Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-1746 (GCVE-0-2019-1746)
Vulnerability from cvelistv5 – Published: 2019-03-27 23:45 – Updated: 2024-11-21 19:41| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco IOS and IOS XE Software |
Affected:
3.2.0SG
Affected: 3.2.1SG Affected: 3.2.2SG Affected: 3.2.3SG Affected: 3.2.4SG Affected: 3.2.5SG Affected: 3.2.6SG Affected: 3.2.7SG Affected: 3.2.8SG Affected: 3.2.9SG Affected: 3.2.10SG Affected: 3.2.11SG Affected: 3.3.0SG Affected: 3.3.2SG Affected: 3.3.1SG Affected: 3.3.0XO Affected: 3.3.1XO Affected: 3.3.2XO Affected: 3.4.0SG Affected: 3.4.2SG Affected: 3.4.1SG Affected: 3.4.3SG Affected: 3.4.4SG Affected: 3.4.5SG Affected: 3.4.6SG Affected: 3.4.7SG Affected: 3.4.8SG Affected: 3.5.0E Affected: 3.5.1E Affected: 3.5.2E Affected: 3.5.3E Affected: 3.10.4S Affected: 3.12.0aS Affected: 3.6.0E Affected: 3.6.1E Affected: 3.6.0aE Affected: 3.6.0bE Affected: 3.6.2aE Affected: 3.6.2E Affected: 3.6.3E Affected: 3.6.4E Affected: 3.6.5E Affected: 3.6.6E Affected: 3.6.5aE Affected: 3.6.5bE Affected: 3.6.7E Affected: 3.6.8E Affected: 3.6.7aE Affected: 3.6.7bE Affected: 3.6.9E Affected: 3.6.10E Affected: 3.3.0SQ Affected: 3.3.1SQ Affected: 3.4.0SQ Affected: 3.4.1SQ Affected: 3.7.0E Affected: 3.7.1E Affected: 3.7.2E Affected: 3.7.3E Affected: 3.7.4E Affected: 3.7.5E Affected: 3.5.0SQ Affected: 3.5.1SQ Affected: 3.5.2SQ Affected: 3.5.3SQ Affected: 3.5.4SQ Affected: 3.5.5SQ Affected: 3.5.6SQ Affected: 3.5.7SQ Affected: 3.5.8SQ Affected: 3.16.1S Affected: 3.16.0bS Affected: 3.16.10S Affected: 3.8.0E Affected: 3.8.1E Affected: 3.8.2E Affected: 3.8.3E Affected: 3.8.4E Affected: 3.8.5E Affected: 3.8.5aE Affected: 3.8.6E Affected: 3.8.7E Affected: 3.9.0E Affected: 3.9.1E Affected: 3.9.2E Affected: 3.9.2bE Affected: 16.9.2h Affected: 3.10.0E Affected: 3.10.1E Affected: 3.10.0cE Affected: 3.10.1aE Affected: 3.10.1sE Affected: 16.12.1 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:28:42.410Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/107612"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-1746",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-21T18:59:52.919534Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T19:41:58.266Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS and IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.2.0SG"
},
{
"status": "affected",
"version": "3.2.1SG"
},
{
"status": "affected",
"version": "3.2.2SG"
},
{
"status": "affected",
"version": "3.2.3SG"
},
{
"status": "affected",
"version": "3.2.4SG"
},
{
"status": "affected",
"version": "3.2.5SG"
},
{
"status": "affected",
"version": "3.2.6SG"
},
{
"status": "affected",
"version": "3.2.7SG"
},
{
"status": "affected",
"version": "3.2.8SG"
},
{
"status": "affected",
"version": "3.2.9SG"
},
{
"status": "affected",
"version": "3.2.10SG"
},
{
"status": "affected",
"version": "3.2.11SG"
},
{
"status": "affected",
"version": "3.3.0SG"
},
{
"status": "affected",
"version": "3.3.2SG"
},
{
"status": "affected",
"version": "3.3.1SG"
},
{
"status": "affected",
"version": "3.3.0XO"
},
{
"status": "affected",
"version": "3.3.1XO"
},
{
"status": "affected",
"version": "3.3.2XO"
},
{
"status": "affected",
"version": "3.4.0SG"
},
{
"status": "affected",
"version": "3.4.2SG"
},
{
"status": "affected",
"version": "3.4.1SG"
},
{
"status": "affected",
"version": "3.4.3SG"
},
{
"status": "affected",
"version": "3.4.4SG"
},
{
"status": "affected",
"version": "3.4.5SG"
},
{
"status": "affected",
"version": "3.4.6SG"
},
{
"status": "affected",
"version": "3.4.7SG"
},
{
"status": "affected",
"version": "3.4.8SG"
},
{
"status": "affected",
"version": "3.5.0E"
},
{
"status": "affected",
"version": "3.5.1E"
},
{
"status": "affected",
"version": "3.5.2E"
},
{
"status": "affected",
"version": "3.5.3E"
},
{
"status": "affected",
"version": "3.10.4S"
},
{
"status": "affected",
"version": "3.12.0aS"
},
{
"status": "affected",
"version": "3.6.0E"
},
{
"status": "affected",
"version": "3.6.1E"
},
{
"status": "affected",
"version": "3.6.0aE"
},
{
"status": "affected",
"version": "3.6.0bE"
},
{
"status": "affected",
"version": "3.6.2aE"
},
{
"status": "affected",
"version": "3.6.2E"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.4E"
},
{
"status": "affected",
"version": "3.6.5E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5aE"
},
{
"status": "affected",
"version": "3.6.5bE"
},
{
"status": "affected",
"version": "3.6.7E"
},
{
"status": "affected",
"version": "3.6.8E"
},
{
"status": "affected",
"version": "3.6.7aE"
},
{
"status": "affected",
"version": "3.6.7bE"
},
{
"status": "affected",
"version": "3.6.9E"
},
{
"status": "affected",
"version": "3.6.10E"
},
{
"status": "affected",
"version": "3.3.0SQ"
},
{
"status": "affected",
"version": "3.3.1SQ"
},
{
"status": "affected",
"version": "3.4.0SQ"
},
{
"status": "affected",
"version": "3.4.1SQ"
},
{
"status": "affected",
"version": "3.7.0E"
},
{
"status": "affected",
"version": "3.7.1E"
},
{
"status": "affected",
"version": "3.7.2E"
},
{
"status": "affected",
"version": "3.7.3E"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.5.0SQ"
},
{
"status": "affected",
"version": "3.5.1SQ"
},
{
"status": "affected",
"version": "3.5.2SQ"
},
{
"status": "affected",
"version": "3.5.3SQ"
},
{
"status": "affected",
"version": "3.5.4SQ"
},
{
"status": "affected",
"version": "3.5.5SQ"
},
{
"status": "affected",
"version": "3.5.6SQ"
},
{
"status": "affected",
"version": "3.5.7SQ"
},
{
"status": "affected",
"version": "3.5.8SQ"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.0bS"
},
{
"status": "affected",
"version": "3.16.10S"
},
{
"status": "affected",
"version": "3.8.0E"
},
{
"status": "affected",
"version": "3.8.1E"
},
{
"status": "affected",
"version": "3.8.2E"
},
{
"status": "affected",
"version": "3.8.3E"
},
{
"status": "affected",
"version": "3.8.4E"
},
{
"status": "affected",
"version": "3.8.5E"
},
{
"status": "affected",
"version": "3.8.5aE"
},
{
"status": "affected",
"version": "3.8.6E"
},
{
"status": "affected",
"version": "3.8.7E"
},
{
"status": "affected",
"version": "3.9.0E"
},
{
"status": "affected",
"version": "3.9.1E"
},
{
"status": "affected",
"version": "3.9.2E"
},
{
"status": "affected",
"version": "3.9.2bE"
},
{
"status": "affected",
"version": "16.9.2h"
},
{
"status": "affected",
"version": "3.10.0E"
},
{
"status": "affected",
"version": "3.10.1E"
},
{
"status": "affected",
"version": "3.10.0cE"
},
{
"status": "affected",
"version": "3.10.1aE"
},
{
"status": "affected",
"version": "3.10.1sE"
},
{
"status": "affected",
"version": "16.12.1"
}
]
}
],
"datePublic": "2019-03-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-03-29T06:06:05.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/107612"
}
],
"source": {
"advisory": "cisco-sa-20190327-cmp-dos",
"defect": [
[
"CSCvj25068",
"CSCvj25124"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-03-27T16:00:00-0700",
"ID": "CVE-2019-1746",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE Software",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.2.0SG"
},
{
"version_affected": "=",
"version_value": "3.2.1SG"
},
{
"version_affected": "=",
"version_value": "3.2.2SG"
},
{
"version_affected": "=",
"version_value": "3.2.3SG"
},
{
"version_affected": "=",
"version_value": "3.2.4SG"
},
{
"version_affected": "=",
"version_value": "3.2.5SG"
},
{
"version_affected": "=",
"version_value": "3.2.6SG"
},
{
"version_affected": "=",
"version_value": "3.2.7SG"
},
{
"version_affected": "=",
"version_value": "3.2.8SG"
},
{
"version_affected": "=",
"version_value": "3.2.9SG"
},
{
"version_affected": "=",
"version_value": "3.2.10SG"
},
{
"version_affected": "=",
"version_value": "3.2.11SG"
},
{
"version_affected": "=",
"version_value": "3.3.0SG"
},
{
"version_affected": "=",
"version_value": "3.3.2SG"
},
{
"version_affected": "=",
"version_value": "3.3.1SG"
},
{
"version_affected": "=",
"version_value": "3.3.0XO"
},
{
"version_affected": "=",
"version_value": "3.3.1XO"
},
{
"version_affected": "=",
"version_value": "3.3.2XO"
},
{
"version_affected": "=",
"version_value": "3.4.0SG"
},
{
"version_affected": "=",
"version_value": "3.4.2SG"
},
{
"version_affected": "=",
"version_value": "3.4.1SG"
},
{
"version_affected": "=",
"version_value": "3.4.3SG"
},
{
"version_affected": "=",
"version_value": "3.4.4SG"
},
{
"version_affected": "=",
"version_value": "3.4.5SG"
},
{
"version_affected": "=",
"version_value": "3.4.6SG"
},
{
"version_affected": "=",
"version_value": "3.4.7SG"
},
{
"version_affected": "=",
"version_value": "3.4.8SG"
},
{
"version_affected": "=",
"version_value": "3.5.0E"
},
{
"version_affected": "=",
"version_value": "3.5.1E"
},
{
"version_affected": "=",
"version_value": "3.5.2E"
},
{
"version_affected": "=",
"version_value": "3.5.3E"
},
{
"version_affected": "=",
"version_value": "3.10.4S"
},
{
"version_affected": "=",
"version_value": "3.12.0aS"
},
{
"version_affected": "=",
"version_value": "3.6.0E"
},
{
"version_affected": "=",
"version_value": "3.6.1E"
},
{
"version_affected": "=",
"version_value": "3.6.0aE"
},
{
"version_affected": "=",
"version_value": "3.6.0bE"
},
{
"version_affected": "=",
"version_value": "3.6.2aE"
},
{
"version_affected": "=",
"version_value": "3.6.2E"
},
{
"version_affected": "=",
"version_value": "3.6.3E"
},
{
"version_affected": "=",
"version_value": "3.6.4E"
},
{
"version_affected": "=",
"version_value": "3.6.5E"
},
{
"version_affected": "=",
"version_value": "3.6.6E"
},
{
"version_affected": "=",
"version_value": "3.6.5aE"
},
{
"version_affected": "=",
"version_value": "3.6.5bE"
},
{
"version_affected": "=",
"version_value": "3.6.7E"
},
{
"version_affected": "=",
"version_value": "3.6.8E"
},
{
"version_affected": "=",
"version_value": "3.6.7aE"
},
{
"version_affected": "=",
"version_value": "3.6.7bE"
},
{
"version_affected": "=",
"version_value": "3.6.9E"
},
{
"version_affected": "=",
"version_value": "3.6.10E"
},
{
"version_affected": "=",
"version_value": "3.3.0SQ"
},
{
"version_affected": "=",
"version_value": "3.3.1SQ"
},
{
"version_affected": "=",
"version_value": "3.4.0SQ"
},
{
"version_affected": "=",
"version_value": "3.4.1SQ"
},
{
"version_affected": "=",
"version_value": "3.7.0E"
},
{
"version_affected": "=",
"version_value": "3.7.1E"
},
{
"version_affected": "=",
"version_value": "3.7.2E"
},
{
"version_affected": "=",
"version_value": "3.7.3E"
},
{
"version_affected": "=",
"version_value": "3.7.4E"
},
{
"version_affected": "=",
"version_value": "3.7.5E"
},
{
"version_affected": "=",
"version_value": "3.5.0SQ"
},
{
"version_affected": "=",
"version_value": "3.5.1SQ"
},
{
"version_affected": "=",
"version_value": "3.5.2SQ"
},
{
"version_affected": "=",
"version_value": "3.5.3SQ"
},
{
"version_affected": "=",
"version_value": "3.5.4SQ"
},
{
"version_affected": "=",
"version_value": "3.5.5SQ"
},
{
"version_affected": "=",
"version_value": "3.5.6SQ"
},
{
"version_affected": "=",
"version_value": "3.5.7SQ"
},
{
"version_affected": "=",
"version_value": "3.5.8SQ"
},
{
"version_affected": "=",
"version_value": "3.16.1S"
},
{
"version_affected": "=",
"version_value": "3.16.0bS"
},
{
"version_affected": "=",
"version_value": "3.16.10S"
},
{
"version_affected": "=",
"version_value": "3.8.0E"
},
{
"version_affected": "=",
"version_value": "3.8.1E"
},
{
"version_affected": "=",
"version_value": "3.8.2E"
},
{
"version_affected": "=",
"version_value": "3.8.3E"
},
{
"version_affected": "=",
"version_value": "3.8.4E"
},
{
"version_affected": "=",
"version_value": "3.8.5E"
},
{
"version_affected": "=",
"version_value": "3.8.5aE"
},
{
"version_affected": "=",
"version_value": "3.8.6E"
},
{
"version_affected": "=",
"version_value": "3.8.7E"
},
{
"version_affected": "=",
"version_value": "3.9.0E"
},
{
"version_affected": "=",
"version_value": "3.9.1E"
},
{
"version_affected": "=",
"version_value": "3.9.2E"
},
{
"version_affected": "=",
"version_value": "3.9.2bE"
},
{
"version_affected": "=",
"version_value": "16.9.2h"
},
{
"version_affected": "=",
"version_value": "3.10.0E"
},
{
"version_affected": "=",
"version_value": "3.10.1E"
},
{
"version_affected": "=",
"version_value": "3.10.0cE"
},
{
"version_affected": "=",
"version_value": "3.10.1aE"
},
{
"version_affected": "=",
"version_value": "3.10.1sE"
},
{
"version_affected": "=",
"version_value": "16.12.1"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "7.4",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107612"
}
]
},
"source": {
"advisory": "cisco-sa-20190327-cmp-dos",
"defect": [
[
"CSCvj25068",
"CSCvj25124"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-1746",
"datePublished": "2019-03-27T23:45:13.618Z",
"dateReserved": "2018-12-06T00:00:00.000Z",
"dateUpdated": "2024-11-21T19:41:58.266Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\", \"name\": \"20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/107612\", \"name\": \"107612\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T18:28:42.410Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-1746\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-21T18:59:52.919534Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-21T19:01:19.770Z\"}}], \"cna\": {\"title\": \"Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"source\": {\"defect\": [[\"CSCvj25068\", \"CSCvj25124\"]], \"advisory\": \"cisco-sa-20190327-cmp-dos\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"CHANGED\", \"version\": \"3.0\", \"baseScore\": 7.4, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS and IOS XE Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.2.0SG\"}, {\"status\": \"affected\", \"version\": \"3.2.1SG\"}, {\"status\": \"affected\", \"version\": \"3.2.2SG\"}, {\"status\": \"affected\", \"version\": \"3.2.3SG\"}, {\"status\": \"affected\", \"version\": \"3.2.4SG\"}, {\"status\": \"affected\", \"version\": \"3.2.5SG\"}, {\"status\": \"affected\", \"version\": \"3.2.6SG\"}, {\"status\": \"affected\", \"version\": \"3.2.7SG\"}, {\"status\": \"affected\", \"version\": \"3.2.8SG\"}, {\"status\": \"affected\", \"version\": \"3.2.9SG\"}, {\"status\": \"affected\", \"version\": \"3.2.10SG\"}, {\"status\": \"affected\", \"version\": \"3.2.11SG\"}, {\"status\": \"affected\", \"version\": \"3.3.0SG\"}, {\"status\": \"affected\", \"version\": \"3.3.2SG\"}, {\"status\": \"affected\", \"version\": \"3.3.1SG\"}, {\"status\": \"affected\", \"version\": \"3.3.0XO\"}, {\"status\": \"affected\", \"version\": \"3.3.1XO\"}, {\"status\": \"affected\", \"version\": \"3.3.2XO\"}, {\"status\": \"affected\", \"version\": \"3.4.0SG\"}, {\"status\": \"affected\", \"version\": \"3.4.2SG\"}, {\"status\": \"affected\", \"version\": \"3.4.1SG\"}, {\"status\": \"affected\", \"version\": \"3.4.3SG\"}, {\"status\": \"affected\", \"version\": \"3.4.4SG\"}, {\"status\": \"affected\", \"version\": \"3.4.5SG\"}, {\"status\": \"affected\", \"version\": \"3.4.6SG\"}, {\"status\": \"affected\", \"version\": \"3.4.7SG\"}, {\"status\": \"affected\", \"version\": \"3.4.8SG\"}, {\"status\": \"affected\", \"version\": \"3.5.0E\"}, {\"status\": \"affected\", \"version\": \"3.5.1E\"}, {\"status\": \"affected\", \"version\": \"3.5.2E\"}, {\"status\": \"affected\", \"version\": \"3.5.3E\"}, {\"status\": \"affected\", \"version\": \"3.10.4S\"}, {\"status\": \"affected\", \"version\": \"3.12.0aS\"}, {\"status\": \"affected\", \"version\": \"3.6.0E\"}, {\"status\": \"affected\", \"version\": \"3.6.1E\"}, {\"status\": \"affected\", \"version\": \"3.6.0aE\"}, {\"status\": \"affected\", \"version\": \"3.6.0bE\"}, {\"status\": \"affected\", \"version\": \"3.6.2aE\"}, {\"status\": \"affected\", \"version\": \"3.6.2E\"}, {\"status\": \"affected\", \"version\": \"3.6.3E\"}, {\"status\": \"affected\", \"version\": \"3.6.4E\"}, {\"status\": \"affected\", \"version\": \"3.6.5E\"}, {\"status\": \"affected\", \"version\": \"3.6.6E\"}, {\"status\": \"affected\", \"version\": \"3.6.5aE\"}, {\"status\": \"affected\", \"version\": \"3.6.5bE\"}, {\"status\": \"affected\", \"version\": \"3.6.7E\"}, {\"status\": \"affected\", \"version\": \"3.6.8E\"}, {\"status\": \"affected\", \"version\": \"3.6.7aE\"}, {\"status\": \"affected\", \"version\": \"3.6.7bE\"}, {\"status\": \"affected\", \"version\": \"3.6.9E\"}, {\"status\": \"affected\", \"version\": \"3.6.10E\"}, {\"status\": \"affected\", \"version\": \"3.3.0SQ\"}, {\"status\": \"affected\", \"version\": \"3.3.1SQ\"}, {\"status\": \"affected\", \"version\": \"3.4.0SQ\"}, {\"status\": \"affected\", \"version\": \"3.4.1SQ\"}, {\"status\": \"affected\", \"version\": \"3.7.0E\"}, {\"status\": \"affected\", \"version\": \"3.7.1E\"}, {\"status\": \"affected\", \"version\": \"3.7.2E\"}, {\"status\": \"affected\", \"version\": \"3.7.3E\"}, {\"status\": \"affected\", \"version\": \"3.7.4E\"}, {\"status\": \"affected\", \"version\": \"3.7.5E\"}, {\"status\": \"affected\", \"version\": \"3.5.0SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.1SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.2SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.3SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.4SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.5SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.6SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.7SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.8SQ\"}, {\"status\": \"affected\", \"version\": \"3.16.1S\"}, {\"status\": \"affected\", \"version\": \"3.16.0bS\"}, {\"status\": \"affected\", \"version\": \"3.16.10S\"}, {\"status\": \"affected\", \"version\": \"3.8.0E\"}, {\"status\": \"affected\", \"version\": \"3.8.1E\"}, {\"status\": \"affected\", \"version\": \"3.8.2E\"}, {\"status\": \"affected\", \"version\": \"3.8.3E\"}, {\"status\": \"affected\", \"version\": \"3.8.4E\"}, {\"status\": \"affected\", \"version\": \"3.8.5E\"}, {\"status\": \"affected\", \"version\": \"3.8.5aE\"}, {\"status\": \"affected\", \"version\": \"3.8.6E\"}, {\"status\": \"affected\", \"version\": \"3.8.7E\"}, {\"status\": \"affected\", \"version\": \"3.9.0E\"}, {\"status\": \"affected\", \"version\": \"3.9.1E\"}, {\"status\": \"affected\", \"version\": \"3.9.2E\"}, {\"status\": \"affected\", \"version\": \"3.9.2bE\"}, {\"status\": \"affected\", \"version\": \"16.9.2h\"}, {\"status\": \"affected\", \"version\": \"3.10.0E\"}, {\"status\": \"affected\", \"version\": \"3.10.1E\"}, {\"status\": \"affected\", \"version\": \"3.10.0cE\"}, {\"status\": \"affected\", \"version\": \"3.10.1aE\"}, {\"status\": \"affected\", \"version\": \"3.10.1sE\"}, {\"status\": \"affected\", \"version\": \"16.12.1\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"datePublic\": \"2019-03-27T00:00:00.000Z\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\", \"name\": \"20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}, {\"url\": \"http://www.securityfocus.com/bid/107612\", \"name\": \"107612\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2019-03-29T06:06:05.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"7.4\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\"}}, \"source\": {\"defect\": [[\"CSCvj25068\", \"CSCvj25124\"]], \"advisory\": \"cisco-sa-20190327-cmp-dos\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"3.2.0SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.1SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.2SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.3SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.4SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.5SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.6SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.7SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.8SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.9SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.10SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.11SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.0SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.2SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.1SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.0XO\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.1XO\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.2XO\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.0SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.2SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.1SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.3SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.4SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.5SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.6SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.7SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.8SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.4S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.12.0aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.0aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.0bE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.2aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.6E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5bE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.8E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7bE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.9E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.10E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.0SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.1SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.0SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.1SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.0SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.1SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.2SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.3SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.4SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.5SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.6SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.7SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.8SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.1S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.0bS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.10S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.5aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.6E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.7E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.2bE\", \"version_affected\": \"=\"}, {\"version_value\": \"16.9.2h\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.0cE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1sE\", \"version_affected\": \"=\"}, {\"version_value\": \"16.12.1\", \"version_affected\": \"=\"}]}, \"product_name\": \"Cisco IOS and IOS XE Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\", \"name\": \"20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"refsource\": \"CISCO\"}, {\"url\": \"http://www.securityfocus.com/bid/107612\", \"name\": \"107612\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-20\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-1746\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2019-03-27T16:00:00-0700\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2019-1746\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-21T19:41:58.266Z\", \"dateReserved\": \"2018-12-06T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2019-03-27T23:45:13.618Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GSD-2019-1746
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-1746",
"description": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.",
"id": "GSD-2019-1746"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-1746"
],
"details": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.",
"id": "GSD-2019-1746",
"modified": "2023-12-13T01:23:52.313807Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-03-27T16:00:00-0700",
"ID": "CVE-2019-1746",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE Software",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.2.0SG"
},
{
"version_affected": "=",
"version_value": "3.2.1SG"
},
{
"version_affected": "=",
"version_value": "3.2.2SG"
},
{
"version_affected": "=",
"version_value": "3.2.3SG"
},
{
"version_affected": "=",
"version_value": "3.2.4SG"
},
{
"version_affected": "=",
"version_value": "3.2.5SG"
},
{
"version_affected": "=",
"version_value": "3.2.6SG"
},
{
"version_affected": "=",
"version_value": "3.2.7SG"
},
{
"version_affected": "=",
"version_value": "3.2.8SG"
},
{
"version_affected": "=",
"version_value": "3.2.9SG"
},
{
"version_affected": "=",
"version_value": "3.2.10SG"
},
{
"version_affected": "=",
"version_value": "3.2.11SG"
},
{
"version_affected": "=",
"version_value": "3.3.0SG"
},
{
"version_affected": "=",
"version_value": "3.3.2SG"
},
{
"version_affected": "=",
"version_value": "3.3.1SG"
},
{
"version_affected": "=",
"version_value": "3.3.0XO"
},
{
"version_affected": "=",
"version_value": "3.3.1XO"
},
{
"version_affected": "=",
"version_value": "3.3.2XO"
},
{
"version_affected": "=",
"version_value": "3.4.0SG"
},
{
"version_affected": "=",
"version_value": "3.4.2SG"
},
{
"version_affected": "=",
"version_value": "3.4.1SG"
},
{
"version_affected": "=",
"version_value": "3.4.3SG"
},
{
"version_affected": "=",
"version_value": "3.4.4SG"
},
{
"version_affected": "=",
"version_value": "3.4.5SG"
},
{
"version_affected": "=",
"version_value": "3.4.6SG"
},
{
"version_affected": "=",
"version_value": "3.4.7SG"
},
{
"version_affected": "=",
"version_value": "3.4.8SG"
},
{
"version_affected": "=",
"version_value": "3.5.0E"
},
{
"version_affected": "=",
"version_value": "3.5.1E"
},
{
"version_affected": "=",
"version_value": "3.5.2E"
},
{
"version_affected": "=",
"version_value": "3.5.3E"
},
{
"version_affected": "=",
"version_value": "3.10.4S"
},
{
"version_affected": "=",
"version_value": "3.12.0aS"
},
{
"version_affected": "=",
"version_value": "3.6.0E"
},
{
"version_affected": "=",
"version_value": "3.6.1E"
},
{
"version_affected": "=",
"version_value": "3.6.0aE"
},
{
"version_affected": "=",
"version_value": "3.6.0bE"
},
{
"version_affected": "=",
"version_value": "3.6.2aE"
},
{
"version_affected": "=",
"version_value": "3.6.2E"
},
{
"version_affected": "=",
"version_value": "3.6.3E"
},
{
"version_affected": "=",
"version_value": "3.6.4E"
},
{
"version_affected": "=",
"version_value": "3.6.5E"
},
{
"version_affected": "=",
"version_value": "3.6.6E"
},
{
"version_affected": "=",
"version_value": "3.6.5aE"
},
{
"version_affected": "=",
"version_value": "3.6.5bE"
},
{
"version_affected": "=",
"version_value": "3.6.7E"
},
{
"version_affected": "=",
"version_value": "3.6.8E"
},
{
"version_affected": "=",
"version_value": "3.6.7aE"
},
{
"version_affected": "=",
"version_value": "3.6.7bE"
},
{
"version_affected": "=",
"version_value": "3.6.9E"
},
{
"version_affected": "=",
"version_value": "3.6.10E"
},
{
"version_affected": "=",
"version_value": "3.3.0SQ"
},
{
"version_affected": "=",
"version_value": "3.3.1SQ"
},
{
"version_affected": "=",
"version_value": "3.4.0SQ"
},
{
"version_affected": "=",
"version_value": "3.4.1SQ"
},
{
"version_affected": "=",
"version_value": "3.7.0E"
},
{
"version_affected": "=",
"version_value": "3.7.1E"
},
{
"version_affected": "=",
"version_value": "3.7.2E"
},
{
"version_affected": "=",
"version_value": "3.7.3E"
},
{
"version_affected": "=",
"version_value": "3.7.4E"
},
{
"version_affected": "=",
"version_value": "3.7.5E"
},
{
"version_affected": "=",
"version_value": "3.5.0SQ"
},
{
"version_affected": "=",
"version_value": "3.5.1SQ"
},
{
"version_affected": "=",
"version_value": "3.5.2SQ"
},
{
"version_affected": "=",
"version_value": "3.5.3SQ"
},
{
"version_affected": "=",
"version_value": "3.5.4SQ"
},
{
"version_affected": "=",
"version_value": "3.5.5SQ"
},
{
"version_affected": "=",
"version_value": "3.5.6SQ"
},
{
"version_affected": "=",
"version_value": "3.5.7SQ"
},
{
"version_affected": "=",
"version_value": "3.5.8SQ"
},
{
"version_affected": "=",
"version_value": "3.16.1S"
},
{
"version_affected": "=",
"version_value": "3.16.0bS"
},
{
"version_affected": "=",
"version_value": "3.16.10S"
},
{
"version_affected": "=",
"version_value": "3.8.0E"
},
{
"version_affected": "=",
"version_value": "3.8.1E"
},
{
"version_affected": "=",
"version_value": "3.8.2E"
},
{
"version_affected": "=",
"version_value": "3.8.3E"
},
{
"version_affected": "=",
"version_value": "3.8.4E"
},
{
"version_affected": "=",
"version_value": "3.8.5E"
},
{
"version_affected": "=",
"version_value": "3.8.5aE"
},
{
"version_affected": "=",
"version_value": "3.8.6E"
},
{
"version_affected": "=",
"version_value": "3.8.7E"
},
{
"version_affected": "=",
"version_value": "3.9.0E"
},
{
"version_affected": "=",
"version_value": "3.9.1E"
},
{
"version_affected": "=",
"version_value": "3.9.2E"
},
{
"version_affected": "=",
"version_value": "3.9.2bE"
},
{
"version_affected": "=",
"version_value": "16.9.2h"
},
{
"version_affected": "=",
"version_value": "3.10.0E"
},
{
"version_affected": "=",
"version_value": "3.10.1E"
},
{
"version_affected": "=",
"version_value": "3.10.0cE"
},
{
"version_affected": "=",
"version_value": "3.10.1aE"
},
{
"version_affected": "=",
"version_value": "3.10.1sE"
},
{
"version_affected": "=",
"version_value": "16.12.1"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "7.4",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107612"
}
]
},
"source": {
"advisory": "cisco-sa-20190327-cmp-dos",
"defect": [
[
"CSCvj25068",
"CSCvj25124"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svo2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.2h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fz:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ew:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbk9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)az:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4a\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jaz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jn1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svp1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2019-1746"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"refsource": "CISCO",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107612"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-10-09T23:47Z",
"publishedDate": "2019-03-28T00:29Z"
}
}
}
CVE-2019-1746
Vulnerability from fstec - Published: 27.03.2019{
"CVSS 2.0": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "15.2(4)E (Cisco IOS), 15.0(2)SG5 (Cisco IOS), 15.1(2)SG3 (Cisco IOS), 3.7.0e (Cisco IOS XE), 3.7.1e (Cisco IOS XE), 3.7.2e (Cisco IOS XE), 3.7.4e (Cisco IOS XE), 3.7.5e (Cisco IOS XE), 3.7.3e (Cisco IOS XE), 15.2(2)E5b (Cisco IOS), 15.2(5a)E1 (Cisco IOS), 12.2(55)SE (Cisco IOS), 12.2(55)SE3 (Cisco IOS), 12.2(58)SE (Cisco IOS), 12.2(55)SE1 (Cisco IOS), 12.2(58)SE1 (Cisco IOS), 12.2(55)SE4 (Cisco IOS), 12.2(58)SE2 (Cisco IOS), 12.2(55)SE5 (Cisco IOS), 12.2(55)SE10 (Cisco IOS), 12.2(55)EX (Cisco IOS), 12.2(55)EX2 (Cisco IOS), 12.2(55)EX3 (Cisco IOS), 12.2(58)EX (Cisco IOS), 12.2(55)EY (Cisco IOS), 12.2(58)EZ (Cisco IOS), 12.2(60)EZ4 (Cisco IOS), 12.2(60)EZ5 (Cisco IOS), 15.0(1)EY (Cisco IOS), 15.0(1)EY1 (Cisco IOS), 15.0(1)EY2 (Cisco IOS), 15.0(2)EY (Cisco IOS), 15.0(2)EY1 (Cisco IOS), 15.0(2)EY2 (Cisco IOS), 15.0(2)EY3 (Cisco IOS), 15.0(1)SE (Cisco IOS), 15.0(2)SE (Cisco IOS), 15.0(1)SE1 (Cisco IOS), 15.0(1)SE2 (Cisco IOS), 15.0(1)SE3 (Cisco IOS), 15.0(2)SE1 (Cisco IOS), 15.0(2)SE2 (Cisco IOS), 15.0(2)SE3 (Cisco IOS), 15.0(2)SE4 (Cisco IOS), 15.0(2)SE5 (Cisco IOS), 15.0(2)SE6 (Cisco IOS), 15.0(2)SE7 (Cisco IOS), 15.0(2)SE8 (Cisco IOS), 15.0(2)SE9 (Cisco IOS), 15.0(2)SE10 (Cisco IOS), 15.0(2)SE11 (Cisco IOS), 15.0(2)SE10a (Cisco IOS), 15.0(2)SE12 (Cisco IOS), 15.1(1)SG (Cisco IOS), 15.1(2)SG (Cisco IOS), 15.1(1)SG1 (Cisco IOS), 15.1(1)SG2 (Cisco IOS), 15.1(2)SG1 (Cisco IOS), 15.1(2)SG2 (Cisco IOS), 15.1(2)SG4 (Cisco IOS), 15.1(2)SG6 (Cisco IOS), 15.1(2)SG7 (Cisco IOS), 15.1(2)SG8 (Cisco IOS), 15.1(2)SG8a (Cisco IOS), 15.0(2)EX10 (Cisco IOS), 15.0(2)EX11 (Cisco IOS), 15.0(2)EX13 (Cisco IOS), 15.0(2)EX12 (Cisco IOS), 15.2(1)E (Cisco IOS), 15.2(2)E (Cisco IOS), 15.2(1)E1 (Cisco IOS), 15.2(3)E (Cisco IOS), 15.2(1)E2 (Cisco IOS), 15.2(1)E3 (Cisco IOS), 15.2(2)E1 (Cisco IOS), 15.2(3)E1 (Cisco IOS), 15.2(2)E2 (Cisco IOS), 15.2(2)E3 (Cisco IOS), 15.2(2a)E2 (Cisco IOS), 15.2(3)E2 (Cisco IOS), 15.2(3a)E (Cisco IOS), 15.2(3)E3 (Cisco IOS), 15.2(3m)E2 (Cisco IOS), 15.2(4)E1 (Cisco IOS), 15.2(2)E4 (Cisco IOS), 15.2(2)E5 (Cisco IOS), 15.2(4)E2 (Cisco IOS), 15.2(4m)E1 (Cisco IOS), 15.2(3)E4 (Cisco IOS), 15.2(5)E (Cisco IOS), 15.2(4)E3 (Cisco IOS), 15.2(2)E6 (Cisco IOS), 15.2(5)E1 (Cisco IOS), 15.2(4m)E3 (Cisco IOS), 15.2(3m)E8 (Cisco IOS), 15.2(2)E5a (Cisco IOS), 15.2(3)E5 (Cisco IOS), 15.2(4o)E2 (Cisco IOS), 15.2(4)E4 (Cisco IOS), 15.2(2)E7 (Cisco IOS), 15.2(5)E2 (Cisco IOS), 15.2(4p)E1 (Cisco IOS), 15.2(6)E (Cisco IOS), 15.2(5)E2b (Cisco IOS), 15.2(4)E5 (Cisco IOS), 15.2(5)E2c (Cisco IOS), 15.2(4m)E2 (Cisco IOS), 15.2(4o)E3 (Cisco IOS), 15.2(6)E0a (Cisco IOS), 15.2(2)E7b (Cisco IOS), 15.2(4)E5a (Cisco IOS), 15.2(6)E0c (Cisco IOS), 15.0(2)EZ (Cisco IOS), 15.2(1)EY (Cisco IOS), 15.0(2)EJ (Cisco IOS), 15.0(2)EJ1 (Cisco IOS), 15.2(5)EX (Cisco IOS), 15.2(2)EB (Cisco IOS), 15.2(2)EB1 (Cisco IOS), 15.2(2)EB2 (Cisco IOS), 15.2(4)EC1 (Cisco IOS), 15.2(4)EC2 (Cisco IOS), 12.2(55)SE2 (Cisco IOS), 12.2(55)EX1 (Cisco IOS), 12.2(55)EZ (Cisco IOS), 15.0(2)EX (Cisco IOS), 15.0(2)EX1 (Cisco IOS), 15.0(2)EX2 (Cisco IOS), 15.0(2)EX3 (Cisco IOS), 15.0(2)EX4 (Cisco IOS), 15.0(2)EX5 (Cisco IOS), 15.0(2)EX6 (Cisco IOS), 15.0(2)EX7 (Cisco IOS), 15.0(2)EX8 (Cisco IOS), 15.0(2a)EX5 (Cisco IOS), 15.2(2b)E (Cisco IOS), 15.2(2a)E1 (Cisco IOS), 15.2(3m)E7 (Cisco IOS), 15.2(5a)E (Cisco IOS), 15.2(5b)E (Cisco IOS), 15.2(5c)E (Cisco IOS), 3.3.0XO (Cisco IOS XE), 3.4.0SG (Cisco IOS XE), 3.4.2SG (Cisco IOS XE), 3.4.1SG (Cisco IOS XE), 3.4.3SG (Cisco IOS XE), 3.4.4SG (Cisco IOS XE), 3.4.5SG (Cisco IOS XE), 3.4.6SG (Cisco IOS XE), 3.4.7SG (Cisco IOS XE), 3.4.8SG (Cisco IOS XE), 3.5.0E (Cisco IOS XE), 3.5.1E (Cisco IOS XE), 3.5.2E (Cisco IOS XE), 3.5.3E (Cisco IOS XE), 3.6.0E (Cisco IOS XE), 3.6.1E (Cisco IOS XE), 3.6.0aE (Cisco IOS XE), 3.6.0bE (Cisco IOS XE), 3.6.2aE (Cisco IOS XE), 3.6.2E (Cisco IOS XE), 3.6.3E (Cisco IOS XE), 3.6.4E (Cisco IOS XE), 3.6.5E (Cisco IOS XE), 3.6.6E (Cisco IOS XE), 3.6.5aE (Cisco IOS XE), 3.6.7E (Cisco IOS XE), 3.6.7aE (Cisco IOS XE), 3.6.7bE (Cisco IOS XE), 3.8.0E (Cisco IOS XE), 3.8.1E (Cisco IOS XE), 3.8.2E (Cisco IOS XE), 3.8.3E (Cisco IOS XE), 3.8.4E (Cisco IOS XE), 3.8.5E (Cisco IOS XE), 3.8.5aE (Cisco IOS XE), 3.9.0E (Cisco IOS XE), 3.9.1E (Cisco IOS XE), 3.9.2E (Cisco IOS XE), 3.9.2bE (Cisco IOS XE), 3.10.0E (Cisco IOS XE), 3.10.0cE (Cisco IOS XE), 3.10.4S (Cisco IOS XE), 3.12.0aS (Cisco IOS XE), 3.16.1S (Cisco IOS XE), 3.16.0bS (Cisco IOS XE), 3.2.1SG (Cisco IOS XE), 3.2.2SG (Cisco IOS XE), 3.2.3SG (Cisco IOS XE), 3.2.4SG (Cisco IOS XE), 3.2.5SG (Cisco IOS XE), 3.2.6SG (Cisco IOS XE), 3.2.7SG (Cisco IOS XE), 3.2.8SG (Cisco IOS XE), 3.2.9SG (Cisco IOS XE), 3.2.10SG (Cisco IOS XE), 3.2.11SG (Cisco IOS XE), 3.3.0SG (Cisco IOS XE), 3.3.2SG (Cisco IOS XE), 3.3.1SG (Cisco IOS XE), 3.3.0SQ (Cisco IOS XE), 3.3.1SQ (Cisco IOS XE), 3.4.0SQ (Cisco IOS XE), 3.4.1SQ (Cisco IOS XE), 3.5.0SQ (Cisco IOS XE), 3.5.1SQ (Cisco IOS XE), 3.5.2SQ (Cisco IOS XE), 3.5.3SQ (Cisco IOS XE), 3.5.4SQ (Cisco IOS XE), 3.5.5SQ (Cisco IOS XE), 3.5.6SQ (Cisco IOS XE), 3.5.7SQ (Cisco IOS XE), 15.2(4s)E1 (Cisco IOS), 15.2(3)EA1 (Cisco IOS), 15.2(4a)EA5 (Cisco IOS), 15.1(3)SVO2 (Cisco IOS), 12.2(6)I1 (Cisco IOS), 15.1(3)SVP1 (Cisco IOS), 3.6.10E (Cisco IOS XE), 15.1(3)SVK4b (Cisco IOS), 15.1(3)SVK4c (Cisco IOS), 3.2.0SG (Cisco IOS XE), 3.6.9E (Cisco IOS XE), 3.5.8SQ (Cisco IOS XE), 3.16.10S (Cisco IOS XE), 3.8.6E (Cisco IOS XE), 3.8.7E (Cisco IOS XE), 16.9.2h (Cisco IOS XE), 16.12.1 (Cisco IOS XE), 3.10.1E (Cisco IOS XE), 3.10.1aE (Cisco IOS XE), 3.10.1sE (Cisco IOS XE), 12.2(22)S (Cisco IOS), 12.2(20)S (Cisco IOS), 12.2(18)S (Cisco IOS), 12.2(25)S (Cisco IOS), 12.2(20)S2a (Cisco IOS), 12.2(20)S4a (Cisco IOS), 12.2(20)S5 (Cisco IOS), 12.2(18)S1 (Cisco IOS), 12.2(20)S4 (Cisco IOS), 12.2(18)S2 (Cisco IOS), 12.2(18)S4 (Cisco IOS), 12.2(25)S2 (Cisco IOS), 12.2(20)S2 (Cisco IOS), 12.2(18)S3 (Cisco IOS), 12.2(20)S6 (Cisco IOS), 12.2(20)S3 (Cisco IOS), 12.2(25)S1 (Cisco IOS), 12.2(20)S1 (Cisco IOS), 12.1(9)EX (Cisco IOS), 12.1(22)EA8 (Cisco IOS), 12.1(20)EA1b (Cisco IOS), 12.1(11)EA1a (Cisco IOS), 12.1(22)EA12 (Cisco IOS), 12.1(22)EA6 (Cisco IOS), 12.1(14)EA1 (Cisco IOS), 12.1(9)EA1d (Cisco IOS), 12.1(19)EA1b (Cisco IOS), 12.1(22)EA3 (Cisco IOS), 12.1(14)EA1b (Cisco IOS), 12.1(20)EA2 (Cisco IOS), 12.1(22)EA4a (Cisco IOS), 12.1(8)EA1b (Cisco IOS), 12.1(14)EA1a (Cisco IOS), 12.1(22)EA5a (Cisco IOS), 12.1(22)EA13 (Cisco IOS), 12.1(22)EA1a (Cisco IOS), 12.1(12c)EA1a (Cisco IOS), 12.1(13)EA1c (Cisco IOS), 12.1(22)EA1b (Cisco IOS), 12.1(8)EA1c (Cisco IOS), 12.1(22)EA5 (Cisco IOS), 12.1(22)EA10b (Cisco IOS), 12.1(6)EA2a (Cisco IOS), 12.1(20)EA1a (Cisco IOS), 12.1(22)EA11 (Cisco IOS), 12.1(22)EA7 (Cisco IOS), 12.1(6)EA2 (Cisco IOS), 12.1(9)EA1a (Cisco IOS), 12.1(22)EA1 (Cisco IOS), 12.1(13)EA1b (Cisco IOS), 12.1(20)EA1 (Cisco IOS), 12.1(13)EA1 (Cisco IOS), 12.1(9)EA1c (Cisco IOS), 12.1(6)EA1a (Cisco IOS), 12.1(19)EA1a (Cisco IOS), 12.1(22)EA2 (Cisco IOS), 12.1(19)EA1d (Cisco IOS), 12.1(22)EA9 (Cisco IOS), 12.1(6)EA2b (Cisco IOS), 12.1(9)EA1 (Cisco IOS), 12.1(22)EA14 (Cisco IOS), 12.1(6)EA2c (Cisco IOS), 12.1(11)EA1 (Cisco IOS), 12.1(22)EA8a (Cisco IOS), 12.1(12c)EA1 (Cisco IOS), 12.1(22)EA10a (Cisco IOS), 12.1(19)EA1 (Cisco IOS), 12.1(19)EA1c (Cisco IOS), 12.1(6)EA1 (Cisco IOS), 12.1(22)EA10 (Cisco IOS), 12.1(22)EA4 (Cisco IOS), 12.1(13)EA1a (Cisco IOS), 12.1(22)EA6a (Cisco IOS), 12.2(14)SZ (Cisco IOS), 12.2(14)SZ5 (Cisco IOS), 12.2(14)SZ6 (Cisco IOS), 12.2(14)SZ3 (Cisco IOS), 12.2(14)SZ4 (Cisco IOS), 12.2(14)SZ1 (Cisco IOS), 12.2(14)SZ2 (Cisco IOS), 12.2(25)EW (Cisco IOS), 12.2(20)EWA (Cisco IOS), 12.2(25)EWA (Cisco IOS), 12.2(25)EWA6 (Cisco IOS), 12.2(25)EWA5 (Cisco IOS), 12.2(25)EWA1 (Cisco IOS), 12.2(25)EWA10 (Cisco IOS), 12.2(25)EWA8 (Cisco IOS), 12.2(20)EWA1 (Cisco IOS), 12.2(25)EWA11 (Cisco IOS), 12.2(25)EWA9 (Cisco IOS), 12.2(25)EWA2 (Cisco IOS), 12.2(25)EWA14 (Cisco IOS), 12.2(25)EWA4 (Cisco IOS), 12.2(20)EWA3 (Cisco IOS), 12.2(25)EWA3 (Cisco IOS), 12.2(25)EWA7 (Cisco IOS), 12.2(20)EWA4 (Cisco IOS), 12.2(25)EWA12 (Cisco IOS), 12.2(25)EWA13 (Cisco IOS), 12.2(20)EWA2 (Cisco IOS), 12.2(35)SE (Cisco IOS), 12.2(18)SE (Cisco IOS), 12.2(20)SE (Cisco IOS), 12.2(25)SE (Cisco IOS), 12.2(37)SE (Cisco IOS), 12.2(53)SE1 (Cisco IOS), 12.2(25)SE2 (Cisco IOS), 12.2(40)SE2 (Cisco IOS), 12.2(46)SE (Cisco IOS), 12.2(46)SE2 (Cisco IOS), 12.2(50)SE2 (Cisco IOS), 12.2(35)SE5 (Cisco IOS), 12.2(50)SE1 (Cisco IOS), 12.2(44)SE2 (Cisco IOS), 12.2(20)SE3 (Cisco IOS), 12.2(35)SE1 (Cisco IOS), 12.2(50)SE5 (Cisco IOS), 12.2(44)SE1 (Cisco IOS), 12.2(53)SE (Cisco IOS), 12.2(37)SE1 (Cisco IOS), 12.2(25)SE3 (Cisco IOS), 12.2(35)SE3 (Cisco IOS), 12.2(44)SE4 (Cisco IOS), 12.2(40)SE (Cisco IOS), 12.2(44)SE (Cisco IOS), 12.2(52)SE (Cisco IOS), 12.2(50)SE3 (Cisco IOS), 12.2(35)SE2 (Cisco IOS), 12.2(18)SE1 (Cisco IOS), 12.2(40)SE1 (Cisco IOS), 12.2(20)SE1 (Cisco IOS), 12.2(44)SE6 (Cisco IOS), 12.2(44)SE3 (Cisco IOS), 12.2(53)SE2 (Cisco IOS), 12.2(52)SE1 (Cisco IOS), 12.2(46)SE1 (Cisco IOS), 12.2(20)SE2 (Cisco IOS), 12.2(54)SE (Cisco IOS), 12.2(44)SE5 (Cisco IOS), 12.2(50)SE4 (Cisco IOS), 12.2(50)SE (Cisco IOS), 12.2(20)SE4 (Cisco IOS), 12.1(14)AZ (Cisco IOS), 12.2(20)EU (Cisco IOS), 12.2(20)EU1 (Cisco IOS), 12.2(20)EU2 (Cisco IOS), 12.2(20)EX (Cisco IOS), 12.2(44)EX (Cisco IOS), 12.2(40)EX3 (Cisco IOS), 12.2(40)EX (Cisco IOS), 12.2(52)EX (Cisco IOS), 12.2(44)EX1 (Cisco IOS), 12.2(40)EX2 (Cisco IOS), 12.2(40)EX1 (Cisco IOS), 12.2(46)EX (Cisco IOS), 12.2(52)EX1 (Cisco IOS), 12.2(25)SEB (Cisco IOS), 12.2(25)SEB2 (Cisco IOS), 12.2(25)SEB1 (Cisco IOS), 12.2(25)SEB4 (Cisco IOS), 12.2(25)SEB3 (Cisco IOS), 12.2(25)SEA (Cisco IOS), 12.2(25)EY (Cisco IOS), 12.2(46)EY (Cisco IOS), 12.2(25)EY1 (Cisco IOS), 12.2(53)EY (Cisco IOS), 12.2(25)EY3 (Cisco IOS), 12.2(37)EY (Cisco IOS), 12.2(25)EY2 (Cisco IOS), 12.2(25)EY4 (Cisco IOS), 12.2(25)EZ (Cisco IOS), 12.2(25)EZ1 (Cisco IOS), 12.2(53)EZ (Cisco IOS), 12.2(25)SEC (Cisco IOS), 12.2(25)SEC2 (Cisco IOS), 12.2(25)SEC1 (Cisco IOS), 12.2(31)SG (Cisco IOS), 12.2(25)SG (Cisco IOS), 12.2(37)SG (Cisco IOS), 12.2(44)SG (Cisco IOS), 12.2(50)SG3 (Cisco IOS), 12.2(31)SG1 (Cisco IOS), 12.2(31)SG3 (Cisco IOS), 12.2(50)SG6 (Cisco IOS), 12.2(53)SG1 (Cisco IOS), 12.2(46)SG (Cisco IOS), 12.2(25)SG1 (Cisco IOS), 12.2(53)SG2 (Cisco IOS), 12.2(50)SG5 (Cisco IOS), 12.2(37)SG1 (Cisco IOS), 12.2(53)SG3 (Cisco IOS), 12.2(50)SG8 (Cisco IOS), 12.2(25)SG3 (Cisco IOS), 12.2(50)SG2 (Cisco IOS), 12.2(40)SG (Cisco IOS), 12.2(25)SG2 (Cisco IOS), 12.2(54)SG1 (Cisco IOS), 12.2(44)SG1 (Cisco IOS), 12.2(50)SG1 (Cisco IOS), 12.2(52)SG (Cisco IOS), 12.2(54)SG (Cisco IOS), 12.2(31)SG2 (Cisco IOS), 12.2(50)SG (Cisco IOS), 12.2(25)SG4 (Cisco IOS), 12.2(50)SG7 (Cisco IOS), 12.2(53)SG4 (Cisco IOS), 12.2(50)SG4 (Cisco IOS), 12.2(46)SG1 (Cisco IOS), 12.2(53)SG5 (Cisco IOS), 12.2(53)SG6 (Cisco IOS), 12.2(53)SG7 (Cisco IOS), 12.2(53)SG8 (Cisco IOS), 12.2(53)SG9 (Cisco IOS), 12.2(53)SG10 (Cisco IOS), 12.2(53)SG11 (Cisco IOS), 12.2(25)FX (Cisco IOS), 12.2(25)FY (Cisco IOS), 12.2(25)SEF (Cisco IOS), 12.2(25)SEF1 (Cisco IOS), 12.2(25)SEF2 (Cisco IOS), 12.2(25)SEF3 (Cisco IOS), 12.2(25)SEE (Cisco IOS), 12.2(25)SEE1 (Cisco IOS), 12.2(25)SEE3 (Cisco IOS), 12.2(25)SEE4 (Cisco IOS), 12.2(25)SEE2 (Cisco IOS), 12.2(25)SED (Cisco IOS), 12.2(25)SED1 (Cisco IOS), 12.2(31)SGA (Cisco IOS), 12.2(31)SGA3 (Cisco IOS), 12.2(31)SGA2 (Cisco IOS), 12.2(31)SGA10 (Cisco IOS), 12.2(31)SGA5 (Cisco IOS), 12.2(31)SGA4 (Cisco IOS), 12.2(31)SGA11 (Cisco IOS), 12.2(31)SGA6 (Cisco IOS), 12.2(31)SGA1 (Cisco IOS), 12.2(31)SGA7 (Cisco IOS), 12.2(31)SGA8 (Cisco IOS), 12.2(31)SGA9 (Cisco IOS), 12.2(25)SEG (Cisco IOS), 12.2(25)SEG1 (Cisco IOS), 12.2(25)SEG3 (Cisco IOS), 12.2(25)FZ (Cisco IOS), 12.2(52)XO (Cisco IOS), 12.2(54)XO (Cisco IOS), 12.2(40)XO (Cisco IOS), 12.2(44)SQ (Cisco IOS), 12.2(44)SQ2 (Cisco IOS), 12.2(50)SQ2 (Cisco IOS), 12.2(50)SQ1 (Cisco IOS), 12.2(50)SQ (Cisco IOS), 12.2(50)SQ3 (Cisco IOS), 12.2(50)SQ4 (Cisco IOS), 12.2(50)SQ5 (Cisco IOS), 12.2(50)SQ6 (Cisco IOS), 12.2(50)SQ7 (Cisco IOS), 15.0(1)XO1 (Cisco IOS), 15.0(1)XO (Cisco IOS), 15.0(2)XO (Cisco IOS), 12.2(54)WO (Cisco IOS), 12.2(27)SBK9 (Cisco IOS), 15.0(2)SE13 (Cisco IOS), 15.0(2)SG (Cisco IOS), 15.0(2)SG1 (Cisco IOS), 15.0(2)SG2 (Cisco IOS), 15.0(2)SG3 (Cisco IOS), 15.0(2)SG4 (Cisco IOS), 15.0(2)SG6 (Cisco IOS), 15.0(2)SG7 (Cisco IOS), 15.0(2)SG8 (Cisco IOS), 15.0(2)SG9 (Cisco IOS), 15.0(2)SG10 (Cisco IOS), 15.0(2)SG11 (Cisco IOS), 15.1(2)SY15 (Cisco IOS), 12.4(25e)JAZ1 (Cisco IOS), 15.2(2)E8 (Cisco IOS), 15.2(6)E1 (Cisco IOS), 15.2(4)E6 (Cisco IOS), 15.2(2)E9 (Cisco IOS), 15.2(6)E1a (Cisco IOS), 15.2(4)E7 (Cisco IOS), 15.2(6)E1s (Cisco IOS), 15.2(2)E10 (Cisco IOS), 15.2(2)E9a (Cisco IOS), 15.2(4s)E2 (Cisco IOS), 15.1(3)MRA3 (Cisco IOS), 15.2(4)JN1 (Cisco IOS), 15.2(2)SC1 (Cisco IOS), 15.2(2)SC3 (Cisco IOS), 15.2(2)SC4 (Cisco IOS), 15.2(4)JAZ1 (Cisco IOS), 15.5(3)S10 (Cisco IOS), 15.2(2)EA; (Cisco IOS), 15.2(2)EA1 (Cisco IOS), 15.2(2)EA2 (Cisco IOS), 15.2(3)EA (Cisco IOS), 15.2(4)EA (Cisco IOS), 15.2(4)EA1 (Cisco IOS), 15.2(2)EA3 (Cisco IOS), 15.2(4)EA3 (Cisco IOS), 15.2(5)EA (Cisco IOS), 15.2(4)EA4 (Cisco IOS), 15.2(4)EA2 (Cisco IOS), 15.2(4)EA5 (Cisco IOS), 15.2(4)EA6 (Cisco IOS), 15.2(4)EA7 (Cisco IOS), 15.2(4)EA8 (Cisco IOS), 15.2(4)EA9 (Cisco IOS), 15.0(2)SQD (Cisco IOS), 15.0(2)SQD1 (Cisco IOS), 15.0(2)SQD2 (Cisco IOS), 15.0(2)SQD3 (Cisco IOS), 15.0(2)SQD4 (Cisco IOS), 15.0(2)SQD5 (Cisco IOS), 15.0(2)SQD6 (Cisco IOS), 15.0(2)SQD7 (Cisco IOS), 15.0(2)SQD8 (Cisco IOS), 15.5(1)SY4 (Cisco IOS)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.03.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.04.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-01318",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-1746",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco IOS, Cisco IOS XE",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0443 Cluster Management Protocol (CMP) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco IOS \u0438 Cisco IOS XE, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0443 Cluster Management Protocol (CMP) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco IOS \u0438 Cisco IOS XE \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 CMP-\u043f\u0430\u043a\u0435\u0442\u043e\u0432",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,1)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,4)"
}
FKIE_CVE-2019-1746
Vulnerability from fkie_nvd - Published: 2019-03-28 00:29 - Updated: 2024-11-21 04:376.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://www.securityfocus.com/bid/107612 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107612 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.1\(6\)ea1 | |
| cisco | ios | 12.1\(6\)ea1a | |
| cisco | ios | 12.1\(6\)ea2 | |
| cisco | ios | 12.1\(6\)ea2a | |
| cisco | ios | 12.1\(6\)ea2b | |
| cisco | ios | 12.1\(6\)ea2c | |
| cisco | ios | 12.1\(8\)ea1b | |
| cisco | ios | 12.1\(8\)ea1c | |
| cisco | ios | 12.1\(9\)ea1 | |
| cisco | ios | 12.1\(9\)ea1a | |
| cisco | ios | 12.1\(9\)ea1c | |
| cisco | ios | 12.1\(9\)ea1d | |
| cisco | ios | 12.1\(9\)ex | |
| cisco | ios | 12.1\(11\)ea1 | |
| cisco | ios | 12.1\(11\)ea1a | |
| cisco | ios | 12.1\(12c\)ea1 | |
| cisco | ios | 12.1\(12c\)ea1a | |
| cisco | ios | 12.1\(13\)ea1 | |
| cisco | ios | 12.1\(13\)ea1a | |
| cisco | ios | 12.1\(13\)ea1b | |
| cisco | ios | 12.1\(13\)ea1c | |
| cisco | ios | 12.1\(14\)az | |
| cisco | ios | 12.1\(14\)ea1 | |
| cisco | ios | 12.1\(14\)ea1a | |
| cisco | ios | 12.1\(14\)ea1b | |
| cisco | ios | 12.1\(19\)ea1 | |
| cisco | ios | 12.1\(19\)ea1a | |
| cisco | ios | 12.1\(19\)ea1b | |
| cisco | ios | 12.1\(19\)ea1c | |
| cisco | ios | 12.1\(19\)ea1d | |
| cisco | ios | 12.1\(20\)ea1 | |
| cisco | ios | 12.1\(20\)ea1a | |
| cisco | ios | 12.1\(20\)ea1b | |
| cisco | ios | 12.1\(20\)ea2 | |
| cisco | ios | 12.1\(22\)ea1 | |
| cisco | ios | 12.1\(22\)ea1a | |
| cisco | ios | 12.1\(22\)ea1b | |
| cisco | ios | 12.1\(22\)ea2 | |
| cisco | ios | 12.1\(22\)ea3 | |
| cisco | ios | 12.1\(22\)ea4 | |
| cisco | ios | 12.1\(22\)ea4a | |
| cisco | ios | 12.1\(22\)ea5 | |
| cisco | ios | 12.1\(22\)ea5a | |
| cisco | ios | 12.1\(22\)ea6 | |
| cisco | ios | 12.1\(22\)ea6a | |
| cisco | ios | 12.1\(22\)ea7 | |
| cisco | ios | 12.1\(22\)ea8 | |
| cisco | ios | 12.1\(22\)ea8a | |
| cisco | ios | 12.1\(22\)ea9 | |
| cisco | ios | 12.1\(22\)ea10 | |
| cisco | ios | 12.1\(22\)ea10a | |
| cisco | ios | 12.1\(22\)ea10b | |
| cisco | ios | 12.1\(22\)ea11 | |
| cisco | ios | 12.1\(22\)ea12 | |
| cisco | ios | 12.1\(22\)ea13 | |
| cisco | ios | 12.1\(22\)ea14 | |
| cisco | ios | 12.2\(6\)i1 | |
| cisco | ios | 12.2\(14\)sz | |
| cisco | ios | 12.2\(14\)sz1 | |
| cisco | ios | 12.2\(14\)sz2 | |
| cisco | ios | 12.2\(14\)sz3 | |
| cisco | ios | 12.2\(14\)sz4 | |
| cisco | ios | 12.2\(14\)sz5 | |
| cisco | ios | 12.2\(14\)sz6 | |
| cisco | ios | 12.2\(18\)s | |
| cisco | ios | 12.2\(18\)s1 | |
| cisco | ios | 12.2\(18\)s2 | |
| cisco | ios | 12.2\(18\)s3 | |
| cisco | ios | 12.2\(18\)s4 | |
| cisco | ios | 12.2\(18\)se | |
| cisco | ios | 12.2\(18\)se1 | |
| cisco | ios | 12.2\(20\)eu | |
| cisco | ios | 12.2\(20\)eu1 | |
| cisco | ios | 12.2\(20\)eu2 | |
| cisco | ios | 12.2\(20\)ewa | |
| cisco | ios | 12.2\(20\)ewa1 | |
| cisco | ios | 12.2\(20\)ewa2 | |
| cisco | ios | 12.2\(20\)ewa3 | |
| cisco | ios | 12.2\(20\)ewa4 | |
| cisco | ios | 12.2\(20\)ex | |
| cisco | ios | 12.2\(20\)s | |
| cisco | ios | 12.2\(20\)s1 | |
| cisco | ios | 12.2\(20\)s2 | |
| cisco | ios | 12.2\(20\)s2a | |
| cisco | ios | 12.2\(20\)s3 | |
| cisco | ios | 12.2\(20\)s4 | |
| cisco | ios | 12.2\(20\)s4a | |
| cisco | ios | 12.2\(20\)s5 | |
| cisco | ios | 12.2\(20\)s6 | |
| cisco | ios | 12.2\(20\)se | |
| cisco | ios | 12.2\(20\)se1 | |
| cisco | ios | 12.2\(20\)se2 | |
| cisco | ios | 12.2\(20\)se3 | |
| cisco | ios | 12.2\(20\)se4 | |
| cisco | ios | 12.2\(22\)s | |
| cisco | ios | 12.2\(25\)ew | |
| cisco | ios | 12.2\(25\)ewa | |
| cisco | ios | 12.2\(25\)ewa1 | |
| cisco | ios | 12.2\(25\)ewa2 | |
| cisco | ios | 12.2\(25\)ewa3 | |
| cisco | ios | 12.2\(25\)ewa4 | |
| cisco | ios | 12.2\(25\)ewa5 | |
| cisco | ios | 12.2\(25\)ewa6 | |
| cisco | ios | 12.2\(25\)ewa7 | |
| cisco | ios | 12.2\(25\)ewa8 | |
| cisco | ios | 12.2\(25\)ewa9 | |
| cisco | ios | 12.2\(25\)ewa10 | |
| cisco | ios | 12.2\(25\)ewa11 | |
| cisco | ios | 12.2\(25\)ewa12 | |
| cisco | ios | 12.2\(25\)ewa13 | |
| cisco | ios | 12.2\(25\)ewa14 | |
| cisco | ios | 12.2\(25\)ey | |
| cisco | ios | 12.2\(25\)ey1 | |
| cisco | ios | 12.2\(25\)ey2 | |
| cisco | ios | 12.2\(25\)ey3 | |
| cisco | ios | 12.2\(25\)ey4 | |
| cisco | ios | 12.2\(25\)ez | |
| cisco | ios | 12.2\(25\)ez1 | |
| cisco | ios | 12.2\(25\)fx | |
| cisco | ios | 12.2\(25\)fy | |
| cisco | ios | 12.2\(25\)fz | |
| cisco | ios | 12.2\(25\)s | |
| cisco | ios | 12.2\(25\)s1 | |
| cisco | ios | 12.2\(25\)s2 | |
| cisco | ios | 12.2\(25\)se | |
| cisco | ios | 12.2\(25\)se2 | |
| cisco | ios | 12.2\(25\)se3 | |
| cisco | ios | 12.2\(25\)sea | |
| cisco | ios | 12.2\(25\)seb | |
| cisco | ios | 12.2\(25\)seb1 | |
| cisco | ios | 12.2\(25\)seb2 | |
| cisco | ios | 12.2\(25\)seb3 | |
| cisco | ios | 12.2\(25\)seb4 | |
| cisco | ios | 12.2\(25\)sec | |
| cisco | ios | 12.2\(25\)sec1 | |
| cisco | ios | 12.2\(25\)sec2 | |
| cisco | ios | 12.2\(25\)sed | |
| cisco | ios | 12.2\(25\)sed1 | |
| cisco | ios | 12.2\(25\)see | |
| cisco | ios | 12.2\(25\)see1 | |
| cisco | ios | 12.2\(25\)see2 | |
| cisco | ios | 12.2\(25\)see3 | |
| cisco | ios | 12.2\(25\)see4 | |
| cisco | ios | 12.2\(25\)sef | |
| cisco | ios | 12.2\(25\)sef1 | |
| cisco | ios | 12.2\(25\)sef2 | |
| cisco | ios | 12.2\(25\)sef3 | |
| cisco | ios | 12.2\(25\)seg | |
| cisco | ios | 12.2\(25\)seg1 | |
| cisco | ios | 12.2\(25\)seg3 | |
| cisco | ios | 12.2\(25\)sg | |
| cisco | ios | 12.2\(25\)sg1 | |
| cisco | ios | 12.2\(25\)sg2 | |
| cisco | ios | 12.2\(25\)sg3 | |
| cisco | ios | 12.2\(25\)sg4 | |
| cisco | ios | 12.2\(27\)sbk9 | |
| cisco | ios | 12.2\(31\)sg | |
| cisco | ios | 12.2\(31\)sg1 | |
| cisco | ios | 12.2\(31\)sg2 | |
| cisco | ios | 12.2\(31\)sg3 | |
| cisco | ios | 12.2\(31\)sga | |
| cisco | ios | 12.2\(31\)sga1 | |
| cisco | ios | 12.2\(31\)sga2 | |
| cisco | ios | 12.2\(31\)sga3 | |
| cisco | ios | 12.2\(31\)sga4 | |
| cisco | ios | 12.2\(31\)sga5 | |
| cisco | ios | 12.2\(31\)sga6 | |
| cisco | ios | 12.2\(31\)sga7 | |
| cisco | ios | 12.2\(31\)sga8 | |
| cisco | ios | 12.2\(31\)sga9 | |
| cisco | ios | 12.2\(31\)sga10 | |
| cisco | ios | 12.2\(31\)sga11 | |
| cisco | ios | 12.2\(35\)se | |
| cisco | ios | 12.2\(35\)se1 | |
| cisco | ios | 12.2\(35\)se2 | |
| cisco | ios | 12.2\(35\)se3 | |
| cisco | ios | 12.2\(35\)se5 | |
| cisco | ios | 12.2\(37\)ey | |
| cisco | ios | 12.2\(37\)se | |
| cisco | ios | 12.2\(37\)se1 | |
| cisco | ios | 12.2\(37\)sg | |
| cisco | ios | 12.2\(37\)sg1 | |
| cisco | ios | 12.2\(40\)ex | |
| cisco | ios | 12.2\(40\)ex1 | |
| cisco | ios | 12.2\(40\)ex2 | |
| cisco | ios | 12.2\(40\)ex3 | |
| cisco | ios | 12.2\(40\)se | |
| cisco | ios | 12.2\(40\)se1 | |
| cisco | ios | 12.2\(40\)se2 | |
| cisco | ios | 12.2\(40\)sg | |
| cisco | ios | 12.2\(40\)xo | |
| cisco | ios | 12.2\(44\)ex | |
| cisco | ios | 12.2\(44\)ex1 | |
| cisco | ios | 12.2\(44\)se | |
| cisco | ios | 12.2\(44\)se1 | |
| cisco | ios | 12.2\(44\)se2 | |
| cisco | ios | 12.2\(44\)se3 | |
| cisco | ios | 12.2\(44\)se4 | |
| cisco | ios | 12.2\(44\)se5 | |
| cisco | ios | 12.2\(44\)se6 | |
| cisco | ios | 12.2\(44\)sg | |
| cisco | ios | 12.2\(44\)sg1 | |
| cisco | ios | 12.2\(44\)sq | |
| cisco | ios | 12.2\(44\)sq2 | |
| cisco | ios | 12.2\(46\)ex | |
| cisco | ios | 12.2\(46\)ey | |
| cisco | ios | 12.2\(46\)se | |
| cisco | ios | 12.2\(46\)se1 | |
| cisco | ios | 12.2\(46\)se2 | |
| cisco | ios | 12.2\(46\)sg | |
| cisco | ios | 12.2\(46\)sg1 | |
| cisco | ios | 12.2\(50\)se | |
| cisco | ios | 12.2\(50\)se1 | |
| cisco | ios | 12.2\(50\)se2 | |
| cisco | ios | 12.2\(50\)se3 | |
| cisco | ios | 12.2\(50\)se4 | |
| cisco | ios | 12.2\(50\)se5 | |
| cisco | ios | 12.2\(50\)sg | |
| cisco | ios | 12.2\(50\)sg1 | |
| cisco | ios | 12.2\(50\)sg2 | |
| cisco | ios | 12.2\(50\)sg3 | |
| cisco | ios | 12.2\(50\)sg4 | |
| cisco | ios | 12.2\(50\)sg5 | |
| cisco | ios | 12.2\(50\)sg6 | |
| cisco | ios | 12.2\(50\)sg7 | |
| cisco | ios | 12.2\(50\)sg8 | |
| cisco | ios | 12.2\(50\)sq | |
| cisco | ios | 12.2\(50\)sq1 | |
| cisco | ios | 12.2\(50\)sq2 | |
| cisco | ios | 12.2\(50\)sq3 | |
| cisco | ios | 12.2\(50\)sq4 | |
| cisco | ios | 12.2\(50\)sq5 | |
| cisco | ios | 12.2\(50\)sq6 | |
| cisco | ios | 12.2\(50\)sq7 | |
| cisco | ios | 12.2\(52\)ex | |
| cisco | ios | 12.2\(52\)ex1 | |
| cisco | ios | 12.2\(52\)se | |
| cisco | ios | 12.2\(52\)se1 | |
| cisco | ios | 12.2\(52\)sg | |
| cisco | ios | 12.2\(52\)xo | |
| cisco | ios | 12.2\(53\)ey | |
| cisco | ios | 12.2\(53\)ez | |
| cisco | ios | 12.2\(53\)se | |
| cisco | ios | 12.2\(53\)se1 | |
| cisco | ios | 12.2\(53\)se2 | |
| cisco | ios | 12.2\(53\)sg1 | |
| cisco | ios | 12.2\(53\)sg2 | |
| cisco | ios | 12.2\(53\)sg3 | |
| cisco | ios | 12.2\(53\)sg4 | |
| cisco | ios | 12.2\(53\)sg5 | |
| cisco | ios | 12.2\(53\)sg6 | |
| cisco | ios | 12.2\(53\)sg7 | |
| cisco | ios | 12.2\(53\)sg8 | |
| cisco | ios | 12.2\(53\)sg9 | |
| cisco | ios | 12.2\(53\)sg10 | |
| cisco | ios | 12.2\(53\)sg11 | |
| cisco | ios | 12.2\(54\)se | |
| cisco | ios | 12.2\(54\)sg | |
| cisco | ios | 12.2\(54\)sg1 | |
| cisco | ios | 12.2\(54\)wo | |
| cisco | ios | 12.2\(54\)xo | |
| cisco | ios | 12.2\(55\)ex | |
| cisco | ios | 12.2\(55\)ex1 | |
| cisco | ios | 12.2\(55\)ex2 | |
| cisco | ios | 12.2\(55\)ex3 | |
| cisco | ios | 12.2\(55\)ey | |
| cisco | ios | 12.2\(55\)ez | |
| cisco | ios | 12.2\(55\)se | |
| cisco | ios | 12.2\(55\)se1 | |
| cisco | ios | 12.2\(55\)se2 | |
| cisco | ios | 12.2\(55\)se3 | |
| cisco | ios | 12.2\(55\)se4 | |
| cisco | ios | 12.2\(55\)se5 | |
| cisco | ios | 12.2\(55\)se6 | |
| cisco | ios | 12.2\(55\)se7 | |
| cisco | ios | 12.2\(55\)se8 | |
| cisco | ios | 12.2\(55\)se9 | |
| cisco | ios | 12.2\(55\)se10 | |
| cisco | ios | 12.2\(55\)se11 | |
| cisco | ios | 12.2\(55\)se12 | |
| cisco | ios | 12.2\(55\)se13 | |
| cisco | ios | 12.2\(58\)ex | |
| cisco | ios | 12.2\(58\)ez | |
| cisco | ios | 12.2\(58\)se | |
| cisco | ios | 12.2\(58\)se1 | |
| cisco | ios | 12.2\(58\)se2 | |
| cisco | ios | 12.2\(60\)ez4 | |
| cisco | ios | 12.2\(60\)ez5 | |
| cisco | ios | 12.4\(25e\)jaz1 | |
| cisco | ios | 15.0\(1\)ey | |
| cisco | ios | 15.0\(1\)ey1 | |
| cisco | ios | 15.0\(1\)ey2 | |
| cisco | ios | 15.0\(1\)se | |
| cisco | ios | 15.0\(1\)se1 | |
| cisco | ios | 15.0\(1\)se2 | |
| cisco | ios | 15.0\(1\)se3 | |
| cisco | ios | 15.0\(1\)xo | |
| cisco | ios | 15.0\(1\)xo1 | |
| cisco | ios | 15.0\(2\)ej | |
| cisco | ios | 15.0\(2\)ej1 | |
| cisco | ios | 15.0\(2\)ex | |
| cisco | ios | 15.0\(2\)ex1 | |
| cisco | ios | 15.0\(2\)ex2 | |
| cisco | ios | 15.0\(2\)ex3 | |
| cisco | ios | 15.0\(2\)ex4 | |
| cisco | ios | 15.0\(2\)ex5 | |
| cisco | ios | 15.0\(2\)ex6 | |
| cisco | ios | 15.0\(2\)ex7 | |
| cisco | ios | 15.0\(2\)ex8 | |
| cisco | ios | 15.0\(2\)ex10 | |
| cisco | ios | 15.0\(2\)ex11 | |
| cisco | ios | 15.0\(2\)ex12 | |
| cisco | ios | 15.0\(2\)ex13 | |
| cisco | ios | 15.0\(2\)ey | |
| cisco | ios | 15.0\(2\)ey1 | |
| cisco | ios | 15.0\(2\)ey2 | |
| cisco | ios | 15.0\(2\)ey3 | |
| cisco | ios | 15.0\(2\)ez | |
| cisco | ios | 15.0\(2\)se | |
| cisco | ios | 15.0\(2\)se1 | |
| cisco | ios | 15.0\(2\)se2 | |
| cisco | ios | 15.0\(2\)se3 | |
| cisco | ios | 15.0\(2\)se4 | |
| cisco | ios | 15.0\(2\)se5 | |
| cisco | ios | 15.0\(2\)se6 | |
| cisco | ios | 15.0\(2\)se7 | |
| cisco | ios | 15.0\(2\)se8 | |
| cisco | ios | 15.0\(2\)se9 | |
| cisco | ios | 15.0\(2\)se10 | |
| cisco | ios | 15.0\(2\)se10a | |
| cisco | ios | 15.0\(2\)se11 | |
| cisco | ios | 15.0\(2\)se12 | |
| cisco | ios | 15.0\(2\)se13 | |
| cisco | ios | 15.0\(2\)sg | |
| cisco | ios | 15.0\(2\)sg1 | |
| cisco | ios | 15.0\(2\)sg2 | |
| cisco | ios | 15.0\(2\)sg3 | |
| cisco | ios | 15.0\(2\)sg4 | |
| cisco | ios | 15.0\(2\)sg5 | |
| cisco | ios | 15.0\(2\)sg6 | |
| cisco | ios | 15.0\(2\)sg7 | |
| cisco | ios | 15.0\(2\)sg8 | |
| cisco | ios | 15.0\(2\)sg9 | |
| cisco | ios | 15.0\(2\)sg10 | |
| cisco | ios | 15.0\(2\)sg11 | |
| cisco | ios | 15.0\(2\)sqd | |
| cisco | ios | 15.0\(2\)sqd1 | |
| cisco | ios | 15.0\(2\)sqd2 | |
| cisco | ios | 15.0\(2\)sqd3 | |
| cisco | ios | 15.0\(2\)sqd4 | |
| cisco | ios | 15.0\(2\)sqd5 | |
| cisco | ios | 15.0\(2\)sqd6 | |
| cisco | ios | 15.0\(2\)sqd7 | |
| cisco | ios | 15.0\(2\)sqd8 | |
| cisco | ios | 15.0\(2\)xo | |
| cisco | ios | 15.0\(2a\)ex5 | |
| cisco | ios | 15.0\(2a\)se9 | |
| cisco | ios | 15.1\(1\)sg | |
| cisco | ios | 15.1\(1\)sg1 | |
| cisco | ios | 15.1\(1\)sg2 | |
| cisco | ios | 15.1\(2\)sg | |
| cisco | ios | 15.1\(2\)sg1 | |
| cisco | ios | 15.1\(2\)sg2 | |
| cisco | ios | 15.1\(2\)sg3 | |
| cisco | ios | 15.1\(2\)sg4 | |
| cisco | ios | 15.1\(2\)sg5 | |
| cisco | ios | 15.1\(2\)sg6 | |
| cisco | ios | 15.1\(2\)sg7 | |
| cisco | ios | 15.1\(2\)sg8 | |
| cisco | ios | 15.1\(2\)sg8a | |
| cisco | ios | 15.1\(2\)sy15 | |
| cisco | ios | 15.1\(3\)mra3 | |
| cisco | ios | 15.1\(3\)svk4b | |
| cisco | ios | 15.1\(3\)svk4c | |
| cisco | ios | 15.1\(3\)svo2 | |
| cisco | ios | 15.1\(3\)svp1 | |
| cisco | ios | 15.2\(1\)e | |
| cisco | ios | 15.2\(1\)e1 | |
| cisco | ios | 15.2\(1\)e2 | |
| cisco | ios | 15.2\(1\)e3 | |
| cisco | ios | 15.2\(1\)ey | |
| cisco | ios | 15.2\(2\)e | |
| cisco | ios | 15.2\(2\)e1 | |
| cisco | ios | 15.2\(2\)e2 | |
| cisco | ios | 15.2\(2\)e3 | |
| cisco | ios | 15.2\(2\)e4 | |
| cisco | ios | 15.2\(2\)e5 | |
| cisco | ios | 15.2\(2\)e5a | |
| cisco | ios | 15.2\(2\)e5b | |
| cisco | ios | 15.2\(2\)e6 | |
| cisco | ios | 15.2\(2\)e7 | |
| cisco | ios | 15.2\(2\)e7b | |
| cisco | ios | 15.2\(2\)e8 | |
| cisco | ios | 15.2\(2\)e9 | |
| cisco | ios | 15.2\(2\)e9a | |
| cisco | ios | 15.2\(2\)e10 | |
| cisco | ios | 15.2\(2\)ea | |
| cisco | ios | 15.2\(2\)ea1 | |
| cisco | ios | 15.2\(2\)ea2 | |
| cisco | ios | 15.2\(2\)ea3 | |
| cisco | ios | 15.2\(2\)eb | |
| cisco | ios | 15.2\(2\)eb1 | |
| cisco | ios | 15.2\(2\)eb2 | |
| cisco | ios | 15.2\(2\)sc1 | |
| cisco | ios | 15.2\(2\)sc3 | |
| cisco | ios | 15.2\(2\)sc4 | |
| cisco | ios | 15.2\(2a\)e1 | |
| cisco | ios | 15.2\(2a\)e2 | |
| cisco | ios | 15.2\(2b\)e | |
| cisco | ios | 15.2\(3\)e | |
| cisco | ios | 15.2\(3\)e1 | |
| cisco | ios | 15.2\(3\)e2 | |
| cisco | ios | 15.2\(3\)e3 | |
| cisco | ios | 15.2\(3\)e4 | |
| cisco | ios | 15.2\(3\)e5 | |
| cisco | ios | 15.2\(3\)ea | |
| cisco | ios | 15.2\(3\)ea1 | |
| cisco | ios | 15.2\(3a\)e | |
| cisco | ios | 15.2\(3m\)e2 | |
| cisco | ios | 15.2\(3m\)e7 | |
| cisco | ios | 15.2\(3m\)e8 | |
| cisco | ios | 15.2\(4\)e | |
| cisco | ios | 15.2\(4\)e1 | |
| cisco | ios | 15.2\(4\)e2 | |
| cisco | ios | 15.2\(4\)e3 | |
| cisco | ios | 15.2\(4\)e4 | |
| cisco | ios | 15.2\(4\)e5 | |
| cisco | ios | 15.2\(4\)e5a | |
| cisco | ios | 15.2\(4\)e6 | |
| cisco | ios | 15.2\(4\)e7 | |
| cisco | ios | 15.2\(4\)ea | |
| cisco | ios | 15.2\(4\)ea1 | |
| cisco | ios | 15.2\(4\)ea2 | |
| cisco | ios | 15.2\(4\)ea3 | |
| cisco | ios | 15.2\(4\)ea4 | |
| cisco | ios | 15.2\(4\)ea5 | |
| cisco | ios | 15.2\(4\)ea6 | |
| cisco | ios | 15.2\(4\)ea7 | |
| cisco | ios | 15.2\(4\)ea8 | |
| cisco | ios | 15.2\(4\)ea9 | |
| cisco | ios | 15.2\(4\)ec1 | |
| cisco | ios | 15.2\(4\)ec2 | |
| cisco | ios | 15.2\(4\)jaz1 | |
| cisco | ios | 15.2\(4\)jn1 | |
| cisco | ios | 15.2\(4a\)ea5 | |
| cisco | ios | 15.2\(4m\)e1 | |
| cisco | ios | 15.2\(4m\)e2 | |
| cisco | ios | 15.2\(4m\)e3 | |
| cisco | ios | 15.2\(4n\)e2 | |
| cisco | ios | 15.2\(4o\)e2 | |
| cisco | ios | 15.2\(4o\)e3 | |
| cisco | ios | 15.2\(4p\)e1 | |
| cisco | ios | 15.2\(4q\)e1 | |
| cisco | ios | 15.2\(4s\)e1 | |
| cisco | ios | 15.2\(4s\)e2 | |
| cisco | ios | 15.2\(5\)e | |
| cisco | ios | 15.2\(5\)e1 | |
| cisco | ios | 15.2\(5\)e2 | |
| cisco | ios | 15.2\(5\)e2b | |
| cisco | ios | 15.2\(5\)e2c | |
| cisco | ios | 15.2\(5\)ea | |
| cisco | ios | 15.2\(5\)ex | |
| cisco | ios | 15.2\(5a\)e | |
| cisco | ios | 15.2\(5a\)e1 | |
| cisco | ios | 15.2\(5b\)e | |
| cisco | ios | 15.2\(5c\)e | |
| cisco | ios | 15.2\(6\)e | |
| cisco | ios | 15.2\(6\)e0a | |
| cisco | ios | 15.2\(6\)e0c | |
| cisco | ios | 15.2\(6\)e1 | |
| cisco | ios | 15.2\(6\)e1a | |
| cisco | ios | 15.2\(6\)e1s | |
| cisco | ios | 15.5\(1\)sy4 | |
| cisco | ios | 15.5\(3\)s10 | |
| cisco | ios_xe | 3.2.0sg | |
| cisco | ios_xe | 3.2.1sg | |
| cisco | ios_xe | 3.2.2sg | |
| cisco | ios_xe | 3.2.3sg | |
| cisco | ios_xe | 3.2.4sg | |
| cisco | ios_xe | 3.2.5sg | |
| cisco | ios_xe | 3.2.6sg | |
| cisco | ios_xe | 3.2.7sg | |
| cisco | ios_xe | 3.2.8sg | |
| cisco | ios_xe | 3.2.9sg | |
| cisco | ios_xe | 3.2.10sg | |
| cisco | ios_xe | 3.2.11sg | |
| cisco | ios_xe | 3.3.0sg | |
| cisco | ios_xe | 3.3.0sq | |
| cisco | ios_xe | 3.3.0xo | |
| cisco | ios_xe | 3.3.1sg | |
| cisco | ios_xe | 3.3.1sq | |
| cisco | ios_xe | 3.3.1xo | |
| cisco | ios_xe | 3.3.2sg | |
| cisco | ios_xe | 3.3.2xo | |
| cisco | ios_xe | 3.4.0sg | |
| cisco | ios_xe | 3.4.0sq | |
| cisco | ios_xe | 3.4.1sg | |
| cisco | ios_xe | 3.4.1sq | |
| cisco | ios_xe | 3.4.2sg | |
| cisco | ios_xe | 3.4.3sg | |
| cisco | ios_xe | 3.4.4sg | |
| cisco | ios_xe | 3.4.5sg | |
| cisco | ios_xe | 3.4.6sg | |
| cisco | ios_xe | 3.4.7sg | |
| cisco | ios_xe | 3.4.8sg | |
| cisco | ios_xe | 3.5.0e | |
| cisco | ios_xe | 3.5.0sq | |
| cisco | ios_xe | 3.5.1e | |
| cisco | ios_xe | 3.5.1sq | |
| cisco | ios_xe | 3.5.2e | |
| cisco | ios_xe | 3.5.2sq | |
| cisco | ios_xe | 3.5.3e | |
| cisco | ios_xe | 3.5.3sq | |
| cisco | ios_xe | 3.5.4sq | |
| cisco | ios_xe | 3.5.5sq | |
| cisco | ios_xe | 3.5.6sq | |
| cisco | ios_xe | 3.5.7sq | |
| cisco | ios_xe | 3.5.8sq | |
| cisco | ios_xe | 3.6.0ae | |
| cisco | ios_xe | 3.6.0be | |
| cisco | ios_xe | 3.6.0e | |
| cisco | ios_xe | 3.6.1e | |
| cisco | ios_xe | 3.6.2ae | |
| cisco | ios_xe | 3.6.2e | |
| cisco | ios_xe | 3.6.3e | |
| cisco | ios_xe | 3.6.4e | |
| cisco | ios_xe | 3.6.5ae | |
| cisco | ios_xe | 3.6.5be | |
| cisco | ios_xe | 3.6.5e | |
| cisco | ios_xe | 3.6.6e | |
| cisco | ios_xe | 3.6.7ae | |
| cisco | ios_xe | 3.6.7be | |
| cisco | ios_xe | 3.6.7e | |
| cisco | ios_xe | 3.6.8e | |
| cisco | ios_xe | 3.6.9e | |
| cisco | ios_xe | 3.6.10e | |
| cisco | ios_xe | 3.7.0e | |
| cisco | ios_xe | 3.7.1e | |
| cisco | ios_xe | 3.7.2e | |
| cisco | ios_xe | 3.7.3e | |
| cisco | ios_xe | 3.7.4e | |
| cisco | ios_xe | 3.7.5e | |
| cisco | ios_xe | 3.8.0e | |
| cisco | ios_xe | 3.8.1e | |
| cisco | ios_xe | 3.8.2e | |
| cisco | ios_xe | 3.8.3e | |
| cisco | ios_xe | 3.8.4e | |
| cisco | ios_xe | 3.8.5ae | |
| cisco | ios_xe | 3.8.5e | |
| cisco | ios_xe | 3.8.6e | |
| cisco | ios_xe | 3.8.7e | |
| cisco | ios_xe | 3.9.0e | |
| cisco | ios_xe | 3.9.1e | |
| cisco | ios_xe | 3.9.2be | |
| cisco | ios_xe | 3.9.2e | |
| cisco | ios_xe | 3.10.0ce | |
| cisco | ios_xe | 3.10.0e | |
| cisco | ios_xe | 3.10.1ae | |
| cisco | ios_xe | 3.10.1e | |
| cisco | ios_xe | 3.10.1se | |
| cisco | ios_xe | 3.10.4s | |
| cisco | ios_xe | 3.12.0as | |
| cisco | ios_xe | 3.16.0bs | |
| cisco | ios_xe | 3.16.1s | |
| cisco | ios_xe | 3.16.10s | |
| cisco | ios_xe | 16.9.2h | |
| cisco | ios_xe | 16.12.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1168DD8-4DF7-4A2B-B080-D267BF815F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCEF5EBB-226A-4E8F-A78D-9C1754F1FBC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "3316587B-3BCE-4F4A-8835-BDC12A7F12F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*",
"matchCriteriaId": "148C0902-66C4-4952-8319-40B8B145A901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*",
"matchCriteriaId": "1037D61F-BDE2-4956-9B27-25FD5408F1A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC077AA-909C-4344-B5A9-F71FBCC34B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "09C8E9BF-1C07-47FE-8F98-ED5960D302FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "F299684D-4676-4810-9BC3-1E28DF75E776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDCAFA73-B3F1-4527-8D7B-9B1B8263B50C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E7201D2F-08A9-4E13-A294-5987D6B8775D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "94824D7A-6CCE-4ACC-A48B-D8AA7E6518C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1d:*:*:*:*:*:*:*",
"matchCriteriaId": "BF711F3A-63A1-470F-927C-7EE5176B3F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "2465A016-415C-4EE9-9DEC-B71C3EDC0BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "91195861-AC53-4468-B1BB-3144A6F3CB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "C0690F55-8755-40F4-A2C1-34335ACDEBAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "1C20A694-A84E-47F4-ACCA-BF6AC9C2BF8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9944C77A-16EF-4908-930A-5B6C47BA897D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC069569-859C-41DB-93FE-57E8B3F2EBCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D1B7978F-4C1F-4F96-AF73-D5A1AC94F2FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "B39BBB71-C9BF-4566-8CCB-E613DE4AB06D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "17B63153-D51A-40AE-887B-CC9362263602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)az:*:*:*:*:*:*:*",
"matchCriteriaId": "67B8FCAC-27A3-4AA4-9A28-9FE526EE52E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "F1229A52-54B6-478F-A419-8D0340336BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "548C1020-E629-4F47-B8D2-AFBF77EC01DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "0688FE12-857D-4654-A778-CB836402DFC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC3D006-6C20-43B9-9100-E427895AA3F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D670129B-4D75-4E55-91B3-126BD8A53722",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "41768F22-7164-458E-8753-9B89BEDBAFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "1CFDD737-B7D0-45A0-A6D6-3494FE8B777B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1d:*:*:*:*:*:*:*",
"matchCriteriaId": "0B0CE611-2E4D-454D-A247-18744A6E74E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4041EB0-F402-4C01-9337-212E3E461AF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "00388B56-F514-4A9F-95FE-1D8239BE1EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "F846F7FF-3ECE-4390-B0F2-50B5AFCD568F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "60A56097-E614-4FE2-AA09-3FC5EDDB0170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "26B2BF3F-8B92-41BC-946F-E0BBEC874257",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "A640A1B7-8A59-43A6-8675-7E95FACF7A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "76B7F08A-15D1-4194-B476-E528B6AF8198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "B46F396D-2A00-4DB3-9BDE-F2291E7782BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB440BC6-9FC8-4EFD-B05E-3F5A5A68F8EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF4A473-C851-4D2F-A22E-66A267A1BDB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD4687F-D78C-41C8-B2B8-D140813A8619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5:*:*:*:*:*:*:*",
"matchCriteriaId": "052CBE3E-F871-4AFC-8DBB-E6783A5D7B17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8C33CF-9FD2-4DC5-B69C-0C8E0C6A987F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*",
"matchCriteriaId": "1DFF09A6-DE59-4CBF-AF02-DF2862C05D1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6a:*:*:*:*:*:*:*",
"matchCriteriaId": "EA39450E-25BE-40CA-B419-D939C3D39832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA069FDD-BC7C-4C61-955F-F6F2179091ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8:*:*:*:*:*:*:*",
"matchCriteriaId": "0E74792B-0E3E-45E1-B86E-34233330EB23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8a:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE3D38F-5DD5-44C5-BB38-571F81B1BC82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea9:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA5D0F6-810F-40E0-8CAE-3B01C13CC857",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10:*:*:*:*:*:*:*",
"matchCriteriaId": "AB63B163-E48F-4D40-BD9F-518F24B27C01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10a:*:*:*:*:*:*:*",
"matchCriteriaId": "2EDFB452-63BA-44AD-9972-7CCF43D0F730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10b:*:*:*:*:*:*:*",
"matchCriteriaId": "C72D3246-8E14-4A27-8A9B-2A1572849966",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea11:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB7FAC8-DD25-4C24-8AF1-F2B97ACB722C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea12:*:*:*:*:*:*:*",
"matchCriteriaId": "6761711F-AD6C-4844-9DCD-D2827FA0CDF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea13:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EC151E-DA5A-4695-A0EB-1C46C4F42FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea14:*:*:*:*:*:*:*",
"matchCriteriaId": "E457AF5B-637A-45B1-92FA-FC4096B8C912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEAFD220-48D7-46EE-8537-A69C5F8D0F2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9BA55-F193-4BCA-ACC2-BBC892E9D7E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*",
"matchCriteriaId": "46974023-379B-4475-A59F-BD340043CFAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*",
"matchCriteriaId": "D71C21E1-BC04-4537-B64D-76492F282B76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz3:*:*:*:*:*:*:*",
"matchCriteriaId": "AF5C9424-067B-4604-A197-478D4BFE72F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz4:*:*:*:*:*:*:*",
"matchCriteriaId": "01CC34CD-3004-4EA3-9DD1-E9CA0E2336E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F228FB3-0015-456A-A49C-7B1284F641B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz6:*:*:*:*:*:*:*",
"matchCriteriaId": "A99F0772-C2C0-4356-896C-30ED62B7887E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0E67EE-AF42-4B53-B70A-45562CE164D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "B086B50F-03C8-4C5C-8D4D-37EA33C6D7C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "A5783901-D472-4DA3-B836-45704F3A6A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "E39ABB80-0A2C-4B9F-BD62-59863BC2E451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A77C844-EAF8-497E-820F-EF2A87451319",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "9E319ADC-C636-4933-BD50-B613677AD4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A5E052D7-9811-416F-A5AA-7DB2DC8B9F71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*",
"matchCriteriaId": "522425D5-1EFE-4F07-88FE-9EE4376D7171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*",
"matchCriteriaId": "145A21CA-3E35-4F73-9451-72EF1265ECA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*",
"matchCriteriaId": "47186E81-9EAD-4AD6-B888-F1F94C2EA128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F08381-956E-4E97-8226-6EDC66C281D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa1:*:*:*:*:*:*:*",
"matchCriteriaId": "A211E02C-BF5F-4587-8416-7A3F15E1920B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*",
"matchCriteriaId": "54CCAA24-53BB-4998-B986-358701A8A8F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2560DA-E091-4344-A7D0-9BEEB6998AC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa4:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A526C3-8B1F-44BB-BCEE-C3D8140CDF3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "D12B5F13-392E-4BE0-AFC0-BAB2E989A08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "10151339-0261-4F5D-9601-F048C0B70908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "2498113D-65B7-4144-AD1C-9FCB6534B7BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "84685E46-066D-42B4-8800-7D529AFC4FAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2a:*:*:*:*:*:*:*",
"matchCriteriaId": "C712A3E4-388E-4B58-B079-D67E4FA0D729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "C96B72B0-0F9E-44AC-870E-84DC484173E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "99299759-15D1-4BEB-95D3-8D53C27674A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4a:*:*:*:*:*:*:*",
"matchCriteriaId": "A525BF43-E098-47DC-A32C-1A43B0F810D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "4C74A6F1-1A75-4D57-BDAA-68110CE604B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "D3290C7D-BB60-4095-BBFF-0484C1FEA071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA74FF4-FD5B-4EE9-969F-93EAC73D89B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D273495-EA24-4D04-BA90-710B22B4C003",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6742F7A-F4AC-49AB-954B-1595F7ECBD1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA90AE6-0BC8-442E-81F3-49E6C8D71F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "692B182F-4E9A-41C0-B254-0B0362A7B726",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "2B20E6F8-5E33-4F24-BB8B-8B61E39C01E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "77CF347D-F8D5-4D3D-AF23-E89A8C77AC46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*",
"matchCriteriaId": "878773DC-1360-4608-AB17-0081B33B11F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C2B085A-57AF-4A84-A354-166E61B5CAF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa2:*:*:*:*:*:*:*",
"matchCriteriaId": "C181E469-32B1-48AD-86F2-63AA790C5EEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*",
"matchCriteriaId": "A35979BE-B33F-4709-8B36-FB8297E321FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*",
"matchCriteriaId": "66130668-1107-42B3-BFAF-5640D3AC7595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0333A54-6370-4327-BF38-B873F3AC6615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa6:*:*:*:*:*:*:*",
"matchCriteriaId": "27CF87CF-3EC9-46C0-A98C-25F6055A3E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa7:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A93F44-8924-4787-AF35-4D6937B87086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa8:*:*:*:*:*:*:*",
"matchCriteriaId": "ABADA146-ACE1-4CE0-8CD3-A3F25EEAA3E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa9:*:*:*:*:*:*:*",
"matchCriteriaId": "216D7B37-0925-4A83-980D-2145B00793BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa10:*:*:*:*:*:*:*",
"matchCriteriaId": "856842DE-6995-4CB5-A500-6D851BBF3DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa11:*:*:*:*:*:*:*",
"matchCriteriaId": "862661A6-07AC-4FD3-B84C-977F66EDE29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa12:*:*:*:*:*:*:*",
"matchCriteriaId": "E30806B3-C98C-4D4B-AF11-0743EBB5B50B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa13:*:*:*:*:*:*:*",
"matchCriteriaId": "5CF3B7A3-F63F-472D-87D8-5EB767E0DE4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa14:*:*:*:*:*:*:*",
"matchCriteriaId": "18937501-09CF-48AC-A4FD-7ADE162BEF99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "C22E4042-3628-4A7E-BD93-1F3F282F9E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "99EC3F33-4A8D-46CE-A5FC-913E03F6DEBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "A84C2CA8-1BA4-4899-9AFF-443FBC5003D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5E50CF-9084-459B-AFE5-5E0C63E17AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey4:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F9FC27-5954-4374-BE61-E0E563A0DD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC9A8EF-FE37-42CB-A33F-4B6AF29A8827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C9F1F1-EA5E-4921-A862-06304CE55C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*",
"matchCriteriaId": "8508A0FF-D18D-430C-9A26-6B5BBFD7DF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*",
"matchCriteriaId": "393A274B-BAA4-46F3-BC35-BE697B96A684",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fz:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD274CE-D174-471A-8423-02F33F63B574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "DA143186-1E3B-4B5F-A5FD-AE90A2664AFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "A4912CA3-2311-4D0F-8767-6815F43BE645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC91248E-CE91-4BAA-B52B-4AB77AAF77B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "36953AD6-CE36-480E-8679-DE5EEBCC5A26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "F26D07A7-41E4-4768-AE14-8E0604BAF0C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1685F6-181F-41AA-8C6A-9038388C9963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sea:*:*:*:*:*:*:*",
"matchCriteriaId": "2F83F949-8F27-4FF7-A586-BDCDAA52B2EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*",
"matchCriteriaId": "F571ECA8-0AB1-4BC0-A6AE-06BAE1FD2375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F402D2-7DCE-4D22-BA71-ADB3622058D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E67F0D3-5722-49F3-80FA-8BA7292C085D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*",
"matchCriteriaId": "DA79BC8E-753F-4245-9885-A7A2733E4013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*",
"matchCriteriaId": "6B820873-78DF-401B-8A99-EB1F115FED35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4A5F6D-CEEC-4BBF-9E4A-2D3B1D148371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*",
"matchCriteriaId": "86F88317-18BE-4484-A027-D69500937799",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6CCDEE-0D38-4C6B-82D8-CDE5067CC704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*",
"matchCriteriaId": "0C342FEA-F2AC-4E0C-946E-1F7DB2994D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed1:*:*:*:*:*:*:*",
"matchCriteriaId": "82284ED7-CA08-447E-8EA7-FCD33D500BBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C112D4-820D-4BFD-AD59-4957E7D5FDF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EAF282-5537-4836-BC54-BB7EA023BF35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see2:*:*:*:*:*:*:*",
"matchCriteriaId": "AF228683-2C83-477B-904E-54E1446928A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see3:*:*:*:*:*:*:*",
"matchCriteriaId": "74DDE240-25BC-40F0-B8F4-D2D94389C08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see4:*:*:*:*:*:*:*",
"matchCriteriaId": "359E5A44-2CE6-463A-B9A4-C8BE21491D15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef:*:*:*:*:*:*:*",
"matchCriteriaId": "91100DDF-D654-479A-A773-2F31AF0F2516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef1:*:*:*:*:*:*:*",
"matchCriteriaId": "BA38F4E3-5D3B-46B1-A6E8-8E0B02B0F52A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef2:*:*:*:*:*:*:*",
"matchCriteriaId": "845B3CC7-E49B-45B0-BE89-05135A97A39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef3:*:*:*:*:*:*:*",
"matchCriteriaId": "E729850A-5D31-4332-AC37-C9442B7CB795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg:*:*:*:*:*:*:*",
"matchCriteriaId": "2B69AF0E-CF4D-417F-9E5A-B8540FAB2EA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg1:*:*:*:*:*:*:*",
"matchCriteriaId": "768A5932-EEF1-4A39-A054-CA54DE4CAC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg3:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E87B20-EF04-476D-829A-6F1433DD9854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "3B142BAA-613A-40F8-9FD2-EB081867B3F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A632D64-8E99-496A-8DE7-4A2458D1D7E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "48263C15-99F4-424D-AE45-F3A17E291F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "0048C46A-BC09-4958-B4FB-EA69B25E4EAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "EA202662-DD3B-44BD-A6A0-F31056A85759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbk9:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE7AFD4-966B-4F15-9C57-C3B2D0CF3781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "B752C842-B50D-4BE9-93E6-CAD0560B679E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "CD4ECB0B-62BD-4429-BF35-9ECBDAC952E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "8A46E63C-D7D4-47ED-8C83-E7EBA5B17A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "616C69BF-7431-4D40-BD31-929D4CE8C7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga:*:*:*:*:*:*:*",
"matchCriteriaId": "940F55CA-49E2-4353-9714-BA6A86D9DD66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga1:*:*:*:*:*:*:*",
"matchCriteriaId": "703C31A0-4E23-4D3E-9764-4A43A55AEDF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6B1A28-415B-4AA9-8CAF-2552B64D79C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE45B81D-7F63-41ED-A163-0103A702023C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga4:*:*:*:*:*:*:*",
"matchCriteriaId": "CEB656D5-1D86-4D3C-9A1B-92E6CE404E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga5:*:*:*:*:*:*:*",
"matchCriteriaId": "EE955775-49ED-4495-A70A-2C1315E95D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C88AF23-D873-4723-908D-E2898E9ED3E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga7:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A57EC0-6DE8-4552-BAC6-EB173D84AFCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga8:*:*:*:*:*:*:*",
"matchCriteriaId": "5F81076A-6583-4184-B8FE-1544792BCA74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga9:*:*:*:*:*:*:*",
"matchCriteriaId": "329678E4-D593-4E96-A33B-E8DBF87730E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga10:*:*:*:*:*:*:*",
"matchCriteriaId": "052091E6-A3E9-4E90-BBD5-1E0ED25998E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga11:*:*:*:*:*:*:*",
"matchCriteriaId": "B0AD7780-0194-47E9-980C-35215DFFD198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "BF116D8B-2C19-402A-9733-540CF79D80A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2A4B06-3E30-4633-9D9F-07AD91ED4281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "A35F3267-6978-4816-8DBC-2C7E2CFEE35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF7FB11-5610-4EDC-8F08-4FF5EF0182E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3B4F88-99E5-4C1F-A160-821B3A99F0B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "68AA7812-D193-4AE1-82F2-BDAD51929D63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "9545967F-C55D-48A4-B70A-3E9B2D7E1617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "98DBB5F7-D105-4F8E-B144-C392D3FC6AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "D97AB797-74DB-4414-B895-8D3403CF0334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "3A503C16-2719-435C-9CCE-B9743A42E9A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "77A73E2A-287A-48A0-90F2-9AA2DCC8595D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "C93174C2-4F87-42DF-856C-E9938DBC4DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A199EA0-3C40-4AB4-B67B-B4E0DA3E2512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "F10924FB-9326-4EE2-B6FD-37011A2C2E9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DB20CD-004C-478C-B19C-48D7C0B6FE3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E6E66F-D0F2-4CF7-AB96-D6DB38746972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "64D15762-83B5-40AB-8832-F8B5EE1D789D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "25BCC700-7375-477C-9585-16DF7AC3852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "FA49B682-E7ED-44CE-906C-9DD9D183583C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "E632468F-4B62-4937-8CA6-5B8023451F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "C853E612-2C4B-4595-AD6F-22E34B68C69A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "CC3E6D9B-BCC6-452A-8420-87E601B74949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA609E08-3369-4359-B126-19A54D537C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "15085505-6E63-40B7-9F71-7BF6F965FBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "71ADE6DE-5C2A-4D34-BE8B-A6ADEC61246E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "43710D33-1685-4EA9-948F-2B79122C4A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE43284-9902-4701-916A-FF10AE966842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "859A0347-C043-41F4-B2CC-EC54E36A81A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "FA011033-D263-4D47-8F33-844DB9C0B6B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "14FBF27D-7288-4251-9846-064AAD6E6AB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq:*:*:*:*:*:*:*",
"matchCriteriaId": "7988103E-FEC8-4F3D-AB7C-645C0D5070EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq2:*:*:*:*:*:*:*",
"matchCriteriaId": "D0888AE6-9FC0-4927-B74F-65711EDB4DE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "EAA8E712-36F0-43EF-AED9-BDE4EA6CD6FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA61004-EC61-4E03-A2FC-DAEBD5E10F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E61C16-55F9-4054-8CC2-38D5197A1FDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "49E8D759-07E9-49DB-B8EB-A9C06A8D8031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "3C923698-3017-49B8-9DAF-98584CE0402C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "ADBCA495-DD1B-473F-B1FD-D8EA414497EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "D7EF0685-7BEF-4F84-902C-DFE533CD2F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F114FD7-F62C-4A24-9CE6-C9A7136465F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "892F72BE-B65F-4271-9042-3B459DFBB43C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "7715D0D0-E8B2-444A-A590-7B5B0BFA713F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "1B526DE1-EEA7-47E4-B291-09C02F018A16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A00F4FE4-769F-4268-A623-DD56F12D7F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "D97983D5-B4D4-4A69-8573-A978EF9F8859",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFC6E74-0AAA-4CB4-B119-30ED3DB95749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "80B33EF2-3157-457D-BB77-CE99C9F02A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "2477EEC8-93F2-45D2-AFF6-8D83AE5195B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "F2570C01-A377-421E-B2A1-EC05A87DC684",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B7D11D-1C92-4369-A446-2CC58AEC70D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF19E91-370E-4F3E-A6ED-778A0493912F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "072FFEF0-72C9-4C19-8A3B-9633DDCA24E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq:*:*:*:*:*:*:*",
"matchCriteriaId": "46AE17A1-7FC7-4197-825C-92B32AC64D82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq1:*:*:*:*:*:*:*",
"matchCriteriaId": "00328248-72C7-4646-9312-5EAA7FE0D41E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq2:*:*:*:*:*:*:*",
"matchCriteriaId": "5535D673-8DF3-4737-A531-E7B28C419235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D97E83-3091-4E46-818C-503D7D1F9D1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq4:*:*:*:*:*:*:*",
"matchCriteriaId": "EE109462-C870-4C66-A7AE-B1ADED3B8DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq5:*:*:*:*:*:*:*",
"matchCriteriaId": "14D0156C-3153-4A64-8491-A6A1B60FE5CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq6:*:*:*:*:*:*:*",
"matchCriteriaId": "C075F42D-27C1-46A2-893A-5C0D9BE13861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq7:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF11222-0EA2-4E6B-B6DC-D16FCFEDE807",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0BE6E0-3D82-4B2A-9B4B-C50021F0687A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD063290-8E11-43E3-B55E-411551074C60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "5898745E-C1D3-4D0E-8476-2EEAA4327B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "887C5632-F3F7-4EDB-A065-D81F64A9B15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "AD397982-87E8-46CF-95A5-61435849D02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "B648C2EF-489B-4F62-B898-110A09794810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "41DADD4F-B761-406B-8BF1-A7AF0C6896D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "9600F1FE-17F6-4F6D-886A-ED95FEA9A3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "17356A3C-0C05-46A7-89EF-A2C48DDEC4A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5C5C5D-B40A-4DD6-A10C-C8713CCF2E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE68EAC3-05F4-46C5-8A48-4ECFF1844BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D896F9-9E25-464F-B6C5-55A2DD38CC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF566A3-331A-4A8A-9EEF-D1FBF71BF4C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "0623C531-CFF1-4C45-B8A7-BCF2C4678222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "794B72BB-52D0-4307-8A61-73AA2477885A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "34E66D10-84F4-486D-BFAF-B7D4AE2E5583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "C364500B-B7B0-47CC-9277-8D43BAB6E6D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B797B2-6AB2-4946-88C0-12D71258CCE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "F12B9DA7-28C4-4584-A548-6B06874F9C00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg9:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0C66F2-D158-497D-8683-2264F58A33B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE361F3-BA5B-453C-A58C-6E8CB84BC101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg11:*:*:*:*:*:*:*",
"matchCriteriaId": "8C55E31F-B291-4FE9-81FB-A91E95323863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "83184158-7C5F-4294-895E-7CF5B76A0F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A081B105-AD3F-4529-B3E7-D8B0851C83B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "B3142DA6-0FA9-4CEC-95FC-938AFD944BAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
"matchCriteriaId": "1644E8D2-E3F2-4ACB-A0D0-F374B565D121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC24BF9-DCD1-4974-A2C7-654E9B469C1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6F8F86-8C63-4A29-A384-62A849848EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "19D89B24-5DE1-4E15-B539-EC3FF6BA0658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "87760068-4255-4D18-A62D-FDC156F7A654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "D8AF551C-1482-489C-AC4B-DF3E9BBB0F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "904C4D5C-F603-42CE-9CAD-28B01223452B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "06D0BBED-E68E-43B7-93F5-FC5DEE7BEB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "63C5C43F-67A3-4000-845E-FDA620AD1B90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "565F3777-89E2-4159-9D8E-629EB7A56837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E3912E-11F7-421B-A5C4-35568A6E386B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "5362C676-5002-4ABC-9C60-97D4B65A399D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D14EB41-CD6A-483A-8F68-9072E436807D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
"matchCriteriaId": "DC201905-7DBF-4E2B-B732-62641F51C170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
"matchCriteriaId": "377669B9-952D-4527-9C24-E6713E749C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "AABCE40E-04D5-4248-A374-EAB938575C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABC42E8-E304-4D00-8C6C-604F3EE13DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D38633-31AE-42E9-8FFA-77C8EFA9AABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D6D9CC-70F0-475C-8AB0-48980596BE47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"matchCriteriaId": "8D593974-6D7B-4AF8-85B2-A77D8BE5CD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B4BFC4-F2C9-4D5E-AD22-3AAF36CFB12A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jaz1:*:*:*:*:*:*:*",
"matchCriteriaId": "81CA75FF-8C2E-4D9C-BE57-34EF801C28D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "971AAF00-63AA-4B3F-8E0F-B8FBD011C071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "551A0087-5926-46AF-B1DA-3AA18FAB87E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "E19A2402-F662-4900-8137-B14EB2537173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "5757C194-AF18-434C-9F19-2FC775720556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5D50E8-99DB-4B15-B0F2-84674A9346A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A101303-CFB2-4EF9-AD68-AF6D8E1E8148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex6:*:*:*:*:*:*:*",
"matchCriteriaId": "796E5094-9A88-42E2-949B-D6D59651F04B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8EBCA86-C027-4514-A2A9-613899FD9A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
"matchCriteriaId": "7D00EB0E-92D3-4C5B-B107-730B47BD6E01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7F6A52-9AA9-4441-A137-7EE3470C155C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
"matchCriteriaId": "92CEEA13-0B40-4203-8BAE-09374C9B1FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "8422A740-0029-4C05-A7FE-12F12CD73B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"matchCriteriaId": "343F5C35-A0C0-4747-95BA-D4044C64508B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "713C55A8-F24D-45FE-88AA-1D1EFEC88339",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"matchCriteriaId": "11F7D280-D099-495F-B860-D96F485BAF81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
"matchCriteriaId": "B62A7038-EBCF-4996-8795-3BF95CBDE6B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "815EAC82-48B1-47A2-80D7-8CEE806E4B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "F68B4687-CC90-45D8-989D-8DF38940C8A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F755B9BE-3DF6-49AE-847E-F74B696A49A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF429A0-4A54-48FA-B69B-D34898E987EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A867AA1-E46F-4027-A41B-6AE1A27EB2F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF4082D-8F3E-4274-83DD-431E99C395B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "230ACE85-877C-45D7-A2A9-0085C421292A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "D37BA5F4-9D5C-4D92-A6D3-055B79049719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED6E6E2-AB47-442C-93B9-DEBA9D124B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3CC7F08-343B-40CC-9D03-81EE4924D6C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
"matchCriteriaId": "31444A2D-BBF0-4D6A-A898-5EC4E782CC43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
"matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
"matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
"matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
"matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
"matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
"matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC9108D-B313-4C07-A9E3-5C2591304919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8a:*:*:*:*:*:*:*",
"matchCriteriaId": "FFFA4F2A-4BE5-4FD5-A3D4-2B28D6A25A53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*",
"matchCriteriaId": "ACE1712A-1A44-4BD1-B114-318D4EC4977A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*",
"matchCriteriaId": "C71593C6-B365-47D2-958D-A99FFB64101A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4b:*:*:*:*:*:*:*",
"matchCriteriaId": "2C5BF4FA-139A-4789-A9C1-84B6DEFFD300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4c:*:*:*:*:*:*:*",
"matchCriteriaId": "009E4B3F-4384-4DBD-9D88-0A191BB92C6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svo2:*:*:*:*:*:*:*",
"matchCriteriaId": "B853917E-D8E2-4CBD-BB4F-CB447BE052F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svp1:*:*:*:*:*:*:*",
"matchCriteriaId": "82784B3A-A4EA-4BBE-9ACE-BAE4895372CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CBD931B-9D7F-452A-A567-60ED7EA1D2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*",
"matchCriteriaId": "F98E150B-C806-4CF6-83EC-0C16A44F3EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "10438F4B-281D-4C2F-B4C3-DC3D47B0033A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"matchCriteriaId": "F7316ED4-FABD-49E0-AA21-394D327435F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"matchCriteriaId": "24A56EF3-4E88-4220-846A-A9BE1E496311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B29CAEE-A01B-4156-A871-43F3CC90ECB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc3:*:*:*:*:*:*:*",
"matchCriteriaId": "6879F438-0A0E-460C-A52F-3EE2F0EC2C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc4:*:*:*:*:*:*:*",
"matchCriteriaId": "A925CDF2-3A2E-499C-B38F-1D086534F11E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "0687FD87-BAED-4776-9B94-3C9EA7CCE79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "94FD5120-C385-4F16-AB3F-979D851DF8D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA06788C-E529-4024-9565-EAF5D90D68C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "96274788-A5AC-4740-A915-C381593203C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD15D65-9471-4755-9EDB-04ECF34DFD8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BDAB63-EA0E-486D-B146-7E0060F70066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5BD905-75C3-47AE-8D19-6225BD808B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D4358B9-F3DB-46AC-A3A8-114E25F676DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jn1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B171170-4BBD-4E09-BF5A-6DA3F110C7D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4a\\)ea5:*:*:*:*:*:*:*",
"matchCriteriaId": "734AA8D5-5BB9-4E1D-B8CB-0A14BADA9EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "F65F813B-C080-4028-8E1E-A81827917DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ABBCE48-B9D1-4EFB-BF64-CF30F5294EB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "9D54D10E-D94E-4731-9988-4EC1786FF4E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DC02AA6-E046-4EC9-9FFB-8B2C76FBE027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A2BB34B-D902-4064-BADC-56B5379E92CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "55D0A0A2-DB62-4C92-9877-CF8CA01B1A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "2316E962-6C56-4F45-9575-274506B9D4C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "42D3DFE3-7576-4D56-ABD2-425C28B56960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "A39AFD5E-8FCA-4EC6-9472-FD208CB2A555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D249815-5A8A-40E4-A943-6AB1A2250CDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"matchCriteriaId": "45B80CBC-961F-4EE8-A998-C0A827151EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2EB46D-16E0-4C31-8634-C33D70B5381A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "7803B445-FE22-4D4B-9F3A-68EFE528195E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7551128E-9E23-4C42-A681-6BE64D284C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "31605A68-9398-4239-A137-DD0516BD2660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
"matchCriteriaId": "EFEF03FA-FBF2-477F-A5E2-67F47610897A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "86C0900A-1354-4A20-B5ED-8C005BCE4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "3104D911-5FFC-4605-B234-6FD40A206DC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "EC787C70-6540-4AF7-9F05-8FD86284091E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "FC716D3D-5C37-4E36-8F6B-53801DC7225E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E289B7-7692-448B-B15E-224AF4F01D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E42A8A6F-A732-4441-A94F-FCDFA960EB9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "EE9EC5B2-CAE1-4C8F-8F96-FE006049FF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "895D2447-BD8A-473C-B26E-06897080DD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*",
"matchCriteriaId": "F8169591-4C3D-4C32-A24F-EACDBC62B77F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*",
"matchCriteriaId": "D5944EA5-29A2-438A-AA5E-ABC45E298419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6584D8-AE44-40D0-990C-94C377DBF275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sq:*:*:*:*:*:*:*",
"matchCriteriaId": "5E519217-3180-4C49-863F-0D10E47F1A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"matchCriteriaId": "930678B3-1527-4967-9D8F-27FC0DA060AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "E312CE6B-F3F5-40B3-8862-3BB1314376E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"matchCriteriaId": "58A34268-7618-48D2-8872-27B5B624543B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6893B368-D3C1-416D-A4E8-6484AF91C7CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"matchCriteriaId": "C2017A75-CC29-4161-85CB-7A531E5ABB3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sq:*:*:*:*:*:*:*",
"matchCriteriaId": "1D918A4A-7E60-4C8B-86D8-82BCA99B0844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "596A43FC-0DDA-4AF6-A4A4-A488B5740D5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCF5A7C-202D-44F8-97D3-694F876050D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EA559D-5184-4E19-8A32-ECA41C930AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*",
"matchCriteriaId": "716D8805-D461-4066-9BFD-1EA895E4B997",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*",
"matchCriteriaId": "7150819E-EFB5-4224-975C-84EDBBB2881D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*",
"matchCriteriaId": "E81F4068-35A1-4712-9B88-F6E574B2DE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*",
"matchCriteriaId": "28DDB45D-1B19-4FAB-B985-F8E5D38A3ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*",
"matchCriteriaId": "29794A8C-B1CC-492F-9A68-02EEE994743B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*",
"matchCriteriaId": "4CBBDA12-AF2E-400B-979D-3657F1F2C15B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7F55DC-38F5-4B19-A699-90E1D302A04B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*",
"matchCriteriaId": "CC32DB11-4E23-492E-A00E-E0DBF9131C64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2306E8-ABFD-4C37-A911-7B35A654147C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*",
"matchCriteriaId": "7207B1F1-AF21-4C02-A163-4289503A026C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
"matchCriteriaId": "895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "A98F2654-46F3-4C63-A2C2-48B372C655B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "3598539F-0EEB-45D6-8BA5-A2A3F69D556C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
"matchCriteriaId": "3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2h:*:*:*:*:*:*:*",
"matchCriteriaId": "0E275E7D-C89D-42DE-9301-C19A54FEE964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el c\u00f3digo de procesamiento CMP (Cluster Management Protocol) del software Cisco IOS y Cisco IOS XE podr\u00eda permitir que un atacante adyacente no autenticado desencadene una denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente al procesar paquetes de gesti\u00f3n CMP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes de gesti\u00f3n CMP maliciosos a un dispositivo afectado. Si se explota con \u00e9xito, podr\u00eda permitir que el switch se reinicie, provocando una denegaci\u00f3n de servicio (DoS). El switch se recargar\u00e1 autom\u00e1ticamente."
}
],
"id": "CVE-2019-1746",
"lastModified": "2024-11-21T04:37:15.843",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-03-28T00:29:00.590",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107612"
},
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107612"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-MMWF-5332-H99W
Vulnerability from github – Published: 2022-05-13 01:31 – Updated: 2022-05-13 01:31A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.
{
"affected": [],
"aliases": [
"CVE-2019-1746"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-03-28T00:29:00Z",
"severity": "MODERATE"
},
"details": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.",
"id": "GHSA-mmwf-5332-h99w",
"modified": "2022-05-13T01:31:25Z",
"published": "2022-05-13T01:31:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1746"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/107612"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2019-14439
Vulnerability from cnvd - Published: 2019-05-16厂商已发布漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos
| Name | ['Cisco IOS XE', 'Cisco IOS'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "107612"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2019-1746"
}
},
"description": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nCisco IOS\u548cIOS XE\u4e2d\u7684Cluster Management Protocol (CMP)\u5904\u7406\u4ee3\u7801\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6076\u610f\u7684CMP\u7ba1\u7406\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u4ea4\u6362\u673a\u5d29\u6e83\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"discovererName": "Cisco",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-14439",
"openTime": "2019-05-16",
"patchDescription": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS\u548cIOS XE\u4e2d\u7684Cluster Management Protocol (CMP)\u5904\u7406\u4ee3\u7801\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6076\u610f\u7684CMP\u7ba1\u7406\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u4ea4\u6362\u673a\u5d29\u6e83\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco IOS\u548cIOS XE CMP\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco IOS XE",
"Cisco IOS"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-1746",
"serverity": "\u4e2d",
"submitTime": "2019-03-28",
"title": "Cisco IOS\u548cIOS XE CMP\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
CERTFR-2019-AVI-133
Vulnerability from certfr_avis - Published: 2019-03-28 - Updated: 2019-03-28
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | IOS XE | Cisco IOS XE | ||
| Cisco | N/A | Cisco ASR 900 RSP3 | ||
| Cisco | IOS | Cisco IOS | ||
| Cisco | N/A | Cisco Catalyst 4500/4500X | ||
| Cisco | IOS XE | Routeurs Cisco avec un module Sierra Wireless WWAN cellular interface et exécutant une version logicielle Cisco IOS Release 15.8(3)M ou Cisco IOS XE Release 16.10.1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco IOS XE",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASR 900 RSP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 4500/4500X",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Routeurs Cisco avec un module Sierra Wireless WWAN cellular interface et ex\u00e9cutant une version logicielle Cisco IOS Release 15.8(3)M ou Cisco IOS XE Release 16.10.1",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1752"
},
{
"name": "CVE-2019-1743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1743"
},
{
"name": "CVE-2019-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1749"
},
{
"name": "CVE-2019-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1739"
},
{
"name": "CVE-2019-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1753"
},
{
"name": "CVE-2019-1751",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1751"
},
{
"name": "CVE-2019-1748",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1748"
},
{
"name": "CVE-2019-1755",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1755"
},
{
"name": "CVE-2019-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1747"
},
{
"name": "CVE-2019-1742",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1742"
},
{
"name": "CVE-2019-1741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1741"
},
{
"name": "CVE-2019-1738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1738"
},
{
"name": "CVE-2019-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1746"
},
{
"name": "CVE-2019-1756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1756"
},
{
"name": "CVE-2019-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1737"
},
{
"name": "CVE-2019-1754",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1754"
},
{
"name": "CVE-2019-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1745"
},
{
"name": "CVE-2019-1740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1740"
},
{
"name": "CVE-2019-1750",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1750"
}
],
"initial_release_date": "2019-03-28T00:00:00",
"last_revision_date": "2019-03-28T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-133",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-afu du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-nat64 du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-ipsla-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-ipsla-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-cmp-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-sms-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-sms-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-isdn du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-isdn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-xecmd du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xecmd"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-cmdinject du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinject"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-evss du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-evss"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-cmdinj du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinj"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-nbar du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nbar"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-pnp-cert du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-pnp-cert"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-rsp3-ospf du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-rsp3-ospf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-eta-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-eta-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-pe du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-pe"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-xeid du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xeid"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-privesc du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-privesc"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.