Vulnerabilites related to cisco - cg-os
var-201304-0277
Vulnerability from variot
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275. plural CISCO Run on product Cisco NX-OS of Cisco Discovery Protocol (CDP) There is a buffer overflow vulnerability in the implementation of. Vendors have confirmed this vulnerability Bug IDs CSCtu10630 , CSCtu10551 , CSCtu10550 , CSCtw56581 , CSCtu10548 , CSCtu10544 ,and CSCuf61275 It is released as.Malformed by a third party CDP An arbitrary code may be executed via a packet. The Cisco MDS 9000 is a family of multi-layer intelligent optical channel switches from Cisco. Cisco Nexus is a data center-class switch from Cisco. The Cisco Unified Computing System simplifies IT management and increases flexibility by consolidating unified computing, networking, storage access, and virtualization into one system. The Cisco Connected Grid Router is a router dedicated to smart grid-related devices. The vulnerability is caused by the malformed CDP packet being processed incorrectly. The vulnerability can be triggered by an attacker submitting a malformed CDP packet to the affected device. Since CDP works at the data link layer, an attacker must send an Ethernet frame directly to the affected device to exploit this vulnerability. Multiple Cisco NX-OS-Based products are prone to multiple remote buffer-overflow vulnerabilities because they fail to perform adequate boundary-checks on user-supplied data. An attacker can exploit these issues to execute arbitrary code with the elevated privileges. Failed exploit attempts will result in a denial-of-service condition. These issues being tracked by Cisco Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201304-0277", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.1" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)n1\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)n2\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.1\\(3\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)n1\\(1c\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.2" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(2\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)n2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(4\\)sv1\\(3d\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "2.0\\(1x\\)" }, { "model": "nexus 4001i", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.\\(4\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(4\\)sv1\\(3a\\)" }, { "model": "nexus 5010", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0\\(1s\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.\\(5\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(5\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(1a\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(4\\)sv1\\(3c\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(4f\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(3\\)n1\\(1a\\)" }, { "model": "nexus 5000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(6\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(3\\)" }, { "model": "nexus 5548p", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nexus 7000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system 6120xp fabric interconnect", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(2\\)" }, { "model": "nexus 7000 9-slot", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "cg-os", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "cg4" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.1" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(3s\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2\\)n2\\(1\\)" }, { "model": "nexus 3000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1p\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(3\\)n2\\(1a\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1n\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n1\\(1b\\)" }, { "model": "nexus 3064t", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(1m\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(0\\)n1\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n2\\(2b\\)" }, { "model": "cg-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "cg3" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1\\)n2\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(0\\)n1\\(2\\)" }, { "model": "nexus 3064x", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(3i\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(3m\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(3\\)" }, { "model": "nexus 1000v", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nexus 7000 10-slot", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(5\\)" }, { "model": "nexus 5596up", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2a\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(4g\\)" }, { "model": "nexus 5548up", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(3u\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0\\(1q\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.1" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "6.0\\(2\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(3y\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1t\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(6\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(3a\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.\\(3\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(1a\\)n1\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.\\(2\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1w\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0\\(1t\\)" }, { "model": "nexus 3548", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2.\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(1a\\)n2\\(1\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.0\\(2k\\)" }, { "model": "nexus 3016q", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nexus 3048", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1c\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1\\)n2\\(1\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "2.0\\(1w\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1\\)sv1\\(4\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1m\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(4j\\)" }, { "model": "unified computing system 6296up fabric interconnect", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.1\\(1m\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2\\)n2\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n2\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(4\\)sv1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(8\\)" }, { "model": "nexus 7000 18-slot", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1\\)sv1\\(5.1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(1a\\)n2\\(1a\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(4i\\)" }, { "model": "unified computing system 6248up fabric interconnect", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(4\\)sv1\\(3b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(4\\)sv1\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(3\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2" }, { "model": "nx-os", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "4.1.\\(2\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(1j\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(3l\\)" }, { "model": "unified computing system 6140xp fabric interconnect", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(1\\)sv1\\(4a\\)" }, { "model": "cg-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "cg1" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(4\\)sv1\\(3\\)" }, { "model": "connected grid router 1000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1y\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1o\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(3\\)n1\\(1a\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(3q\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2\\(1a\\)" }, { "model": "mds 9000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.2\\(1d\\)" }, { "model": "nexus 5020", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.3\\(1q\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.0\\(0\\)n1\\(1a\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(4k\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.2\\(4\\)" }, { "model": "cg-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "cg2" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1\\(3\\)n2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(4\\)" }, { "model": "connected grid router series cg3", "scope": "eq", "trust": 0.9, "vendor": "cisco", "version": "1000" }, { "model": "nexus 3000 series switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3048 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 7000 series switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ucs infrastructure and ucs manager software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6100 series )" }, { "model": "nexus 5548p switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "cisco mds 9000 series )" }, { "model": "nexus 7000 9 slot switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3064-t switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ucs 6120xp-20 port fabric interconnect", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ucs infrastructure and ucs manager software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "2.0(2m)" }, { "model": "ucs 6140xp-40 port fabric interconnect", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "3000 series )" }, { "model": "nx-os", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "( cisco nexus 4000)" }, { "model": "nx-os", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "6.x ( cisco nexus 7000 series )" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.2(4)" }, { "model": "mds 9000 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "cg-os", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "( cisco 1000 series)" }, { "model": "nx-os", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x ( cisco nexus 5500" }, { "model": "1000 series connected grid router", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ucs 6296up 96 port fabric interconnect", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.0(3)u3(1)" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.2(1)sv1(5.1)" }, { "model": "cg-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "cg4(1)" }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5000 series )" }, { "model": "nexus 5020 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5500" }, { "model": "ucs 6248up 48 port fabric interconnect", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.1(2)e1(1h)" }, { "model": "ucs infrastructure and ucs manager software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "( cisco ucs 6200" }, { "model": "nexus 5010 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 7000 10 slot switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 3548 switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 7000 18 slot switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 4001i switch module for ibm bladecenter", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "6.1(1)" }, { "model": "nexus 5596up switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5.1(3)n1(1)" }, { "model": "nexus 5000 series switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.x ( cisco nexus 7000" }, { "model": "nx-os", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x ( cisco nexus 4000" }, { "model": "nexus 3064-x switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 1000v switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexus 5548up switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "4.x ( cisco nexus 1000v series )" }, { "model": "nx-os", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x ( cisco nexus 7000 series" }, { "model": "nexus 3016q switch", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "5000 series" }, { "model": "mds", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "9000" }, { "model": "nexus", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000v" }, { "model": "nexus", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3000" }, { "model": "nexus", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4000" }, { "model": "nexus", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "nexus", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7000" }, { "model": "connected grid router series", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" }, { "model": "unified computing system", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "nexus 5.0 u2", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3000" }, { "model": "nexus 5.0 u1", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "3000" }, { "model": "connected grid router series cg1", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "1000" }, { "model": "unified computing system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.3(x)" }, { "model": "unified computing system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.2(x)" }, { "model": "unified computing system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.1(x)" }, { "model": "unified computing system", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1.0(x)" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70006.0(x)" }, { "model": "nexus 5.2", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7000" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70005.1(x)" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70005.0(x)" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70004.2(x)" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70004.1(x)" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50005.0(x)" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.2(x)" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.1(x)" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50004.0(x)" }, { "model": "nexus 4.1 e1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4000" }, { "model": "nexus 4.2 sv1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v" }, { "model": "nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000v4.0(x)" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90005.2(3)" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90005.0(x)" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90004.2(x)" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90004.1(x)" }, { "model": "unified computing system 2.1.1e", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "nexus", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70006.1(1)" }, { "model": "nexus", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70005.2(9)" }, { "model": "nexus 5.2 n1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "nexus 4.1 e1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4000" }, { "model": "nexus 5.0 u5", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "nexus 4.2 sv2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1000v" }, { "model": "mds", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "90005.2(8)" }, { "model": "connected grid router series cg4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04354" }, { "db": "BID", "id": "59452" }, { "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "db": "CNNVD", "id": "CNNVD-201304-529" }, { "db": "NVD", "id": "CVE-2013-1178" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:connected_grid_router_1000", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:cg-os", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:mds_9000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_1000v", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3016q", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3048", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3064t", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3064x", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3548", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_4001i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5010_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5020_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5548p_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5548up_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5596up_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_7000_10-slot", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_7000_18-slot", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_7000_9-slot", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_7000", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:nx-os", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6120xp_fabric_interconnect", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6140xp_fabric_interconnect", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6248up_fabric_interconnect", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6296up_fabric_interconnect", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:ucs_infrastructure_and_ucs_software", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002468" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "59452" }, { "db": "CNNVD", "id": "CNNVD-201304-529" } ], "trust": 0.9 }, "cve": "CVE-2013-1178", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CVE-2013-1178", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CNVD-2013-04354", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "VHN-61180", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-1178", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2013-1178", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2013-04354", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201304-529", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-61180", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04354" }, { "db": "VULHUB", "id": "VHN-61180" }, { "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "db": "CNNVD", "id": "CNNVD-201304-529" }, { "db": "NVD", "id": "CVE-2013-1178" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275. plural CISCO Run on product Cisco NX-OS of Cisco Discovery Protocol (CDP) There is a buffer overflow vulnerability in the implementation of. Vendors have confirmed this vulnerability Bug IDs CSCtu10630 , CSCtu10551 , CSCtu10550 , CSCtw56581 , CSCtu10548 , CSCtu10544 ,and CSCuf61275 It is released as.Malformed by a third party CDP An arbitrary code may be executed via a packet. The Cisco MDS 9000 is a family of multi-layer intelligent optical channel switches from Cisco. Cisco Nexus is a data center-class switch from Cisco. The Cisco Unified Computing System simplifies IT management and increases flexibility by consolidating unified computing, networking, storage access, and virtualization into one system. The Cisco Connected Grid Router is a router dedicated to smart grid-related devices. The vulnerability is caused by the malformed CDP packet being processed incorrectly. The vulnerability can be triggered by an attacker submitting a malformed CDP packet to the affected device. Since CDP works at the data link layer, an attacker must send an Ethernet frame directly to the affected device to exploit this vulnerability. Multiple Cisco NX-OS-Based products are prone to multiple remote buffer-overflow vulnerabilities because they fail to perform adequate boundary-checks on user-supplied data. \nAn attacker can exploit these issues to execute arbitrary code with the elevated privileges. Failed exploit attempts will result in a denial-of-service condition. \nThese issues being tracked by Cisco Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275", "sources": [ { "db": "NVD", "id": "CVE-2013-1178" }, { "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "db": "CNVD", "id": "CNVD-2013-04354" }, { "db": "BID", "id": "59452" }, { "db": "VULHUB", "id": "VHN-61180" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-1178", "trust": 3.4 }, { "db": "BID", "id": "59452", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2013-002468", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201304-529", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2013-04354", "trust": 0.6 }, { "db": "CISCO", "id": "20130424 MULTIPLE VULNERABILITIES IN CISCO NX-OS-BASED PRODUCTS", "trust": 0.6 }, { "db": "SECUNIA", "id": "53189", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-61180", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04354" }, { "db": "VULHUB", "id": "VHN-61180" }, { "db": "BID", "id": "59452" }, { "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "db": "CNNVD", "id": "CNNVD-201304-529" }, { "db": "NVD", "id": "CVE-2013-1178" } ] }, "id": "VAR-201304-0277", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2013-04354" }, { "db": "VULHUB", "id": "VHN-61180" } ], "trust": 1.28384495 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04354" } ] }, "last_update_date": "2024-11-23T22:39:05.443000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20130424-nxosmulti", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti" }, { "title": "29021", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=29021" }, { "title": "28737", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAMBAlert.x?alertId=28737" }, { "title": "cisco-sa-20130424-nxosmulti", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/111/1117/1117910_cisco-sa-20130424-nxosmulti-j.html" }, { "title": "Patch for Multiple Cisco Product CDP Subsystem Buffer Overflow Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/33667" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04354" }, { "db": "JVNDB", "id": "JVNDB-2013-002468" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-61180" }, { "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "db": "NVD", "id": "CVE-2013-1178" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130424-nxosmulti" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1178" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1178" }, { "trust": 0.6, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=29021" }, { "trust": 0.6, "url": "http://secunia.com/advisories/53189" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/59452" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2013-04354" }, { "db": "VULHUB", "id": "VHN-61180" }, { "db": "BID", "id": "59452" }, { "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "db": "CNNVD", "id": "CNNVD-201304-529" }, { "db": "NVD", "id": "CVE-2013-1178" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2013-04354" }, { "db": "VULHUB", "id": "VHN-61180" }, { "db": "BID", "id": "59452" }, { "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "db": "CNNVD", "id": "CNNVD-201304-529" }, { "db": "NVD", "id": "CVE-2013-1178" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-04-27T00:00:00", "db": "CNVD", "id": "CNVD-2013-04354" }, { "date": "2013-04-25T00:00:00", "db": "VULHUB", "id": "VHN-61180" }, { "date": "2013-04-24T00:00:00", "db": "BID", "id": "59452" }, { "date": "2013-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "date": "2013-04-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-529" }, { "date": "2013-04-25T10:55:01.570000", "db": "NVD", "id": "CVE-2013-1178" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-05-25T00:00:00", "db": "CNVD", "id": "CNVD-2013-04354" }, { "date": "2013-04-25T00:00:00", "db": "VULHUB", "id": "VHN-61180" }, { "date": "2013-04-24T00:00:00", "db": "BID", "id": "59452" }, { "date": "2013-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-002468" }, { "date": "2013-04-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201304-529" }, { "date": "2024-11-21T01:49:03.347000", "db": "NVD", "id": "CVE-2013-1178" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "specific network environment", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-529" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Cisco Run on product Cisco NX-OS of CDP Implementation buffer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-002468" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201304-529" } ], "trust": 0.6 } }
var-201405-0356
Vulnerability from variot
Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322. Vendors have confirmed this vulnerability Bug ID CSCtk00695 , CSCts56633 , CSCts56632 , CSCts56628 , CSCug14405 ,and CSCuf61322 It is released as.Remote SMTP The server could execute arbitrary code via a crafted reply. Cisco NX-OS is a data center-class operating system that embodies modular design, resiliency, and maintainability. Cisco multiple NX-OS products are prone to a buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Attackers can exploit this issue to execute arbitrary commands with elevated privileges. Failed exploit attempts will result in denial-of-service conditions. This issue is being tracked by Cisco Bug IDs CSCts56633, CSCts56632, CSCts56628, CSCug14405, CSCtk00695 and CSCuf61322
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201405-0356", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u2\\(2c\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u2\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u3\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u3\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u3\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u2\\(2b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u3\\(2b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1e\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u2\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "5.0\\(3\\)u2\\(2d\\)" }, { "model": "nx-os", "scope": null, "trust": 1.4, "vendor": "cisco", "version": null }, { "model": "nexus 5020p switch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n2\\(1\\)" }, { "model": "cgr 1120", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)" }, { "model": "cg-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "cg4\\(1\\)" }, { "model": "nexus 3064t", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(3\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "4.1.\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(3\\)" }, { "model": "unified computing system 6120xp fabric interconnect", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2\\)n2\\(1\\)" }, { "model": "cg-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "cg4" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0" }, { "model": "nexus 7000 9-slot", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n1\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n2\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n1\\(1c\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1\\)" }, { "model": "nexus 5000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2a\\)" }, { "model": "unified computing system 6296up fabric interconnect", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "unified computing system 6140xp fabric interconnect", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(2\\)" }, { "model": "nexus 5020", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1\\)" }, { "model": "nexus 3048", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nexus 4001i", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u1\\(2a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1d\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u1\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u1\\(1d\\)" }, { "model": "nexus 5010p switch", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nexus 3016q", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nexus 3064x", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nexus 5010", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u2\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(5\\)" }, { "model": "nexus 7000 10-slot", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n1\\(1\\)" }, { "model": "unified computing system infrastructure and unified computing system software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "1.4\\(1j\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1\\(1a\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2\\)" }, { "model": "unified computing system 6248up fabric interconnect", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n2\\(2b\\)" }, { "model": "nexus 5548up", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u1\\(1b\\)" }, { "model": "nexus 5548p", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n1\\(1b\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)n2\\(2a\\)" }, { "model": "nexus 5596up", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "cgr 1240", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u1\\(2\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u5\\(1c\\)" }, { "model": "nexus 3548", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2\\)n1\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(3\\)u4\\(1\\)" }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.0\\(2\\)n2\\(1a\\)" }, { "model": "nexus 7000", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nexus 7000 18-slot", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": null }, { "model": "nx-os", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "5.1" }, { "model": "nexus 5548up switch", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "nexus 5010p switch", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "software 5.1(3)n1(1)" }, { "model": "nexus 5596up switch", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "nexus 5010p switch", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "nexus 5020 switch", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "software 5.1(3)n1(1)" }, { "model": "nexus 5548p switch", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "nexus 5020 switch", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "nexus 5020p switch", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "software 5.1(3)n1(1)" }, { "model": "nexus 5000 series switch", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "software 5.1(3)n1(1)" }, { "model": "nexus 5020p switch", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "nexus 5548p switch", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "software 5.1(3)n1(1)" }, { "model": "nexus 5000 series switch", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "nexus 5010 switch", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "software 5.1(3)n1(1)" }, { "model": "nexus 5010 switch", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "5.x" }, { "model": "nexus 5596up switch", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "software 5.1(3)n1(1)" }, { "model": "nexus 5548up switch", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "software 5.1(3)n1(1)" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.2(4)" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.2(3)" }, { "model": "nx-os", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "4.2(6)" }, { "model": "unified computing system fabric interconnects", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "nx-os ucs", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "62000" }, { "model": "nx-os ucs", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "61000" }, { "model": "nx-os nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "nx-os nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "nx-os nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "60000" }, { "model": "nx-os nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "nx-os nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40000" }, { "model": "nx-os nexus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "nx-os mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90000" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "70000" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40000" }, { "model": "nx-os for nexus series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30000" }, { "model": "nx-os cgr", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "10000" }, { "model": "connected grid router series cg-os", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "1000" }, { "model": "nx-os ucs 2.2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6200" }, { "model": "nx-os ucs 2.2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "6100" }, { "model": "nx-os nexus", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "70006.2(8)" }, { "model": "nx-os nexus 7.0 n1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "nx-os nexus 6.0 n2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "nx-os nexus 5.2 n1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "nx-os nexus 4.1 e1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4000" }, { "model": "nx-os nexus 6.0 u2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "nx-os nexus 5.0 u5", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3000" }, { "model": "nx-os mds", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "90006.2(7)" }, { "model": "nx-os cgr cg4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1000" }, { "model": "nx-os cgr 15.4 cg", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "1000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "BID", "id": "67575" }, { "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "db": "CNNVD", "id": "CNNVD-201405-482" }, { "db": "NVD", "id": "CVE-2014-3261" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:cisco:cgr_1120", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:cgr_1240", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:cg-os", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3016q", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3048", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3064x", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_3548", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_4001i", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5010_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5010p_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5020_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5020p_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5548p_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5548up_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_5596up_switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_7000_10-slot", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_7000_18-slot", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_7000_9-slot", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:nexus_7000", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:nx-os", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6120xp_fabric_interconnect", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6140xp_fabric_interconnect", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6248up_fabric_interconnect", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:unified_computing_system_6296up_fabric_interconnect", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:ucs_infrastructure_and_ucs_software", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002654" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "67575" } ], "trust": 0.3 }, "cve": "CVE-2014-3261", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CVE-2014-3261", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "CNVD-2014-03244", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 4.9, "id": "VHN-71201", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-3261", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-3261", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2014-03244", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201405-482", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-71201", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "VULHUB", "id": "VHN-71201" }, { "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "db": "CNNVD", "id": "CNNVD-201405-482" }, { "db": "NVD", "id": "CVE-2014-3261" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322. Vendors have confirmed this vulnerability Bug ID CSCtk00695 , CSCts56633 , CSCts56632 , CSCts56628 , CSCug14405 ,and CSCuf61322 It is released as.Remote SMTP The server could execute arbitrary code via a crafted reply. Cisco NX-OS is a data center-class operating system that embodies modular design, resiliency, and maintainability. Cisco multiple NX-OS products are prone to a buffer overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. \nAttackers can exploit this issue to execute arbitrary commands with elevated privileges. Failed exploit attempts will result in denial-of-service conditions. \nThis issue is being tracked by Cisco Bug IDs CSCts56633, CSCts56632, CSCts56628, CSCug14405, CSCtk00695 and CSCuf61322", "sources": [ { "db": "NVD", "id": "CVE-2014-3261" }, { "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "BID", "id": "67575" }, { "db": "VULHUB", "id": "VHN-71201" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3261", "trust": 3.4 }, { "db": "BID", "id": "67575", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2014-002654", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201405-482", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2014-03244", "trust": 0.6 }, { "db": "CISCO", "id": "20140521 MULTIPLE VULNERABILITIES IN CISCO NX-OS-BASED PRODUCTS", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-71201", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "VULHUB", "id": "VHN-71201" }, { "db": "BID", "id": "67575" }, { "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "db": "CNNVD", "id": "CNNVD-201405-482" }, { "db": "NVD", "id": "CVE-2014-3261" } ] }, "id": "VAR-201405-0356", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "VULHUB", "id": "VHN-71201" } ], "trust": 1.2357143 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03244" } ] }, "last_update_date": "2024-11-23T22:02:10.889000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20140521-nxos", "trust": 0.8, "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos" }, { "title": "34247", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=34247" }, { "title": "cisco-sa-20140521-nxos", "trust": 0.8, "url": "http://www.cisco.com/cisco/web/support/JP/112/1122/1122585_cisco-sa-20140521-nxos-j.html" }, { "title": "Patch for multiple NX-OS Products Smart Call Home Feature Buffer Overflow Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/45867" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "JVNDB", "id": "JVNDB-2014-002654" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71201" }, { "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "db": "NVD", "id": "CVE-2014-3261" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140521-nxos" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3261" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3261" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps9494/products_sub_category_home.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "VULHUB", "id": "VHN-71201" }, { "db": "BID", "id": "67575" }, { "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "db": "CNNVD", "id": "CNNVD-201405-482" }, { "db": "NVD", "id": "CVE-2014-3261" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "VULHUB", "id": "VHN-71201" }, { "db": "BID", "id": "67575" }, { "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "db": "CNNVD", "id": "CNNVD-201405-482" }, { "db": "NVD", "id": "CVE-2014-3261" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-05-26T00:00:00", "db": "CNVD", "id": "CNVD-2014-03244" }, { "date": "2014-05-26T00:00:00", "db": "VULHUB", "id": "VHN-71201" }, { "date": "2014-05-21T00:00:00", "db": "BID", "id": "67575" }, { "date": "2014-05-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "date": "2014-05-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201405-482" }, { "date": "2014-05-26T00:25:32.220000", "db": "NVD", "id": "CVE-2014-3261" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-05-26T00:00:00", "db": "CNVD", "id": "CNVD-2014-03244" }, { "date": "2018-10-30T00:00:00", "db": "VULHUB", "id": "VHN-71201" }, { "date": "2014-05-21T00:00:00", "db": "BID", "id": "67575" }, { "date": "2014-05-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002654" }, { "date": "2014-05-28T00:00:00", "db": "CNNVD", "id": "CNNVD-201405-482" }, { "date": "2024-11-21T02:07:44.867000", "db": "NVD", "id": "CVE-2014-3261" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201405-482" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Multiple NX-OS Products Smart Call Home Feature Buffer Overflow Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2014-03244" }, { "db": "BID", "id": "67575" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201405-482" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "908F8E5E-9BC4-4682-8C25-C07DB032A18B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "92F5E053-2C45-43F0-8A86-FB3C4C0B04E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6584DF3-E466-49BE-B4D8-3E249B7816F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "18DD763C-BBA6-48EC-9CFF-A5F0DEF85756", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*", "matchCriteriaId": "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cg-os:cg4:*:*:*:*:*:*:*", "matchCriteriaId": "CB8BB917-C330-4439-825A-3E05B69DDFF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cg-os:cg4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "788D020C-DFD1-43E5-A4FF-48E6003FEC0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:cgr_1120:-:*:*:*:*:*:*:*", "matchCriteriaId": "1119E8B9-53A3-4724-9EEB-F4A35F9F59E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:cgr_1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "4089B3FB-EC0D-408D-A75E-942E23BECB72", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F8C124BA-D5FC-422A-B3F4-AC1A41B7EEE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "F358E8D0-624B-412A-8726-B8AF96156317", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "17A4CE07-64FF-4C5C-81FF-A2388818CF7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFDC9595-39D4-4BF8-AF18-D27A500C9007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7241BFDB-6386-4CBE-ACFB-4599EDE9CB53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AF7CE90-9433-4E1D-A2AD-0B8854521CCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*", "matchCriteriaId": "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F8C124BA-D5FC-422A-B3F4-AC1A41B7EEE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "F358E8D0-624B-412A-8726-B8AF96156317", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "17A4CE07-64FF-4C5C-81FF-A2388818CF7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFDC9595-39D4-4BF8-AF18-D27A500C9007", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7241BFDB-6386-4CBE-ACFB-4599EDE9CB53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AF7CE90-9433-4E1D-A2AD-0B8854521CCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "171160E9-F6B8-4C8A-B086-431E3E2A27BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9CAFAE6E-8B64-4A1F-A7E4-2D4BDFB7D5B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "91C35886-CB9B-4477-9AB3-9F1C9E45E757", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F393BE8-8CC4-4302-829F-2C4F97BAC14B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u2\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE855B3E-B2B8-4EBA-8303-55F6A5A77E79", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "641D651A-B85B-4E9E-BE92-35AFAE8A63A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "7810F6FD-F58F-4121-9D30-8C5E3E163EFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "09C38DCD-2A5F-4095-ABA4-02E95D93C358", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u3\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "103A4C19-0E91-45FC-9AA2-F40215FCF63B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F61C03B-D7AB-468A-B092-158730FB3E0B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F883AA8-CC44-4440-AB30-D7AC29C242F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7390B4D2-2121-4311-A798-337E8B777A7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "924C6663-9EA0-4124-ACC6-0AFC649AEA6D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C559C83-FB34-4B1A-A6B3-1834D6CD022C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F422D53-4FF4-43FB-8F62-D53393A8C038", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)u5\\(1e\\):*:*:*:*:*:*:*", "matchCriteriaId": "7CFFFE88-17EA-4515-BF71-C0AB82957B21", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*", "matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5010p_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FD1E96B-1927-42DC-A47B-5632CED2D40F", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5020p_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "0737BA36-75AB-478D-9001-3DA3E49C6F00", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB68FC53-5CD6-445F-9BB5-1F3724D92A4B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322." }, { "lang": "es", "value": "Desbordamiento de buffer en la implementaci\u00f3n Smart Call Home en Cisco NX-OS on Fabric Interconnects en Cisco Unified Computing System 1.4 anterior a 1.4(1i), NX-OS 5.0 anterior a 5.0(3)U2(2) en dispositivos Nexus 3000, NX-OS 4.1 anterior a 4.1(2)E1(1l) en dispositivos Nexus 4000, NX-OS 5.x anterior a 5.1(3)N1(1) en dispositivos Nexus 5000, NX-OS 5.2 anterior a 5.2(3a) en dispositivos Nexus 7000 y CG-OS CG4 anterior a CG4(2) en Connected 1000 Connected Grid Routers permite a servidores SMTP remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una respuesta manipulada, tambi\u00e9n conocido como Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405 y CSCuf61322." } ], "id": "CVE-2014-3261", "lastModified": "2024-11-21T02:07:44.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-05-26T00:25:32.220", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "48926DA6-2020-4D4F-AD12-555163C6C352", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "161C5BDB-CD50-40C7-B972-A1B650607338", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "65FED959-8185-46B8-863E-1C29B2B6D729", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "5CAF2ADA-2C84-44EB-8893-0AB612AFF68F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "99F6A4FB-A7C4-48C8-AEE4-584DE5A7D57C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C3BE66A-77B5-4808-BFFC-26B6A77F048F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B6D70623-8F98-44CA-A589-B93B167F88EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "10AE58DE-C708-4C15-B2C4-2366F4378344", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "80510B23-1F02-4FE0-BF3D-E2CD2A5D5B2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "258F95C6-34C6-489D-95E0-5E90DAA518CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5F179FBC-22BE-4C44-AAE0-866F1D6B1270", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB17004B-E1FE-4BE6-89A3-43AC2D967000", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C628947-4A0E-4904-A6F7-745C3370A8F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F2ED90B-DDBA-49DE-AC78-20E7D77C8858", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "103597B4-C155-4809-BC90-DE52DA0A51D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "72EF4938-B50C-4149-8955-02B1871BF4CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "7EE1586F-E01C-4C4F-8284-1B1FE5370343", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "891D883E-8263-42B2-A978-49F6AEF4CD49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C059CCD-1BE1-4675-8388-0DB219C04E45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "67829CF9-FDCB-4A17-9241-1B48A38B1A74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0476865-D306-47B7-A84A-C163A316D9DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "7B3296D4-DA94-4E41-BAAF-CEC0E84BB498", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AAF1FF08-9455-45A8-A1D4-C96988F79987", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B582362-FCFB-4D94-9C0E-2B7FD3F5340E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "93FF6E77-B7C2-4CBB-A8FE-1D6218BA330C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "B6B1F984-396F-4468-99A4-93A0F0E4B170", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*", "matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "76DB8386-819B-47A5-93AC-9B15C16F2799", "versionEndIncluding": "4.1.\\(2\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB68FC53-5CD6-445F-9BB5-1F3724D92A4B", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "7C39522F-401B-4510-B8AD-B57D757D60AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "86A917F0-05BF-4F01-8DFC-685E65BF65C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F69DC16-8793-4A50-B901-2BDBE007405E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "392B8209-689D-4EFB-8B8E-04910EEB38AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8595D2-710F-4C09-BEA4-A3D81C2269A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6753978-267E-4398-A1F7-96C37B5C8600", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "16131960-37FE-4154-A82C-E3249B066DC4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD5537B6-54D4-40F1-98F4-D6E6AE91F203", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7DC4F29-94D4-4D71-9D40-CD1E6C6D5A91", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "1280802D-3B3B-401B-B6ED-2D940B9A94A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4B91092-DE54-4591-9C0F-A22A04AB71E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5FE1F177-8952-4ECE-9E7D-5DB17895148A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "D95D0F4E-944D-4AB8-B316-7842CB1F9C26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "7856BA8B-4959-4FC2-AF4F-747FCFCC8EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A402251-E36D-4DD1-8DE9-6DA025CBECEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3000:*:*:*:*:*:*:*:*", "matchCriteriaId": "61F9825B-DD64-4E38-9AE0-F87C210ADD9D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E6B488F6-FCDA-4A2A-9692-AC6568120833", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "234FD6A8-24D0-4F54-8E41-70E9575DCC77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A69202E-9600-4949-98F1-3037C8036B82", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "877676F4-566D-4C5A-946F-E22BA70865BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD10C022-06D6-4821-8BB1-928A04E705C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3230A799-F129-4ABE-8DA1-83595015FCE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4CB0C21-D8E6-4CBB-8F6F-33B02B5BB57C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E8C04C7-8314-4A7F-B7C0-7B17A4204419", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2BC263A-21FC-422C-A7E4-D1095263C4F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2CD13D1F-E83E-4D12-86BF-0260922BF4B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "F7FB359F-8290-475A-B58F-AD9CD96D77E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "09753461-A8FA-4C38-9402-FDEBC3978506", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "66429608-00EF-49A9-9621-FC801542F79D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "15EB553C-07E2-40C5-A741-788042174763", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "0959FD0A-24A2-48FB-A96D-C04FA0DF4992", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "91272DF0-CD4C-4ECD-92C4-357CB881B9C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFC4AE3C-FEBA-4EC3-AF7C-EE21400E26A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2A8C85D-ECAA-44E0-BE94-247EDB780895", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "487AD645-B95D-44C8-9B27-9651108F10A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA1702F4-816E-4045-80B6-2BC71DC344F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "C1AC8BC8-638A-4F73-A64B-B490675AA1A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "7F128DC9-C4CA-4547-B6C8-8E83A8C5F6C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "99FB6C32-CD16-41E9-AB42-A294424266DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "AD12220C-CA2A-468B-8348-EA5E85EE27F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "85225B18-034A-4E30-80CB-0CF62BCD923C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D9E0C2E-E44E-4B2D-B7EA-CFEA7BE092A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4A05AE9-050B-4B22-B668-B5250C853DE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9B8D6E3E-CE8F-4017-B0EE-DED343049A6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "A3C6D7B8-AD24-49FF-8CE2-CDE2EE43EDD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1310C94C-3777-46E7-86AA-EA6A3AEE1EDF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6DC9B19-881F-4899-A255-34D77F0561D1", "versionEndIncluding": "2.0\\(1x\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB67F2CC-67A3-42B0-A241-3BAB8EC52AC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.0\\(2k\\):*:*:*:*:*:*:*", "matchCriteriaId": "097EBEF0-8228-4034-93CC-F50226633D64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "75680C91-A1EF-4BE1-8D26-C4763E44A091", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.1\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "44E4A6EA-FFBE-41C9-9A99-135FB9C1AD3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "881A281B-F042-4662-973B-ECB9C536A0B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4CEC2A3-E00F-4DD9-A9A7-436131554733", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "AC29BA47-A40A-4666-BF60-7949406C56DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.2\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "0CB4EB98-5F8D-4BC1-813C-397B7E82E891", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E8C881B-CAAC-40AB-A9BF-93495BAFE56F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "20C079CC-34E2-4C8D-ABC9-6D76F4A22D73", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1n\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2FDBA01-AE8E-4B06-9A4E-71CB16D3C592", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1o\\):*:*:*:*:*:*:*", "matchCriteriaId": "765CC42E-FAC8-43D6-9B40-B8CF7272C4FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1p\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C0806ED-7F9C-4166-B47A-0381C215FF2D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1q\\):*:*:*:*:*:*:*", "matchCriteriaId": "76367743-6762-4C70-AFD7-4848E2FE3F61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1t\\):*:*:*:*:*:*:*", "matchCriteriaId": "4857DF36-804A-4B2B-B2AA-37E8A0036F65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1w\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B18FB5A-F569-413C-BA09-58C28EF9316C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.3\\(1y\\):*:*:*:*:*:*:*", "matchCriteriaId": "41EC377E-7DAD-4E6C-AC3F-215B6EAB05D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1j\\):*:*:*:*:*:*:*", "matchCriteriaId": "9BC44EDC-9AA3-4DAF-934E-5E36683EBAB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "469AF1BD-4F2B-4830-99DD-A51EB562B559", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3i\\):*:*:*:*:*:*:*", "matchCriteriaId": "B66B97A2-05E3-49B5-8CD7-9F85155AE911", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3l\\):*:*:*:*:*:*:*", "matchCriteriaId": "E23273C6-256C-4541-ACB9-54AF6C167694", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3m\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C863FFF-0BF7-40F2-B75C-FAFA7FCAF49A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3q\\):*:*:*:*:*:*:*", "matchCriteriaId": "8AAB9E22-6D0A-4894-83F1-A61412DEEF12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3s\\):*:*:*:*:*:*:*", "matchCriteriaId": "9234FFB6-7A06-44F5-8A66-2DCDBB750A85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3u\\):*:*:*:*:*:*:*", "matchCriteriaId": "F730CFA8-7D04-47FC-80D0-D9A9A96442BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(3y\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD8F5ECD-BEB9-450A-8588-C66DB1749191", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4f\\):*:*:*:*:*:*:*", "matchCriteriaId": "F587446E-72F2-476E-8122-417FBBE80803", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4g\\):*:*:*:*:*:*:*", "matchCriteriaId": "10359225-8D87-4B50-A431-4CF28A442431", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4i\\):*:*:*:*:*:*:*", "matchCriteriaId": "8B5E4EB6-2C64-4432-BEF7-125E6920F418", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4j\\):*:*:*:*:*:*:*", "matchCriteriaId": "963ABB73-9FBC-411A-9498-4279E0A922EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:1.4\\(4k\\):*:*:*:*:*:*:*", "matchCriteriaId": "4ECB9171-BDD8-4FAD-9930-1CE03AD3DACB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1q\\):*:*:*:*:*:*:*", "matchCriteriaId": "6B3C126B-3C93-4CB1-8AE5-875866119A43", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1s\\):*:*:*:*:*:*:*", "matchCriteriaId": "196AED55-BFF6-4EC3-9161-C06896E4B1C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1t\\):*:*:*:*:*:*:*", "matchCriteriaId": "6F4760A3-C8BE-4C7E-AC05-0ABEC8B57923", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:unified_computing_system_infrastructure_and_unified_computing_system_software:2.0\\(1w\\):*:*:*:*:*:*:*", "matchCriteriaId": "66EF9AAC-6C24-43EA-BF46-A6B36F9F830E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6120xp_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "908F8E5E-9BC4-4682-8C25-C07DB032A18B", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6140xp_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "92F5E053-2C45-43F0-8A86-FB3C4C0B04E0", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6248up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6584DF3-E466-49BE-B4D8-3E249B7816F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:cisco:unified_computing_system_6296up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "18DD763C-BBA6-48EC-9CFF-A5F0DEF85756", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:cg-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5E14C91-295A-452D-B563-70F1234C9941", "versionEndIncluding": "cg4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cg-os:cg1:*:*:*:*:*:*:*", "matchCriteriaId": "B4AB2D19-4750-43C4-B559-967C6C1653D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cg-os:cg2:*:*:*:*:*:*:*", "matchCriteriaId": "8962D4B2-32F8-4F16-B6E6-82B7275C0505", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:cg-os:cg3:*:*:*:*:*:*:*", "matchCriteriaId": "40AD8B81-C95A-45E1-BE3C-A47828F640E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:connected_grid_router_1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "626B9AAE-A20E-4685-894B-8DF9D2361FC3", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en la implementaci\u00f3n Cisco Discovery Protocol (CDP) de Cisco NX-OS en dispositivos Nexus 7000 y v4.x v5.x antes v5.2(4) y v6.x antes de v6.1(1), Nexus 5000 y 5500 v4.x v5.x antes de v5.1(3)N1(1), Nexus 4000 antes de v4.1(2)E1(1h), Nexus 3000 v5.x antes de v5.0(3)U3(1), Nexus 1000V v4.x antes de v4.2(1)SV1(5.1), MDS 9000 v4.x y v5.x antes v5.2(4), Unified Computing System (UCS) 6100 y 6200 antes v2.0(2m), y el Router conexi\u00f3n a la red (CGR) 1000 dispositivos antes CG4 (1) permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de paquetes CDP malformados, tambi\u00e9n conocido como Bug ID CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544 y CSCuf61275." } ], "id": "CVE-2013-1178", "lastModified": "2024-11-21T01:49:03.347", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-04-25T10:55:01.570", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2014-3261
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:35:57.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-05-24T01:57:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2014-3261", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the Smart Call Home implementation in Cisco NX-OS on Fabric Interconnects in Cisco Unified Computing System 1.4 before 1.4(1i), NX-OS 5.0 before 5.0(3)U2(2) on Nexus 3000 devices, NX-OS 4.1 before 4.1(2)E1(1l) on Nexus 4000 devices, NX-OS 5.x before 5.1(3)N1(1) on Nexus 5000 devices, NX-OS 5.2 before 5.2(3a) on Nexus 7000 devices, and CG-OS CG4 before CG4(2) on Connected 1000 Connected Grid Routers allows remote SMTP servers to execute arbitrary code via a crafted reply, aka Bug IDs CSCtk00695, CSCts56633, CSCts56632, CSCts56628, CSCug14405, and CSCuf61322." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140521 Multiple Vulnerabilities in Cisco NX-OS-Based Products", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140521-nxos" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2014-3261", "datePublished": "2014-05-24T01:00:00", "dateReserved": "2014-05-07T00:00:00", "dateUpdated": "2024-08-06T10:35:57.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1178
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti | vendor-advisory, x_refsource_CISCO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:49:20.703Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-04-25T10:00:00Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2013-1178", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20130424 Multiple Vulnerabilities in Cisco NX-OS-Based Products", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2013-1178", "datePublished": "2013-04-25T10:00:00Z", "dateReserved": "2013-01-11T00:00:00Z", "dateUpdated": "2024-09-17T00:17:30.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }