Switch), - (Cisco Catalyst 3560E-12SD-S Switch), - (Cisco Catalyst 3560E-24PD-E Switch), - (Cisco Catalyst 3560E-24PD-S Switch), - (Cisco Catalyst 3560E-24TD-E Switch), - (Cisco Catalyst 3560E-24TD-S Switch), - (Cisco Catalyst 3560E-48PD-E Switch), - (Cisco Catalyst 3560E-48PD-EF Switch), - (Cisco Catalyst 3560E-48PD-S Switch), - (Cisco Catalyst 3560E-48PD-SF Switch), - (Cisco Catalyst 3560E-48TD-E Switch), - (Cisco Catalyst 3560E-48TD-S Switch), - (Cisco Catalyst 3560G-24PS Switch), - (Cisco Catalyst 3560G-24TS Switch), - (Cisco Catalyst 3560G-48PS Switch), - (Cisco Catalyst 3560G-48TS Switch), - (Cisco Catalyst 3560V2-24DC Switch), - (Cisco Catalyst 3560V2-24PS Switch), - (Cisco Catalyst 3560V2-24TS Switch), - (Cisco Catalyst 3560V2-48PS Switch), - (Cisco Catalyst 3560V2-48TS Switch), - (Cisco Catalyst 3560X-24P-E Switch), - (Cisco Catalyst 3560X-24P-L Switch), - (Cisco Catalyst 3560X-24P-S Switch), - (Cisco Catalyst 3560X-24T-E Switch), - (Cisco Catalyst 3560X-24T-L Switch), - (Cisco Catalyst 3560X-24T-S Switch), - (Cisco Catalyst 3560X-24U-E Switch), - (Cisco Catalyst 3560X-24U-L Switch), - (Cisco Catalyst 3560X-24U-S Switch), - (Cisco Catalyst 3560X-48P-E Switch), - (Cisco Catalyst 3560X-48P-L Switch), - (Cisco Catalyst 3560X-48P-S Switch), - (Cisco Catalyst 3560X-48PF-E Switch), - (Cisco Catalyst 3560X-48PF-L Switch), - (Cisco Catalyst 3560X-48PF-S Switch), - (Cisco Catalyst 3560X-48T-E Switch), - (Cisco Catalyst 3560X-48T-L Switch), - (Cisco Catalyst 3560X-48T-S Switch), - (Cisco Catalyst 3560X-48U-E Switch), - (Cisco Catalyst 3560X-48U-L Switch), - (Cisco Catalyst 3560X-48U-S Switch), - (Cisco Catalyst 3750 Metro 24-AC Switch), - (Cisco Catalyst 3750 Metro 24-DC Switch), - (Cisco Catalyst 3750-24FS Switch), - (Cisco Catalyst 3750-24PS Switch), - (Cisco Catalyst 3750-24TS Switch), - (Cisco Catalyst 3750-48PS Switch), - (Cisco Catalyst 3750-48TS Switch), - (Cisco Catalyst 3750E-24PD-E Switch), - (Cisco Catalyst 3750E-24PD-S Switch), - (Cisco Catalyst 3750E-24TD-E Switch), - (Cisco Catalyst 3750E-24TD-S Switch), - (Cisco Catalyst 3750E-48PD-E Switch), - (Cisco Catalyst 3750E-48PD-EF Switch), - (Cisco Catalyst 3750E-48PD-S Switch), - (Cisco Catalyst 3750E-48PD-SF Switch), - (Cisco Catalyst 3750E-48TD-E Switch), - (Cisco Catalyst 3750E-48TD-S Switch), - (Cisco Catalyst 3750G-12S Switch), - (Cisco Catalyst 3750G-12S-SD Switch), - (Cisco Catalyst 3750G-16TD Switch), - (Cisco Catalyst 3750G-24PS Switch), - (Cisco Catalyst 3750G-24T Switch), - (Cisco Catalyst 3750G-24TS Switch), - (Cisco Catalyst 3750G-24TS-1U Switch), - (Cisco Catalyst 3750G-48PS Switch), - (Cisco Catalyst 3750G-48TS Switch), - (Cisco Catalyst 3750V2-24FS Switch), - (Cisco Catalyst 3750V2-24PS Switch), - (Cisco Catalyst 3750V2-24TS Switch), - (Cisco Catalyst 3750V2-48PS Switch), - (Cisco Catalyst 3750V2-48TS Switch), - (Cisco Catalyst 3750X-12S-E Switch), - (Cisco Catalyst 3750X-12S-S Switch), - (Cisco Catalyst 3750X-24P-E Switch), - (Cisco Catalyst 3750X-24P-L Switch), - (Cisco Catalyst 3750X-24P-S Switch), - (Cisco Catalyst 3750X-24S-E Switch), - (Cisco Catalyst 3750X-24S-S Switch), - (Cisco Catalyst 3750X-24T-E Switch), - (Cisco Catalyst 3750X-24T-L Switch), - (Cisco Catalyst 3750X-24T-S Switch), - (Cisco Catalyst 3750X-24U-E Switch), - (Cisco Catalyst 3750X-24U-L Switch), - (Cisco Catalyst 3750X-24U-S Switch), - (Cisco Catalyst 3750X-48P-E Switch), - (Cisco Catalyst 3750X-48P-L Switch), - (Cisco Catalyst 3750X-48P-S Switch), - (Cisco Catalyst 3750X-48PF-E Switch), - (Cisco Catalyst 3750X-48PF-L Switch), - (Cisco Catalyst 3750X-48PF-S Switch), - (Cisco Catalyst 3750X-48T-E Switch), - (Cisco Catalyst 3750X-48T-L Switch), - (Cisco Catalyst 3750X-48T-S Switch), - (Cisco Catalyst 3750X-48U-E Switch), - (Cisco Catalyst 3750X-48U-L Switch), - (Cisco Catalyst 3750X-48U-S Switch), - (Cisco Catalyst 4000 Supervisor Engine I), - (Cisco Catalyst 4000/4500 Supervisor Engine IV), - (Cisco Catalyst 4000/4500 Supervisor Engine V), - (Cisco Catalyst 4500 Series Supervisor Engine II-Plus), - (Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS), - (Cisco Catalyst 4500 Series Supervisor Engine V-10GE), - (Cisco Catalyst 4500 Series Supervisor II-Plus-10GE), - (Cisco Catalyst 4500 Supervisor Engine 6-E), - (Cisco Catalyst 4500 Supervisor Engine 6L-E), - (Cisco Catalyst 4900M Switch), - (Cisco Catalyst 4928 10 Gigabit Ethernet Switch), - (Cisco Catalyst 4948 10 Gigabit Ethernet Switch), - (Cisco Catalyst 4948 Switch), - (Cisco Catalyst 4948E Ethernet Switch), - (Cisco Catalyst 4948E-F Ethernet Switch), - (Cisco Catalyst Blade Switch 3020 for HP), - (Cisco Catalyst Blade Switch 3030 for Dell), - (Cisco Catalyst Blade Switch 3032 for Dell M1000E), - (Cisco Catalyst Blade Switch 3040 for FSC), - (Cisco Catalyst Blade Switch 3120 for HP), - (Cisco Catalyst Blade Switch 3120X for HP), - (Cisco Catalyst Blade Switch 3130 for Dell M1000E), - (Cisco Catalyst C2928-24LT-C Switch), - (Cisco Catalyst C2928-48TC-C Switch), - (Cisco Catalyst Switch Module 3012 for IBM BladeCenter), - (Cisco Catalyst Switch Module 3110 for IBM BladeCenter), - (Cisco Catalyst Switch Module 3110X for IBM BladeCenter), - (Cisco Embedded Service 2020 24TC CON B Switch), - (Cisco Embedded Service 2020 24TC CON Switch), - (Cisco Embedded Service 2020 24TC NCP B Switch), - (Cisco Embedded Service 2020 24TC NCP Switch), - (Cisco Embedded Service 2020 CON B Switch), - (Cisco Embedded Service 2020 CON Switch), - (Cisco Embedded Service 2020 NCP B Switch), - (Cisco Embedded Service 2020 NCP Switch), - (Cisco Enhanced Layer 2 EtherSwitch Service Module), - (Cisco Enhanced Layer 2/3 EtherSwitch Service Module), - (Cisco Gigabit Ethernet Switch Module (CGESM) for HP), - (Cisco IE 2000-16PTC-G Industrial Ethernet Switch), - (Cisco IE 2000-16T67 Industrial Ethernet Switch), - (Cisco IE 2000-16T67P Industrial Ethernet Switch), - (Cisco IE 2000-16TC Industrial Ethernet Switch), - (Cisco IE 2000-16TC-G Industrial Ethernet Switch), - (Cisco IE 2000-16TC-G-E Industrial Ethernet Switch), - (Cisco IE 2000-16TC-G-N Industrial Ethernet Switch), - (Cisco IE 2000-16TC-G-X Industrial Ethernet Switch), - (Cisco IE 2000-24T67 Industrial Ethernet Switch), - (Cisco IE 2000-4S-TS-G Industrial Ethernet Switch), - (Cisco IE 2000-4T Industrial Ethernet Switch), - (Cisco IE 2000-4T-G Industrial Ethernet Switch), - (Cisco IE 2000-4TS Industrial Ethernet Switch), - (Cisco IE 2000-4TS-G Industrial Ethernet Switch), - (Cisco IE 2000-8T67 Industrial Ethernet Switch), - (Cisco IE 2000-8T67P Industrial Ethernet Switch), - (Cisco IE 2000-8TC Industrial Ethernet Switch), - (Cisco IE 2000-8TC-G Industrial Ethernet Switch), - (Cisco IE 2000-8TC-G-E Industrial Ethernet Switch), - (Cisco IE 2000-8TC-G-N Industrial Ethernet Switch), - (Cisco IE 3000-4TC Industrial Ethernet Switch), - (Cisco IE 3000-8TC Industrial Ethernet Switch), - (Cisco IE-3010-16S-8PC Industrial Ethernet Switch), - (Cisco IE-3010-24TC Industrial Ethernet Switch), - (Cisco IE-4000-16GT4G-E Industrial Ethernet Switch), - (Cisco IE-4000-16T4G-E Industrial Ethernet Switch), - (Cisco IE-4000-4GC4GP4G-E Industrial Ethernet Switch), - (Cisco IE-4000-4GS8GP4G-E Industrial Ethernet Switch), - (Cisco IE-4000-4S8P4G-E Industrial Ethernet Switch), - (Cisco IE-4000-4T4P4G-E Industrial Ethernet Switch), - (Cisco IE-4000-4TC4G-E Industrial Ethernet Switch), - (Cisco IE-4000-8GS4G-E Industrial Ethernet Switch), - (Cisco IE-4000-8GT4G-E Industrial Ethernet Switch), - (Cisco IE-4000-8GT8GP4G-E Industrial Ethernet Switch), - (Cisco IE-4000-8S4G-E Industrial Ethernet Switch), - (Cisco IE-4000-8T4G-E Industrial Ethernet Switch), - (Cisco IE-4010-16S12P Industrial Ethernet Switch), - (Cisco IE-4010-4S24P Industrial Ethernet Switch), - (Cisco IE-5000-12S12P-10G Industrial Ethernet Switch), - (Cisco IE-5000-16S12P Industrial Ethernet Switch), - (Cisco ME 4924-10GE Switch), - (Cisco RF Gateway 10), - (Cisco SM-X Layer 2/3 EtherSwitch Service Module), - (Cisco Catalyst 2960XR-48FPD-L Switch)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "17.03.2017",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "06.02.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "24.03.2017",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2017-00655",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2017-3881",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Catalyst 2350-48TD-S Switch, Catalyst 2350-48TD-SD Switch, Catalyst 2360-48TD-S Switch, Catalyst 2918-24TC-C Switch, Catalyst 2918-24TT-C Switch, Catalyst 2918-48TC-C Switch, Catalyst 2918-48TT-C Switch, Catalyst 2928-24TC-C Switch, Catalyst 2960-24-S Switch, Catalyst 2960-24LC-S Switch, Catalyst 2960-24LT-L Switch, Catalyst 2960-24PC-L Switch, Catalyst 2960-24PC-S Switch, Catalyst 2960-24TC-L Switch, Catalyst 2960-24TC-S Switch, Catalyst 2960-24TT-L Switch, Catalyst 2960-48PST-L Switch, Catalyst 2960-48PST-S Switch, Catalyst 2960-48TC-L Switch, Catalyst 2960-48TC-S Switch, Catalyst 2960-48TT-L Switch, Catalyst 2960-48TT-S Switch, Catalyst 2960-8TC-L Compact Switch, Catalyst 2960-8TC-S Compact Switch, Cisco Catalyst 2960-Plus 24LC-L Switch, Cisco Catalyst 2960-Plus 24LC-S Switch, Cisco Catalyst 2960-Plus 24PC-L Switch, Cisco Catalyst 2960-Plus 24PC-S Switch, Cisco Catalyst 2960-Plus 24TC-L Switch, Cisco Catalyst 2960-Plus 24TC-S Switch, Cisco Catalyst 2960-Plus 48PST-L Switch, Cisco Catalyst 2960-Plus 48PST-S Switch, Cisco Catalyst 2960-Plus 48TC-L Switch, Cisco Catalyst 2960-Plus 48TC-S Switch, Catalyst 2960C-12PC-L Switch, Catalyst 2960C-8PC-L Switch, Catalyst 2960C-8TC-L Switch, Catalyst 2960C-8TC-S Switch, Catalyst 2960CG-8TC-L Compact Switch, Catalyst 2960CPD-8PT-L Switch, Cisco Catalyst 2960CPD-8TT-L Switch, Cisco Catalyst 2960CX-8PC-L Switch, Cisco Catalyst 2960CX-8TC-L Switch, Cisco Catalyst 2960G-24TC-L Switch, Cisco Catalyst 2960G-48TC-L Switch, Cisco Catalyst 2960G-8TC-L Compact Switch, Cisco Catalyst 2960L-16PS-LL Switch, Cisco Catalyst 2960L-16TS-LL Switch, Cisco Catalyst 2960L-24PS-LL Switch, Cisco Catalyst 2960L-24TS-LL Switch, Cisco Catalyst 2960L-48PS-LL Switch, Cisco Catalyst 2960L-48TS-LL Switch, Cisco Catalyst 2960L-8PS-LL Switch, Cisco Catalyst 2960L-8TS-LL Switch, Cisco Catalyst 2960PD-8TT-L Compact Switch, Cisco Catalyst 2960S-24PD-L Switch, Cisco Catalyst 2960S-24PS-L Switch, Cisco Catalyst 2960S-24TD-L Switch, Cisco Catalyst 2960S-24TS-L Switch, Cisco Catalyst 2960S-24TS-S Switch, Cisco Catalyst 2960S-48FPD-L Switch, Cisco Catalyst 2960S-48FPS-L Switch, Cisco Catalyst 2960S-48LPD-L Switch, Cisco Catalyst 2960S-48LPS-L Switch, Cisco Catalyst 2960S-48TD-L Switch, Cisco Catalyst 2960S-48TS-L Switch, Cisco Catalyst 2960S-48TS-S Switch, Cisco Catalyst 2960S-F24PS-L Switch, Cisco Catalyst 2960S-F24TS-L Switch, Cisco Catalyst 2960S-F24TS-S Switch, Cisco Catalyst 2960S-F48FPS-L Switch, Cisco Catalyst 2960S-F48LPS-L Switch, Cisco Catalyst 2960S-F48TS-L Switch, Cisco Catalyst 2960S-F48TS-S Switch, Cisco Catalyst 2960X-24PD-L Switch, Cisco Catalyst 2960X-24PS-L Switch, Cisco Catalyst 2960X-24PSQ-L Cool Switch, Cisco Catalyst 2960X-24TD-L Switch, Cisco Catalyst 2960X-24TS-L Switch, Cisco Catalyst 2960X-24TS-LL Switch, Cisco Catalyst 2960X-48FPD-L Switch, Cisco Catalyst 2960X-48FPS-L Switch, Cisco Catalyst 2960X-48LPD-L Switch, Cisco Catalyst 2960X-48LPS-L Switch, Cisco Catalyst 2960X-48TD-L Switch, Cisco Catalyst 2960X-48TS-L Switch, Cisco Catalyst 2960X-48TS-LL Switch, Cisco Catalyst 2960XR-24PD-I Switch, Cisco Catalyst 2960XR-24PD-L Switch, Cisco Catalyst 2960XR-24PS-I Switch, Cisco Catalyst 2960XR-24PS-L Switch, Cisco Catalyst 2960XR-24TD-I Switch, Cisco Catalyst 2960XR-24TD-L Switch, Cisco Catalyst 2960XR-24TS-I Switch, Cisco Catalyst 2960XR-24TS-L Switch, Cisco Catalyst 2960XR-48FPD-I Switch, Cisco Catalyst 2960XR-48FPS-I Switch, Cisco Catalyst 2960XR-48FPS-L Switch, Cisco Catalyst 2960XR-48LPD-I Switch, Cisco Catalyst 2960XR-48LPD-L Switch, Cisco Catalyst 2960XR-48LPS-I Switch, Cisco Catalyst 2960XR-48LPS-L Switch, Cisco Catalyst 2960XR-48TD-I Switch, Cisco Catalyst 2960XR-48TD-L Switch, Cisco Catalyst 2960XR-48TS-I Switch, Cisco Catalyst 2960XR-48TS-L Switch, Cisco Catalyst 2970G-24T Switch, Cisco Catalyst 2970G-24TS Switch, Cisco Catalyst 2975 Switch, Cisco Catalyst 3550 12G Switch, Cisco Catalyst 3550 12T Switch, Cisco Catalyst 3550 24 DC SMI Switch, Cisco Catalyst 3550 24 EMI Switch, Cisco Catalyst 3550 24 FX SMI Switch, Cisco Catalyst 3550 24 PWR Switch, Cisco Catalyst 3550 24 SMI Switch, Cisco Catalyst 3550 48 EMI Switch, Cisco Catalyst 3550 48 SMI Switch, Cisco Catalyst 3560-12PC-S Compact Switch, Cisco Catalyst 3560-24PS Switch, Cisco Catalyst 3560-24TS Switch, Cisco Catalyst 3560-48PS Switch, Cisco Catalyst 3560-48TS Switch, Cisco Catalyst 3560-8PC Compact Switch, Cisco Catalyst 3560C-12PC-S Switch, Cisco Catalyst 3560C-8PC-S Switch, Cisco Catalyst 3560CG-8PC-S Compact Switch, Cisco Catalyst 3560CG-8TC-S Compact Switch, Cisco Catalyst 3560CPD-8PT-S Compact Switch, Cisco Catalyst 3560CX-12PC-S Switch, Cisco Catalyst 3560CX-12PD-S Switch, Cisco Catalyst 3560CX-12TC-S Switch, Cisco Catalyst 3560CX-8PC-S Switch, Cisco Catalyst 3560CX-8PT-S Switch, Cisco Catalyst 3560CX-8TC-S Switch, Cisco Catalyst 3560CX-8XPD-S Switch, Cisco Catalyst 3560E-12D-E Switch, Cisco Catalyst 3560E-12D-S Switch, Cisco Catalyst 3560E-12SD-E Switch, Cisco Catalyst 3560E-12SD-S Switch, Cisco Catalyst 3560E-24PD-E Switch, Cisco Catalyst 3560E-24PD-S Switch, Cisco Catalyst 3560E-24TD-E Switch, Cisco Catalyst 3560E-24TD-S Switch, Cisco Catalyst 3560E-48PD-E Switch, Cisco Catalyst 3560E-48PD-EF Switch, Cisco Catalyst 3560E-48PD-S Switch, Cisco Catalyst 3560E-48PD-SF Switch, Cisco Catalyst 3560E-48TD-E Switch, Cisco Catalyst 3560E-48TD-S Switch, Cisco Catalyst 3560G-24PS Switch, Cisco Catalyst 3560G-24TS Switch, Cisco Catalyst 3560G-48PS Switch, Cisco Catalyst 3560G-48TS Switch, Cisco Catalyst 3560V2-24DC Switch, Cisco Catalyst 3560V2-24PS Switch, Cisco Catalyst 3560V2-24TS Switch, Cisco Catalyst 3560V2-48PS Switch, Cisco Catalyst 3560V2-48TS Switch, Cisco Catalyst 3560X-24P-E Switch, Cisco Catalyst 3560X-24P-L Switch, Cisco Catalyst 3560X-24P-S Switch, Cisco Catalyst 3560X-24T-E Switch, Cisco Catalyst 3560X-24T-L Switch, Cisco Catalyst 3560X-24T-S Switch, Cisco Catalyst 3560X-24U-E Switch, Cisco Catalyst 3560X-24U-L Switch, Cisco Catalyst 3560X-24U-S Switch, Cisco Catalyst 3560X-48P-E Switch, Cisco Catalyst 3560X-48P-L Switch, Cisco Catalyst 3560X-48P-S Switch, Cisco Catalyst 3560X-48PF-E Switch, Cisco Catalyst 3560X-48PF-L Switch, Cisco Catalyst 3560X-48PF-S Switch, Cisco Catalyst 3560X-48T-E Switch, Cisco Catalyst 3560X-48T-L Switch, Cisco Catalyst 3560X-48T-S Switch, Cisco Catalyst 3560X-48U-E Switch, Cisco Catalyst 3560X-48U-L Switch, Cisco Catalyst 3560X-48U-S Switch, Cisco Catalyst 3750 Metro 24-AC Switch, Cisco Catalyst 3750 Metro 24-DC Switch, Cisco Catalyst 3750-24FS Switch, Cisco Catalyst 3750-24PS Switch, Cisco Catalyst 3750-24TS Switch, Cisco Catalyst 3750-48PS Switch, Cisco Catalyst 3750-48TS Switch, Cisco Catalyst 3750E-24PD-E Switch, Cisco Catalyst 3750E-24PD-S Switch, Cisco Catalyst 3750E-24TD-E Switch, Cisco Catalyst 3750E-24TD-S Switch, Cisco Catalyst 3750E-48PD-E Switch, Cisco Catalyst 3750E-48PD-EF Switch, Cisco Catalyst 3750E-48PD-S Switch, Cisco Catalyst 3750E-48PD-SF Switch, Cisco Catalyst 3750E-48TD-E Switch, Cisco Catalyst 3750E-48TD-S Switch, Cisco Catalyst 3750G-12S Switch, Cisco Catalyst 3750G-12S-SD Switch, Cisco Catalyst 3750G-16TD Switch, Cisco Catalyst 3750G-24PS Switch, Cisco Catalyst 3750G-24T Switch, Cisco Catalyst 3750G-24TS Switch, Cisco Catalyst 3750G-24TS-1U Switch, Cisco Catalyst 3750G-48PS Switch, Cisco Catalyst 3750G-48TS Switch, Cisco Catalyst 3750V2-24FS Switch, Cisco Catalyst 3750V2-24PS Switch, Cisco Catalyst 3750V2-24TS Switch, Cisco Catalyst 3750V2-48PS Switch, Cisco Catalyst 3750V2-48TS Switch, Cisco Catalyst 3750X-12S-E Switch, Cisco Catalyst 3750X-12S-S Switch, Cisco Catalyst 3750X-24P-E Switch, Cisco Catalyst 3750X-24P-L Switch, Cisco Catalyst 3750X-24P-S Switch, Cisco Catalyst 3750X-24S-E Switch, Cisco Catalyst 3750X-24S-S Switch, Cisco Catalyst 3750X-24T-E Switch, Cisco Catalyst 3750X-24T-L Switch, Cisco Catalyst 3750X-24T-S Switch, Cisco Catalyst 3750X-24U-E Switch, Cisco Catalyst 3750X-24U-L Switch, Cisco Catalyst 3750X-24U-S Switch, Cisco Catalyst 3750X-48P-E Switch, Cisco Catalyst 3750X-48P-L Switch, Cisco Catalyst 3750X-48P-S Switch, Cisco Catalyst 3750X-48PF-E Switch, Cisco Catalyst 3750X-48PF-L Switch, Cisco Catalyst 3750X-48PF-S Switch, Cisco Catalyst 3750X-48T-E Switch, Cisco Catalyst 3750X-48T-L Switch, Cisco Catalyst 3750X-48T-S Switch, Cisco Catalyst 3750X-48U-E Switch, Cisco Catalyst 3750X-48U-L Switch, Cisco Catalyst 3750X-48U-S Switch, Cisco Catalyst 4000 Supervisor Engine I, Cisco Catalyst 4000/4500 Supervisor Engine IV, Cisco Catalyst 4000/4500 Supervisor Engine V, Cisco Catalyst 4500 Series Supervisor Engine II-Plus, Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS, Cisco Catalyst 4500 Series Supervisor Engine V-10GE, Cisco Catalyst 4500 Series Supervisor II-Plus-10GE, Cisco Catalyst 4500 Supervisor Engine 6-E, Cisco Catalyst 4500 Supervisor Engine 6L-E, Cisco Catalyst 4900M Switch, Cisco Catalyst 4928 10 Gigabit Ethernet Switch, Cisco Catalyst 4948 10 Gigabit Ethernet Switch, Cisco Catalyst 4948 Switch, Cisco Catalyst 4948E Ethernet Switch, Cisco Catalyst 4948E-F Ethernet Switch, Cisco Catalyst Blade Switch 3020 for HP, Cisco Catalyst Blade Switch 3030 for Dell, Cisco Catalyst Blade Switch 3032 for Dell M1000E, Cisco Catalyst Blade Switch 3040 for FSC, Cisco Catalyst Blade Switch 3120 for HP, Cisco Catalyst Blade Switch 3120X for HP, Cisco Catalyst Blade Switch 3130 for Dell M1000E, Cisco Catalyst C2928-24LT-C Switch, Cisco Catalyst C2928-48TC-C Switch, Cisco Catalyst Switch Module 3012 for IBM BladeCenter, Cisco Catalyst Switch Module 3110 for IBM BladeCenter, Cisco Catalyst Switch Module 3110X for IBM BladeCenter, Cisco Embedded Service 2020 24TC CON B Switch, Cisco Embedded Service 2020 24TC CON Switch, Cisco Embedded Service 2020 24TC NCP B Switch, Cisco Embedded Service 2020 24TC NCP Switch, Cisco Embedded Service 2020 CON B Switch, Cisco Embedded Service 2020 CON Switch, Cisco Embedded Service 2020 NCP B Switch, Cisco Embedded Service 2020 NCP Switch, Cisco Enhanced Layer 2 EtherSwitch Service Module, Cisco Enhanced Layer 2/3 EtherSwitch Service Module, Cisco Gigabit Ethernet Switch Module (CGESM) for HP, Cisco IE 2000-16PTC-G Industrial Ethernet Switch, Cisco IE 2000-16T67 Industrial Ethernet Switch, Cisco IE 2000-16T67P Industrial Ethernet Switch, Cisco IE 2000-16TC Industrial Ethernet Switch, Cisco IE 2000-16TC-G Industrial Ethernet Switch, Cisco IE 2000-16TC-G-E Industrial Ethernet Switch, Cisco IE 2000-16TC-G-N Industrial Ethernet Switch, Cisco IE 2000-16TC-G-X Industrial Ethernet Switch, Cisco IE 2000-24T67 Industrial Ethernet Switch, Cisco IE 2000-4S-TS-G Industrial Ethernet Switch, Cisco IE 2000-4T Industrial Ethernet Switch, Cisco IE 2000-4T-G Industrial Ethernet Switch, Cisco IE 2000-4TS Industrial Ethernet Switch, Cisco IE 2000-4TS-G Industrial Ethernet Switch, Cisco IE 2000-8T67 Industrial Ethernet Switch, Cisco IE 2000-8T67P Industrial Ethernet Switch, Cisco IE 2000-8TC Industrial Ethernet Switch, Cisco IE 2000-8TC-G Industrial Ethernet Switch, Cisco IE 2000-8TC-G-E Industrial Ethernet Switch, Cisco IE 2000-8TC-G-N Industrial Ethernet Switch, Cisco IE 3000-4TC Industrial Ethernet Switch, Cisco IE 3000-8TC Industrial Ethernet Switch, Cisco IE-3010-16S-8PC Industrial Ethernet Switch, Cisco IE-3010-24TC Industrial Ethernet Switch, Cisco IE-4000-16GT4G-E Industrial Ethernet Switch, Cisco IE-4000-16T4G-E Industrial Ethernet Switch, Cisco IE-4000-4GC4GP4G-E Industrial Ethernet Switch, Cisco IE-4000-4GS8GP4G-E Industrial Ethernet Switch, Cisco IE-4000-4S8P4G-E Industrial Ethernet Switch, Cisco IE-4000-4T4P4G-E Industrial Ethernet Switch, Cisco IE-4000-4TC4G-E Industrial Ethernet Switch, Cisco IE-4000-8GS4G-E Industrial Ethernet Switch, Cisco IE-4000-8GT4G-E Industrial Ethernet Switch, Cisco IE-4000-8GT8GP4G-E Industrial Ethernet Switch, Cisco IE-4000-8S4G-E Industrial Ethernet Switch, Cisco IE-4000-8T4G-E Industrial Ethernet Switch, Cisco IE-4010-16S12P Industrial Ethernet Switch, Cisco IE-4010-4S24P Industrial Ethernet Switch, Cisco IE-5000-12S12P-10G Industrial Ethernet Switch, Cisco IE-5000-16S12P Industrial Ethernet Switch, Cisco ME 4924-10GE Switch, Cisco RF Gateway 10, Cisco SM-X Layer 2/3 EtherSwitch Service Module, Cisco Catalyst 2960XR-48FPD-L Switch",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Cisco Systems Inc., \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041a\u043e\u0434 (CWE-17)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u043e\u0434\u0435 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 CMP \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Cisco Systems Inc. \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 Telnet-\u043e\u043f\u0446\u0438\u0439, \u0441\u043f\u0435\u0446\u0438\u0444\u0438\u0447\u043d\u044b\u0445 \u0434\u043b\u044f \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 CMP, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0439 \u043d\u0430 \u043f\u0440\u0438\u0435\u043c \u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0443 Telnet-\u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u0438\u0437 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432, \u043d\u0435 \u044f\u0432\u043b\u044f\u044e\u0449\u0438\u0445\u0441\u044f \u0447\u043b\u0435\u043d\u0430\u043c\u0438 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0438\u043b\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (\u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430) \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0435\u043c\u0443 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 CMP-\u043e\u043f\u0446\u0438\u0439 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 Telnet-\u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0417\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\nhttps://www.exploit-db.com/exploits/41872/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-17",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)"
}
CERTFR-2017-ALE-005
Vulnerability from certfr_alerte - Published: 2017-03-20 - Updated: 2017-05-10
Une vulnérabilité a été découverte dans les commutateurs Cisco. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Description
Une vulnérabilité dans l'implémentation du Cisco Cluster Management
Protocol (CMP) permet une exécution de code à distance dans les
commutateurs Cisco exécutant Cisco IOS ou Cisco IOS XE.
Se référer au bulletin de l'éditeur pour une liste exhaustive des
produits impactés (cf. section Documentation).
Ce protocole utilise le service Telnet afin que les membres d'un groupe
puissent dialoguer entre eux.
Cette vulnérabilité est due à deux facteurs.
Le premier est que les communications Telnet sont traitées même si elles
proviennent d'en dehors du groupe.
Le deuxième est qu'une session Telnet spécifique à CMP peut provoquer un
débordement de tampon.
A noter que le seul fait de commuter une trame comportant une charge
malveillante ne suffit pas à déclencher la vulnérabilité, la
communication piégée doit être destinée à l'équipement vulnérable.
Cisco n'a pas annoncé de date de sortie d'un correctif de sécurité.
En attendant, le CERT-FR recommande dans un premier temps de suivre les
bonnes pratiques en matière de sécurité informatique en s'assurant que
l'accès aux interfaces d 'administration des équipements réseaux soit
restreint à un canal interne de confiance.
Ensuite, le CERT-FR recommande de privilégier le protocole SSH à
Telnet.
Enfin, si désactiver les communications Telnet n'est pas une option
viable, Cisco fournit des règles de détection réseau (cf. section
Documentation).
A noter que les règles de détection SNORT 41909 et 41910 sont
disponibles gratuitement à condition d'avoir créé un compte Snort.
Celles-ci sont contenues dans le fichier server-other.so et sont de type
TRUFFLEHUNTER, c'est à dire que leur contenu est dissimulé.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
les commutateurs Cisco exécutant Cisco IOS ou Cisco IOS XE
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eles commutateurs Cisco ex\u00e9cutant Cisco IOS ou Cisco IOS XE\u003c/P\u003e",
"closed_at": "2017-05-10",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 dans l\u0027impl\u00e9mentation du Cisco Cluster Management\nProtocol (CMP) permet une ex\u00e9cution de code \u00e0 distance dans les\ncommutateurs Cisco ex\u00e9cutant Cisco IOS ou Cisco IOS XE. \nSe r\u00e9f\u00e9rer au bulletin de l\u0027\u00e9diteur pour une liste exhaustive des\nproduits impact\u00e9s (cf. section Documentation). \nCe protocole utilise le service Telnet afin que les membres d\u0027un groupe\npuissent dialoguer entre eux. \nCette vuln\u00e9rabilit\u00e9 est due \u00e0 deux facteurs. \nLe premier est que les communications Telnet sont trait\u00e9es m\u00eame si elles\nproviennent d\u0027en dehors du groupe. \nLe deuxi\u00e8me est qu\u0027une session Telnet sp\u00e9cifique \u00e0 CMP peut provoquer un\nd\u00e9bordement de tampon. \nA noter que le seul fait de commuter une trame comportant une charge\nmalveillante ne suffit pas \u00e0 d\u00e9clencher la vuln\u00e9rabilit\u00e9, la\ncommunication pi\u00e9g\u00e9e doit \u00eatre destin\u00e9e \u00e0 l\u0027\u00e9quipement vuln\u00e9rable. \nCisco n\u0027a pas annonc\u00e9 de date de sortie d\u0027un correctif de s\u00e9curit\u00e9. \nEn attendant, le CERT-FR recommande dans un premier temps de suivre les\nbonnes pratiques en mati\u00e8re de s\u00e9curit\u00e9 informatique en s\u0027assurant que\nl\u0027acc\u00e8s aux interfaces d \u0027administration des \u00e9quipements r\u00e9seaux soit\nrestreint \u00e0 un canal interne de confiance. \nEnsuite, le CERT-FR recommande de privil\u00e9gier le protocole SSH \u00e0\nTelnet. \nEnfin, si d\u00e9sactiver les communications Telnet n\u0027est pas une option\nviable, Cisco fournit des r\u00e8gles de d\u00e9tection r\u00e9seau (cf. section\nDocumentation). \nA noter que les r\u00e8gles de d\u00e9tection SNORT 41909 et 41910 sont\ndisponibles gratuitement \u00e0 condition d\u0027avoir cr\u00e9\u00e9 un compte Snort.\nCelles-ci sont contenues dans le fichier server-other.so et sont de type\nTRUFFLEHUNTER, c\u0027est \u00e0 dire que leur contenu est dissimul\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-3881",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3881"
}
],
"initial_release_date": "2017-03-20T00:00:00",
"last_revision_date": "2017-05-10T00:00:00",
"links": [
{
"title": "Avis CERT-FR CERTFR-2017-AVI-143",
"url": "http://www.cert.ssi.gouv.fr/site/CERTFR-2017-AVI-143/index.html"
},
{
"title": "Cisco IOS CMP Buffer Overflow",
"url": "https://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=7880\u0026signatureSubId=0\u0026softwareVersion=6.0\u0026releaseVersion=S972"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170317-cmp du 17 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"title": "Snort",
"url": "https://www.snort.org/downloads"
}
],
"reference": "CERTFR-2017-ALE-005",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-03-20T00:00:00.000000"
},
{
"description": "cl\u00f4ture de l\u0027alerte.",
"revision_date": "2017-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\ncommutateurs Cisco\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les commutateurs Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170317-cmp du 17 mars 2017",
"url": null
}
]
}
FKIE_CVE-2017-3881
Vulnerability from fkie_nvd - Published: 2017-03-17 22:59 - Updated: 2026-01-12 21:159.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
{
"cisaActionDue": "2022-04-15",
"cisaExploitAdd": "2022-03-25",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Cisco IOS and IOS XE Remote Code Execution Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F6546FC-F719-4FC2-ACB1-E558687769EC",
"versionEndIncluding": "15.1\\(3\\)svs",
"versionStartIncluding": "12.2s",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3588833B-3B46-4968-8710-C244AB2C7BB6",
"versionEndIncluding": "3.9e",
"versionStartIncluding": "3.2sg",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7301CDF-48BB-4E4B-862A-28B2A742D67B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "409044EC-4B25-4C7F-B20F-26CD79EEE49F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4533989C-CCDC-464A-AB68-29A752FA0759",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "487A1994-9FF2-4F15-9F38-C5B5218221DE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DD8AF-D938-4E20-89FE-E34F54EFF2F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A546FA79-654C-4CE9-9F6B-8F49255500F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "14E8F619-55BA-45E4-B75E-A64E9452F7AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23CE5551-B4ED-4554-9012-09A7CF7A5D88",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69384D20-0270-4CD5-95D0-7EA93CBDE78E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B07F566D-BCAC-44EC-AB37-6FA870D4AEDA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63946130-E5AB-476A-98AB-3BB49B7EBD1A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A9D08FF-DD21-4AAE-ABB5-561CD80D52AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C594EB3-FECD-4E88-8945-B9CD5EF6CA66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11E79AB1-9C7D-4E72-8038-60B62D3F771B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "784EF30F-54A7-46D8-B9E5-8CA2883563DD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E6061A1-706D-4129-B99B-318EACB7AB3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3FFD5C-1AC5-4D1D-9A66-9167F72E4C6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF8E6604-7F57-4147-A4D9-7A37B415D794",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E28218B4-23E0-4319-BE93-F09FB552F7D7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "042A0AA5-FC1B-451E-92A4-1E3C309B0C00",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D8D63435-4DC4-4597-AADE-89BCF470B109",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66D51A01-A213-4BB1-84C5-7D29D28A81CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D562C004-24DE-4B9D-A323-C3D2EA32A173",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D86BAF5-681F-4867-A657-D4724F748707",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "890B8C3F-2E83-4D8C-BF9B-34B50E228822",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE86BD73-E951-44EB-A056-6D7E015B9088",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DBC12299-2A7B-493C-9585-560E9A110D15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "190D6DC2-D8C6-4183-B95D-28CDEC1612FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1421F9C5-4A7C-476F-91FF-8108718B6E66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8ACDC1F-60E7-4CA7-B242-25D3F975BECF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FED6EA2F-3479-4145-82CF-B65FF24D8F36",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5720E0D-2B0E-4C44-AE80-9DBE88F57A93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "948A3F12-1761-4309-BC97-41F5068AA082",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F8FB3BE-77D7-44C7-B41A-4CB4A8766856",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA3F2B4A-5488-4AF1-A67F-BC137312ED93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57D0055E-6FC5-42C2-BD7C-C13C54060A35",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83EDAEA8-7FAA-4D59-A5B9-62B260E5616D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD8E261-E81F-4E09-8006-3D878EF61E0F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CAF5C54-CCFB-48E4-9384-A01867948BA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B9F0CC74-2523-4F85-B54C-C46455613064",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "923B1623-2A33-497B-9238-3F4699E8E4AA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "762B1BA4-69FC-4977-A0A8-9323660674A2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F249629F-1A5C-4C12-B956-552A2526A836",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C9AF097-09D6-4388-85EA-5954BD40D6B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "949533D3-6500-49BA-BE55-42E1506D3DD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94E5B561-02A2-4F79-8E28-E6A2B5C4F09D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBE7411-BD02-47A8-99BC-6B701B60A61B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96195B6B-C869-4DEF-AB5D-704B3D2FC76E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960pd-8tt-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD9CB655-99FB-42F3-A2BB-2A297B02EC2B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1EECCA51-9F60-4FAC-9291-57411441B090",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "261D5183-1A3C-41ED-B196-BB0992FC5BF9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F114380-0BB6-414C-9854-77DCEBB6C9BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "90C5B9D3-BF37-4146-A12E-193EA90C9BE6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D4845C2-9710-4CE8-81C3-D81037B7E66B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "379B1CA9-E800-41BD-B50B-5A4A6924E70F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "30C95186-A63C-40F6-8FAF-F7907BF04907",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F490DCE9-400E-4079-8409-71A17A2F50CC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA7C5852-9BF9-47E5-A524-CC13894DF470",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CADA2DD-29BD-499E-9E25-C514ABD1AADC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24B25DAE-4E68-404B-9E31-6EAE7C3DC105",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E83F7F5E-FDDD-4B8F-9814-149B076ABBE2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92FB9DEA-7A55-411D-9702-CCD8FDB0C35D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2970g-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "909A8DAE-5397-4B9B-8CDA-9B00712D6D6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2970g-24ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5193F631-B2A8-48D2-8DC7-AE2365FA2DEF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_2975:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B842CBE4-C180-4C72-AC61-E8FD522C902F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_12g:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0BB74CE-1822-48B4-BB5B-131794A2BC14",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_12t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "351FBA8D-0CA3-49A9-B703-4CDF1E8DFAE3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_24_dc_smi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A19A8A62-4FCF-43D4-B266-CB00A8217449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_24_emi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06DC2757-2107-477A-B4D1-C6D2419DFBD3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_24_fx_smi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D79CF40-2070-48E3-8135-F9893226D400",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_24_pwr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0E7A2E1-D356-470F-9D04-C743BE70B6E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_24_smi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5237B60-ACF2-473F-B822-27792A07CBC6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_48_emi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06C4C143-1CF6-4429-8BA0-7BE782032D30",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3550_48_smi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA8BBAA-E651-4626-B31D-39EA4F04D6BF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560-12pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DACEA494-E9DC-4F74-A252-259CC93E2741",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560-24ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB7E87CD-D6B7-4C7C-8627-BADB993A6D72",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560-24ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299DC29B-A5DC-4137-A95A-DCC85E9C59B2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560-48ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F482285C-D0C6-4BA3-8ACF-8461B91FDF82",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560-48ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E02CA96-ED16-410B-B51A-AA29B6E5667E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560-8pc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61467987-235B-4D06-83D2-5DF5A51E4DE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "29CCFC05-FE79-4804-AEED-00975FA49EE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A83DF239-FEFB-4573-8E41-498A5FC5EB16",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "333FA8D5-CEA5-4380-9D7C-1D72B4C98464",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "87E1CECF-0621-4004-9F6D-A2690BD18273",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D867770-2404-4F51-B120-F170927F65BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-12d-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A0E46E6-C885-4184-8EA9-C7323A482A19",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-12d-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C7EA43F-8B3A-4636-B2BF-010E141C5710",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-12sd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49D8ACB8-850C-4967-9D42-B8F162259FF3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-12sd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E14120-1B3E-4A70-B875-4EE5B979711B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-24pd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "188AE176-297C-4EB6-B048-B2743864A454",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-24pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74A09201-D66C-482D-950C-8B13B6BE69A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-24td-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A9CFC23-8C33-43F9-B5DE-1FA4D7CB2A0B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-24td-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DED5868-C623-48B7-8D04-BA5442B772BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ADB2C33A-A76D-4600-9A7E-F5E5C93FB71E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-ef:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF53A7E-9933-4AE8-B5A5-7A4657DF17A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "207E453A-F004-486A-A36A-4B120647E3F0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-sf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5403BF-948F-493C-AB10-4C5239DDA975",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-48td-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF0EBD95-F0EB-4AE5-8C11-987C3DA5F6AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560e-48td-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE73686A-5BDB-407B-99DB-2FC7107EA2ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560g-24ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B15EFDB4-AB6B-4194-A8DA-47EFC5435A9E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560g-24ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A11434F-D3CD-4F88-888B-82262837B752",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560g-48ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABFA401A-8C8C-4DD8-9795-5F38977D2D90",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560g-48ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F56B4661-3FF4-4610-9DA9-8A2E87C059B9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24dc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "71BB343B-D016-46BB-8520-3F29A639C183",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4BDEFF5D-40DC-410A-A781-44981DE9A3CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DCABE7A-783A-4E93-A762-520E653E161E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560v2-48ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D69F868-A419-48EA-8F99-A62CDEFA483D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560v2-48ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F070996F-B01C-42F3-9CE7-8ACAB89ACD70",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1EAFFF-E36A-4BED-99BD-CB16977AF312",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBD36856-FCCB-4FBA-8728-A628CC4F5F2E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "134A9D8A-F8AC-4ACF-B558-91A4BF850425",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38E344D5-195B-4995-8616-A212A9AE1DBA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A94A128-3DDD-44FD-A8DC-1ECBCC38C657",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C639B610-F43A-443D-B956-11BE7D34F41D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A74304E-855E-48DF-B8B1-4AB17C772115",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B4D477B-5EB7-4841-90DD-510DD655E288",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B63BA8D6-5139-4033-AF52-03E7515A0050",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "721A029A-D747-42D9-B91E-A57D91182AC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F76E9961-7799-4B86-A05E-9BAD9F5E1BC6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBB035A6-64B4-4612-9CF6-2DB5EB85DF13",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3088538-99F0-48EE-95EB-608AAAC4D5C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67CF3C12-93A6-4539-B3B7-C45B30FC39A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7622A057-11DD-4BCC-BB3C-E97C5C86C21A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3568327-3C97-4F60-B8CD-BD46A4297D29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F14E6769-44B6-4258-A8CF-8CDB0FA72F65",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0936B75B-CE98-4D30-8B95-D16569D7CAB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750-24fs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB109071-3FE4-4610-A9FF-2E7FEEF23E0C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750-24ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA1821EB-F2F9-4293-A92C-70C4627623D5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750-24ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F123F41-1B78-45F2-98EE-3BF74CBD8112",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750-48ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8C6BCE4-6D58-4CA1-810A-4427E4235DB9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750-48ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D922479-A8F4-4419-A450-AE1A97C480DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750_metro_24-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C15A3C-07C0-4385-BC5E-A7FB3D4B7B4D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750_metro_24-dc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D306E3-6D0A-4B53-BD70-AE3D4CDD6DCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-24pd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27A4BFC9-BA3D-43FF-8E8B-CBA87D9FED4F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-24pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC8425C-509A-43BB-865E-EB5DDE007222",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-24td-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "787CB67C-F5C1-4508-9817-CA25A5D12EEC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-24td-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "93B55075-2EB6-4511-9ADC-70F2314D7C98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "331FED4B-B014-4B2F-B2F4-A82CB18F60B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-ef:-:*:*:*:*:*:*:*",
"matchCriteriaId": "098C6C37-0785-4224-92D5-A8E1AB4A24F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B91443C6-40C3-4EB1-93C5-1F25E99C7346",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-sf:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A018451F-D2C4-40C1-A277-4D7A873F31F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-48td-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A640842-EC2A-4603-BFC0-3F42EF01D3D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750e-48td-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C71306-AA1F-4CC0-8E36-57F5EE374414",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-12s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5C6319-C780-4C9D-971D-762BE23F3D92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-12s-sd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9609F0A2-E891-46C8-A293-C4EC5093DA2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-16td:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB2A727-4B95-4B2A-9B0F-90259330BFDD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9601405-1541-4C8F-B388-85C73765D75C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-24t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D063818B-56EE-415B-89EF-C6C707637269",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A7CF840-3C7B-4765-AFBE-84AA11E91956",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ts-1u:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB69810E-900E-45BC-BD43-B7CA1DE722D3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-48ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA05EEE-9039-430F-92DF-B3E4A52A18F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750g-48ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3CDFEB-8B08-4912-896A-72F1BAFD47A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24fs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AB18A03-6D49-489B-9F27-DF19D3AC0DAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13A75271-D05C-4C91-A99A-C03BE49C9110",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45931DC1-552D-44F2-9327-8490A9B45BF9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750v2-48ps:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FED46E2B-6398-435C-ABC0-7C6B226FB55D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750v2-48ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA5D6BBD-C589-44DD-9C14-12CBCC716610",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F17A2728-7627-4550-80D3-4EC228606A7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6540A964-656D-48E2-B7D3-3F4D4B38A785",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05BA9762-0C59-4841-820C-4D30EB30E04F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB4DCCA-EEF2-4999-A977-89046D934292",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0859DCB-7572-4E78-A166-766FEF0BDFD6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "072B2446-904F-4614-B4A6-68396644B9AE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E537A35E-F4C1-4A7D-AACF-E80D4E2B3305",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2DD7944-66A9-4611-85DE-5F42848ACDB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "944895AA-9E92-45B7-8A31-AA148AF9346B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAEBB446-A86D-4C06-8054-B6C1C0ED7776",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C6551B6-85FB-4945-84CA-0E421FE53C3B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0E27272-07F1-4424-A8B9-5FDAD67DB68A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CC60521F-DC3F-46F9-BBC9-4C108D17E7F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F799EEF-3F87-456D-9152-7D44C08D8938",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD11F079-2F52-4611-B75E-33B2738501E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43534D4E-3115-4128-8214-06A52273B69A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "539BBD1B-3E1E-4CB1-B016-F20C25C46B9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4947A20-7C21-4071-843B-EB87A77A8DC0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4884D54A-E24C-4382-825C-958FBD56C060",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A6324C-5812-44E9-AC97-0511349E27B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "266C504F-0C75-428A-8F67-863F3AD31368",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E209DEC3-9A4E-40CF-B19C-B71FF76D29E1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3595C29-C1B0-49D5-AF3A-52DACDD3C725",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E72C5777-7D8D-41E7-BE3A-4DC516BD050B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7FA3259-48DD-41BD-957D-4A98AE99754E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BBFCA2CC-2F4A-4489-A3D6-3174350EB879",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_iv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2EEF9CF-19AE-4A21-88D5-06A45B972651",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D817D90-A7BA-4CA8-BA5C-FA82CA31F620",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EF8023F-C8D7-4B98-9472-6EC365A19D48",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "15B137CB-C12C-47AF-9AF5-05C1B2086351",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAD2F469-8E06-43D3-B458-0437352D5F47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus-ts:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73E711BA-BBF0-4E1A-B84C-2449E4CB8BA3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_iv:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EED3981C-C68B-4697-9AB3-A9BD6249B1E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00A7E1F3-AB1E-452C-9FA4-DD24680F65D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v-10ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24CD713C-BF36-4BCA-8BC6-55418E038136",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_ii-plus-10ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C402FF8B-6EA1-406B-9DB7-E2D8939CFFFF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4500e_supervisor_engine_8-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C30EF3-A63D-4022-A032-77C376AD9DA4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21A39CB5-8F97-4030-B9CD-D28BF5C811F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4928_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46C36E5D-F471-4002-854B-93DFFFEF471C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4948:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12B41FC2-D482-4CF7-ADAC-720CCD4C5648",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4948_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40C98C14-96EB-4AF5-9090-842234BB0855",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4948e-f_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E725C592-4ADF-4C06-958D-4BC725A0EA19",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_4948e_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92EC2EE0-F838-497D-92FD-1FD830564811",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4EBA036-A69E-40FE-B8A2-6D99C0AB9F35",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3030:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2937EE-0566-465E-9AE7-0BC97D02676E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3032:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0527FC9C-08FB-4AA5-AD59-9EEFBEFF6F53",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3040:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB0799AF-3CBB-4749-9314-9DF3A93C7D44",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEDE0913-7E59-4741-B0D9-EC6C90C5E21C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "808DEBC5-0249-491C-9607-9263F781BCDC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3130:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F15AF91D-A937-4F0B-88F9-B0EDEE7CE9EF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB558C8-826C-486A-B7CF-1E0EC0A7A106",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC95D92-296F-4671-9191-29CED1C38070",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B334CAF-50A9-4214-AA09-71617C1235A3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3110:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E65AA2DC-C7FC-48F9-B481-920793CCD004",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3110x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AB7D6BCA-376D-40DE-88AF-358A23AEB25C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BC6B538-A151-4C6F-AB66-2592335C9412",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FBF6124-87FE-4062-9774-3D7B314852FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "172A45CB-9976-4743-B342-460BDF1237E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D354D47-434F-48DB-9415-4B6B650485BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*",
"matchCriteriaId": "573BD04B-6601-4F8A-BA6E-3B5769002B6E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "230828B3-36C5-4183-824F-A0D2C8811AF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF0961D3-060C-415F-8721-6035BD813EC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:enhanced_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9861A7C6-9AC2-4B84-B86E-56BEA7A84774",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:enhanced_layer_2_etherswitch_service_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1526DA59-4077-44CF-A42C-56EC36EFFA76",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:gigabit_ethernet_switch_module_\\(cgesm\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "30B0E5E0-92ED-4AFF-BF81-A48AA6E9DC51",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0071F74-A0D3-45FE-8F58-F2F4D64AA0A1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "095B70C4-0551-42BB-88B3-602DA9AE7C18",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45EC8751-C17A-4F75-B88A-5778E2496462",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C52B1C4-A42A-42AC-ABB3-F2B289F47B8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19155C80-7068-4E3A-88EA-9F90C1B14ABC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64234EBB-B47D-4B2A-A46D-2AA234E0ECC8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C4975AA-722F-43AB-A762-88D5A00FC7EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A76C5B3B-03FF-47C0-88B1-A5AB932D02DF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA64B716-2D79-4B4E-8007-C4575AA68E8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "763B3611-7EE1-455F-96C7-0A2E83D22AF1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2D391F-27DE-48E6-9AA3-36A8C672A6AB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3DE4E5E0-F7E8-43BC-9AFC-159D6B2B4344",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BBAC7B1-693D-40F8-90BB-6290E3DCD5A2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43AF8063-E30D-411B-9CEC-25E336E5E4E4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A359421-6CD3-43E0-94FC-20C76756C7EC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0F9DF32-3E0B-47FA-912A-FCE948BA768E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-5000-12s12p-10g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FDCB2A84-541D-44A6-ABDA-67A3A6DFC80F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie-5000-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE187051-5443-44D9-A0F8-2D351D2E4372",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F63F4C5-7784-4B83-B454-E9731210920B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A89AEB2-8690-4389-A896-10430A690243",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D464787-DC79-474F-84CA-2B4AD209C21F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAFC9C43-2BAE-4F4E-B084-F9FB54EEF6D1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6EAC97A-E3FC-490F-9D02-8CA8FA87D6DA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9B0F4029-9E79-4ADE-A851-72F18635A492",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C224EE6-1436-4F11-94A8-4CC96A5001F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77A4E545-9F74-40CC-8212-11798AF8D611",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3D817838-BDA5-4ED8-8EC9-6C5F4C3C9C5B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "842352DA-0E9B-4520-9B32-C766BEA7BF9C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66521F18-9C3D-4323-AFC1-5A4ABC476084",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E62F6C8-1B96-4093-8E54-05B0086842A4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D5D3398-D9AE-4447-8D21-03853B41594E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "27364811-6885-49B9-ADE7-55CD69105EC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77F72F96-3272-432C-A8B8-781C95D65A5E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "036F4AFB-CBAA-4155-AC79-B2DC38E37613",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9725FF2E-25DB-42EB-B504-B169392D6C31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "683C46D6-6DBD-4C99-A577-4CE624DEDD8B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA132B36-55CB-492A-8B85-715201E7712F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_2000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABD77B1-BF1E-4748-A965-08D19E323D78",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_3000-4tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED7DA136-4146-439B-A27B-013F353382B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:ie_3000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3374CF70-3F34-448D-ABA0-EEF1C79DC4BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:me_4924-10ge:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8D304B8-89EB-45DE-BEA3-564028842BB9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:rf_gateway_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18233C3F-7F08-4E97-BEC1-30B336E92511",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:sm-x_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21F16053-2839-4A59-B2A7-7E642BD26BE7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el c\u00f3digo de procesamiento de Cisco Cluster Management Protocol (CMP) en Cisco IOS y Cisco IOS XE Software podr\u00eda permitir a un atacante remoto no autenticado provocar una recarga de un dispositivo afectado o ejecutar c\u00f3digo remotamente con privilegios elevados. El Cluster Management Protocol utiliza internamente Telnet como un protocolo de se\u00f1alizaci\u00f3n y comando entre los miembros del cl\u00faster. La vulnerabilidad se debe a la combinaci\u00f3n de dos factores: (1) la imposibilidad de restringir el uso de las opciones Telnet espec\u00edficas de CMP s\u00f3lo a las comunicaciones locales internas entre los miembros del cl\u00faster y, en cambio, aceptar y procesar dichas opciones a trav\u00e9s de cualquier conexi\u00f3n Telnet con un dispositivo afectado; y (2) el procesamiento incorrecto de las opciones malformadas de Telnet espec\u00edficas de CMP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando opciones malformadas de Telnet espec\u00edficas de CMP mientras establec\u00eda una sesi\u00f3n Telnet con un dispositivo Cisco afectado configurado para aceptar conexiones Telnet. Un exploit podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario y obtener el control total del dispositivo o provocar una recarga del dispositivo afectado. Esto afecta a los conmutadores Catalyst, los conmutadores Embedded Service 2020, el m\u00f3dulo de servicio Enhanced Layer 2 EtherSwitch, el m\u00f3dulo de servicio Enhanced Layer 2/3 EtherSwitch, el conmutador Gigabit Ethernet (CGESM) para HP, los conmutadores IE Industrial Ethernet, el conmutador ME 4924-10GE, la pasarela RF 10 , y m\u00f3dulo de servicio EtherSwitch de capa 2/3 SM-X. ID de errores de Cisco: CSCvd48893."
}
],
"id": "CVE-2017-3881",
"lastModified": "2026-01-12T21:15:51.593",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2017-03-17T22:59:00.640",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96960"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/97391"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038059"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"source": "psirt@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41872/"
},
{
"source": "psirt@cisco.com",
"tags": [
"Broken Link"
],
"url": "https://www.exploit-db.com/exploits/41874/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/96960"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/97391"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038059"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/41872/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://www.exploit-db.com/exploits/41874/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
CNVD-2017-03029
Vulnerability from cnvd - Published: 2017-03-21目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp
| Name | ['Cisco IOS XE', 'Cisco IOS', 'Cisco Cluster Management Protocol (CMP)'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-3881",
"cveUrl": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3881"
}
},
"description": "Cisco IOS\u548cIOS XE Software\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS\u548cIOS XE Software\u4e2d\u7684\u96c6\u7fa4\u7ba1\u7406\u534f\u8bae(CMP)\u5b58\u5728\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u672a\u8ba4\u8bc1\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8be5\u6f0f\u6d1e\u9020\u6210\u670d\u52a1\u91cd\u542f\u6216\u8005\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002",
"discovererName": "Cisco",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a \r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-03029",
"openTime": "2017-03-21",
"patchDescription": "Cisco IOS\u548cIOS XE Software\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS\u548cIOS XE Software\u4e2d\u7684\u96c6\u7fa4\u7ba1\u7406\u534f\u8bae(CMP)\u5b58\u5728\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u672a\u8ba4\u8bc1\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8be5\u6f0f\u6d1e\u9020\u6210\u670d\u52a1\u91cd\u542f\u6216\u8005\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco IOS\u548cIOS XE Software\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco IOS XE",
"Cisco IOS",
"Cisco Cluster Management Protocol (CMP)"
]
},
"referenceLink": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3881",
"serverity": "\u9ad8",
"submitTime": "2017-03-20",
"title": "Cisco IOS\u548cIOS XE Software\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
CERTFR-2017-AVI-143
Vulnerability from certfr_avis - Published: 2017-05-10 - Updated: 2017-05-10
Une vulnérabilité a été corrigée dans les commutateurs Cisco. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
les commutateurs Cisco exécutant Cisco IOS ou Cisco IOS XE (voir liste complète sur le site du constructeur, cf. section Documentation)
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eles commutateurs Cisco ex\u00e9cutant Cisco IOS ou Cisco IOS XE (voir liste compl\u00e8te sur le site du constructeur, cf. section Documentation)\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-3881",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3881"
}
],
"initial_release_date": "2017-05-10T00:00:00",
"last_revision_date": "2017-05-10T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170317-cmp du 17 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
}
],
"reference": "CERTFR-2017-AVI-143",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eles\ncommutateurs Cisco\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans les commutateurs Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20170317-cmp du 17 mars 2017",
"url": null
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.