Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-1746 (GCVE-0-2019-1746)
Vulnerability from cvelistv5 – Published: 2019-03-27 23:45 – Updated: 2024-11-21 19:41| URL | Tags |
|---|---|
| https://tools.cisco.com/security/center/content/C… | vendor-advisoryx_refsource_CISCO |
| http://www.securityfocus.com/bid/107612 | vdb-entryx_refsource_BID |
| Vendor | Product | Version | |
|---|---|---|---|
| Cisco | Cisco IOS and IOS XE Software |
Affected:
3.2.0SG
Affected: 3.2.1SG Affected: 3.2.2SG Affected: 3.2.3SG Affected: 3.2.4SG Affected: 3.2.5SG Affected: 3.2.6SG Affected: 3.2.7SG Affected: 3.2.8SG Affected: 3.2.9SG Affected: 3.2.10SG Affected: 3.2.11SG Affected: 3.3.0SG Affected: 3.3.2SG Affected: 3.3.1SG Affected: 3.3.0XO Affected: 3.3.1XO Affected: 3.3.2XO Affected: 3.4.0SG Affected: 3.4.2SG Affected: 3.4.1SG Affected: 3.4.3SG Affected: 3.4.4SG Affected: 3.4.5SG Affected: 3.4.6SG Affected: 3.4.7SG Affected: 3.4.8SG Affected: 3.5.0E Affected: 3.5.1E Affected: 3.5.2E Affected: 3.5.3E Affected: 3.10.4S Affected: 3.12.0aS Affected: 3.6.0E Affected: 3.6.1E Affected: 3.6.0aE Affected: 3.6.0bE Affected: 3.6.2aE Affected: 3.6.2E Affected: 3.6.3E Affected: 3.6.4E Affected: 3.6.5E Affected: 3.6.6E Affected: 3.6.5aE Affected: 3.6.5bE Affected: 3.6.7E Affected: 3.6.8E Affected: 3.6.7aE Affected: 3.6.7bE Affected: 3.6.9E Affected: 3.6.10E Affected: 3.3.0SQ Affected: 3.3.1SQ Affected: 3.4.0SQ Affected: 3.4.1SQ Affected: 3.7.0E Affected: 3.7.1E Affected: 3.7.2E Affected: 3.7.3E Affected: 3.7.4E Affected: 3.7.5E Affected: 3.5.0SQ Affected: 3.5.1SQ Affected: 3.5.2SQ Affected: 3.5.3SQ Affected: 3.5.4SQ Affected: 3.5.5SQ Affected: 3.5.6SQ Affected: 3.5.7SQ Affected: 3.5.8SQ Affected: 3.16.1S Affected: 3.16.0bS Affected: 3.16.10S Affected: 3.8.0E Affected: 3.8.1E Affected: 3.8.2E Affected: 3.8.3E Affected: 3.8.4E Affected: 3.8.5E Affected: 3.8.5aE Affected: 3.8.6E Affected: 3.8.7E Affected: 3.9.0E Affected: 3.9.1E Affected: 3.9.2E Affected: 3.9.2bE Affected: 16.9.2h Affected: 3.10.0E Affected: 3.10.1E Affected: 3.10.0cE Affected: 3.10.1aE Affected: 3.10.1sE Affected: 16.12.1 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T18:28:42.410Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/107612"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-1746",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-21T18:59:52.919534Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-21T19:41:58.266Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS and IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.2.0SG"
},
{
"status": "affected",
"version": "3.2.1SG"
},
{
"status": "affected",
"version": "3.2.2SG"
},
{
"status": "affected",
"version": "3.2.3SG"
},
{
"status": "affected",
"version": "3.2.4SG"
},
{
"status": "affected",
"version": "3.2.5SG"
},
{
"status": "affected",
"version": "3.2.6SG"
},
{
"status": "affected",
"version": "3.2.7SG"
},
{
"status": "affected",
"version": "3.2.8SG"
},
{
"status": "affected",
"version": "3.2.9SG"
},
{
"status": "affected",
"version": "3.2.10SG"
},
{
"status": "affected",
"version": "3.2.11SG"
},
{
"status": "affected",
"version": "3.3.0SG"
},
{
"status": "affected",
"version": "3.3.2SG"
},
{
"status": "affected",
"version": "3.3.1SG"
},
{
"status": "affected",
"version": "3.3.0XO"
},
{
"status": "affected",
"version": "3.3.1XO"
},
{
"status": "affected",
"version": "3.3.2XO"
},
{
"status": "affected",
"version": "3.4.0SG"
},
{
"status": "affected",
"version": "3.4.2SG"
},
{
"status": "affected",
"version": "3.4.1SG"
},
{
"status": "affected",
"version": "3.4.3SG"
},
{
"status": "affected",
"version": "3.4.4SG"
},
{
"status": "affected",
"version": "3.4.5SG"
},
{
"status": "affected",
"version": "3.4.6SG"
},
{
"status": "affected",
"version": "3.4.7SG"
},
{
"status": "affected",
"version": "3.4.8SG"
},
{
"status": "affected",
"version": "3.5.0E"
},
{
"status": "affected",
"version": "3.5.1E"
},
{
"status": "affected",
"version": "3.5.2E"
},
{
"status": "affected",
"version": "3.5.3E"
},
{
"status": "affected",
"version": "3.10.4S"
},
{
"status": "affected",
"version": "3.12.0aS"
},
{
"status": "affected",
"version": "3.6.0E"
},
{
"status": "affected",
"version": "3.6.1E"
},
{
"status": "affected",
"version": "3.6.0aE"
},
{
"status": "affected",
"version": "3.6.0bE"
},
{
"status": "affected",
"version": "3.6.2aE"
},
{
"status": "affected",
"version": "3.6.2E"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.4E"
},
{
"status": "affected",
"version": "3.6.5E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5aE"
},
{
"status": "affected",
"version": "3.6.5bE"
},
{
"status": "affected",
"version": "3.6.7E"
},
{
"status": "affected",
"version": "3.6.8E"
},
{
"status": "affected",
"version": "3.6.7aE"
},
{
"status": "affected",
"version": "3.6.7bE"
},
{
"status": "affected",
"version": "3.6.9E"
},
{
"status": "affected",
"version": "3.6.10E"
},
{
"status": "affected",
"version": "3.3.0SQ"
},
{
"status": "affected",
"version": "3.3.1SQ"
},
{
"status": "affected",
"version": "3.4.0SQ"
},
{
"status": "affected",
"version": "3.4.1SQ"
},
{
"status": "affected",
"version": "3.7.0E"
},
{
"status": "affected",
"version": "3.7.1E"
},
{
"status": "affected",
"version": "3.7.2E"
},
{
"status": "affected",
"version": "3.7.3E"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.5.0SQ"
},
{
"status": "affected",
"version": "3.5.1SQ"
},
{
"status": "affected",
"version": "3.5.2SQ"
},
{
"status": "affected",
"version": "3.5.3SQ"
},
{
"status": "affected",
"version": "3.5.4SQ"
},
{
"status": "affected",
"version": "3.5.5SQ"
},
{
"status": "affected",
"version": "3.5.6SQ"
},
{
"status": "affected",
"version": "3.5.7SQ"
},
{
"status": "affected",
"version": "3.5.8SQ"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.0bS"
},
{
"status": "affected",
"version": "3.16.10S"
},
{
"status": "affected",
"version": "3.8.0E"
},
{
"status": "affected",
"version": "3.8.1E"
},
{
"status": "affected",
"version": "3.8.2E"
},
{
"status": "affected",
"version": "3.8.3E"
},
{
"status": "affected",
"version": "3.8.4E"
},
{
"status": "affected",
"version": "3.8.5E"
},
{
"status": "affected",
"version": "3.8.5aE"
},
{
"status": "affected",
"version": "3.8.6E"
},
{
"status": "affected",
"version": "3.8.7E"
},
{
"status": "affected",
"version": "3.9.0E"
},
{
"status": "affected",
"version": "3.9.1E"
},
{
"status": "affected",
"version": "3.9.2E"
},
{
"status": "affected",
"version": "3.9.2bE"
},
{
"status": "affected",
"version": "16.9.2h"
},
{
"status": "affected",
"version": "3.10.0E"
},
{
"status": "affected",
"version": "3.10.1E"
},
{
"status": "affected",
"version": "3.10.0cE"
},
{
"status": "affected",
"version": "3.10.1aE"
},
{
"status": "affected",
"version": "3.10.1sE"
},
{
"status": "affected",
"version": "16.12.1"
}
]
}
],
"datePublic": "2019-03-27T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-03-29T06:06:05.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/107612"
}
],
"source": {
"advisory": "cisco-sa-20190327-cmp-dos",
"defect": [
[
"CSCvj25068",
"CSCvj25124"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-03-27T16:00:00-0700",
"ID": "CVE-2019-1746",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE Software",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.2.0SG"
},
{
"version_affected": "=",
"version_value": "3.2.1SG"
},
{
"version_affected": "=",
"version_value": "3.2.2SG"
},
{
"version_affected": "=",
"version_value": "3.2.3SG"
},
{
"version_affected": "=",
"version_value": "3.2.4SG"
},
{
"version_affected": "=",
"version_value": "3.2.5SG"
},
{
"version_affected": "=",
"version_value": "3.2.6SG"
},
{
"version_affected": "=",
"version_value": "3.2.7SG"
},
{
"version_affected": "=",
"version_value": "3.2.8SG"
},
{
"version_affected": "=",
"version_value": "3.2.9SG"
},
{
"version_affected": "=",
"version_value": "3.2.10SG"
},
{
"version_affected": "=",
"version_value": "3.2.11SG"
},
{
"version_affected": "=",
"version_value": "3.3.0SG"
},
{
"version_affected": "=",
"version_value": "3.3.2SG"
},
{
"version_affected": "=",
"version_value": "3.3.1SG"
},
{
"version_affected": "=",
"version_value": "3.3.0XO"
},
{
"version_affected": "=",
"version_value": "3.3.1XO"
},
{
"version_affected": "=",
"version_value": "3.3.2XO"
},
{
"version_affected": "=",
"version_value": "3.4.0SG"
},
{
"version_affected": "=",
"version_value": "3.4.2SG"
},
{
"version_affected": "=",
"version_value": "3.4.1SG"
},
{
"version_affected": "=",
"version_value": "3.4.3SG"
},
{
"version_affected": "=",
"version_value": "3.4.4SG"
},
{
"version_affected": "=",
"version_value": "3.4.5SG"
},
{
"version_affected": "=",
"version_value": "3.4.6SG"
},
{
"version_affected": "=",
"version_value": "3.4.7SG"
},
{
"version_affected": "=",
"version_value": "3.4.8SG"
},
{
"version_affected": "=",
"version_value": "3.5.0E"
},
{
"version_affected": "=",
"version_value": "3.5.1E"
},
{
"version_affected": "=",
"version_value": "3.5.2E"
},
{
"version_affected": "=",
"version_value": "3.5.3E"
},
{
"version_affected": "=",
"version_value": "3.10.4S"
},
{
"version_affected": "=",
"version_value": "3.12.0aS"
},
{
"version_affected": "=",
"version_value": "3.6.0E"
},
{
"version_affected": "=",
"version_value": "3.6.1E"
},
{
"version_affected": "=",
"version_value": "3.6.0aE"
},
{
"version_affected": "=",
"version_value": "3.6.0bE"
},
{
"version_affected": "=",
"version_value": "3.6.2aE"
},
{
"version_affected": "=",
"version_value": "3.6.2E"
},
{
"version_affected": "=",
"version_value": "3.6.3E"
},
{
"version_affected": "=",
"version_value": "3.6.4E"
},
{
"version_affected": "=",
"version_value": "3.6.5E"
},
{
"version_affected": "=",
"version_value": "3.6.6E"
},
{
"version_affected": "=",
"version_value": "3.6.5aE"
},
{
"version_affected": "=",
"version_value": "3.6.5bE"
},
{
"version_affected": "=",
"version_value": "3.6.7E"
},
{
"version_affected": "=",
"version_value": "3.6.8E"
},
{
"version_affected": "=",
"version_value": "3.6.7aE"
},
{
"version_affected": "=",
"version_value": "3.6.7bE"
},
{
"version_affected": "=",
"version_value": "3.6.9E"
},
{
"version_affected": "=",
"version_value": "3.6.10E"
},
{
"version_affected": "=",
"version_value": "3.3.0SQ"
},
{
"version_affected": "=",
"version_value": "3.3.1SQ"
},
{
"version_affected": "=",
"version_value": "3.4.0SQ"
},
{
"version_affected": "=",
"version_value": "3.4.1SQ"
},
{
"version_affected": "=",
"version_value": "3.7.0E"
},
{
"version_affected": "=",
"version_value": "3.7.1E"
},
{
"version_affected": "=",
"version_value": "3.7.2E"
},
{
"version_affected": "=",
"version_value": "3.7.3E"
},
{
"version_affected": "=",
"version_value": "3.7.4E"
},
{
"version_affected": "=",
"version_value": "3.7.5E"
},
{
"version_affected": "=",
"version_value": "3.5.0SQ"
},
{
"version_affected": "=",
"version_value": "3.5.1SQ"
},
{
"version_affected": "=",
"version_value": "3.5.2SQ"
},
{
"version_affected": "=",
"version_value": "3.5.3SQ"
},
{
"version_affected": "=",
"version_value": "3.5.4SQ"
},
{
"version_affected": "=",
"version_value": "3.5.5SQ"
},
{
"version_affected": "=",
"version_value": "3.5.6SQ"
},
{
"version_affected": "=",
"version_value": "3.5.7SQ"
},
{
"version_affected": "=",
"version_value": "3.5.8SQ"
},
{
"version_affected": "=",
"version_value": "3.16.1S"
},
{
"version_affected": "=",
"version_value": "3.16.0bS"
},
{
"version_affected": "=",
"version_value": "3.16.10S"
},
{
"version_affected": "=",
"version_value": "3.8.0E"
},
{
"version_affected": "=",
"version_value": "3.8.1E"
},
{
"version_affected": "=",
"version_value": "3.8.2E"
},
{
"version_affected": "=",
"version_value": "3.8.3E"
},
{
"version_affected": "=",
"version_value": "3.8.4E"
},
{
"version_affected": "=",
"version_value": "3.8.5E"
},
{
"version_affected": "=",
"version_value": "3.8.5aE"
},
{
"version_affected": "=",
"version_value": "3.8.6E"
},
{
"version_affected": "=",
"version_value": "3.8.7E"
},
{
"version_affected": "=",
"version_value": "3.9.0E"
},
{
"version_affected": "=",
"version_value": "3.9.1E"
},
{
"version_affected": "=",
"version_value": "3.9.2E"
},
{
"version_affected": "=",
"version_value": "3.9.2bE"
},
{
"version_affected": "=",
"version_value": "16.9.2h"
},
{
"version_affected": "=",
"version_value": "3.10.0E"
},
{
"version_affected": "=",
"version_value": "3.10.1E"
},
{
"version_affected": "=",
"version_value": "3.10.0cE"
},
{
"version_affected": "=",
"version_value": "3.10.1aE"
},
{
"version_affected": "=",
"version_value": "3.10.1sE"
},
{
"version_affected": "=",
"version_value": "16.12.1"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "7.4",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107612"
}
]
},
"source": {
"advisory": "cisco-sa-20190327-cmp-dos",
"defect": [
[
"CSCvj25068",
"CSCvj25124"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2019-1746",
"datePublished": "2019-03-27T23:45:13.618Z",
"dateReserved": "2018-12-06T00:00:00.000Z",
"dateUpdated": "2024-11-21T19:41:58.266Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-1746",
"date": "2026-05-21",
"epss": "0.00145",
"percentile": "0.34458"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1168DD8-4DF7-4A2B-B080-D267BF815F40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCEF5EBB-226A-4E8F-A78D-9C1754F1FBC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3316587B-3BCE-4F4A-8835-BDC12A7F12F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"148C0902-66C4-4952-8319-40B8B145A901\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1037D61F-BDE2-4956-9B27-25FD5408F1A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CC077AA-909C-4344-B5A9-F71FBCC34B97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)ea1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09C8E9BF-1C07-47FE-8F98-ED5960D302FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)ea1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F299684D-4676-4810-9BC3-1E28DF75E776\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EDCAFA73-B3F1-4527-8D7B-9B1B8263B50C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7201D2F-08A9-4E13-A294-5987D6B8775D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94824D7A-6CCE-4ACC-A48B-D8AA7E6518C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF711F3A-63A1-470F-927C-7EE5176B3F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2465A016-415C-4EE9-9DEC-B71C3EDC0BC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91195861-AC53-4468-B1BB-3144A6F3CB3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0690F55-8755-40F4-A2C1-34335ACDEBAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C20A694-A84E-47F4-ACCA-BF6AC9C2BF8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9944C77A-16EF-4908-930A-5B6C47BA897D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC069569-859C-41DB-93FE-57E8B3F2EBCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1B7978F-4C1F-4F96-AF73-D5A1AC94F2FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B39BBB71-C9BF-4566-8CCB-E613DE4AB06D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17B63153-D51A-40AE-887B-CC9362263602\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)az:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67B8FCAC-27A3-4AA4-9A28-9FE526EE52E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1229A52-54B6-478F-A419-8D0340336BF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"548C1020-E629-4F47-B8D2-AFBF77EC01DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)ea1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0688FE12-857D-4654-A778-CB836402DFC4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9CC3D006-6C20-43B9-9100-E427895AA3F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D670129B-4D75-4E55-91B3-126BD8A53722\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41768F22-7164-458E-8753-9B89BEDBAFBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CFDD737-B7D0-45A0-A6D6-3494FE8B777B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1d:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B0CE611-2E4D-454D-A247-18744A6E74E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4041EB0-F402-4C01-9337-212E3E461AF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00388B56-F514-4A9F-95FE-1D8239BE1EF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F846F7FF-3ECE-4390-B0F2-50B5AFCD568F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60A56097-E614-4FE2-AA09-3FC5EDDB0170\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26B2BF3F-8B92-41BC-946F-E0BBEC874257\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A640A1B7-8A59-43A6-8675-7E95FACF7A7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea1b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76B7F08A-15D1-4194-B476-E528B6AF8198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B46F396D-2A00-4DB3-9BDE-F2291E7782BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB440BC6-9FC8-4EFD-B05E-3F5A5A68F8EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CF4A473-C851-4D2F-A22E-66A267A1BDB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DD4687F-D78C-41C8-B2B8-D140813A8619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"052CBE3E-F871-4AFC-8DBB-E6783A5D7B17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB8C33CF-9FD2-4DC5-B69C-0C8E0C6A987F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DFF09A6-DE59-4CBF-AF02-DF2862C05D1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea6a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA39450E-25BE-40CA-B419-D939C3D39832\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA069FDD-BC7C-4C61-955F-F6F2179091ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E74792B-0E3E-45E1-B86E-34233330EB23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea8a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEE3D38F-5DD5-44C5-BB38-571F81B1BC82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8EA5D0F6-810F-40E0-8CAE-3B01C13CC857\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB63B163-E48F-4D40-BD9F-518F24B27C01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea10a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EDFB452-63BA-44AD-9972-7CCF43D0F730\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea10b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C72D3246-8E14-4A27-8A9B-2A1572849966\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFB7FAC8-DD25-4C24-8AF1-F2B97ACB722C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6761711F-AD6C-4844-9DCD-D2827FA0CDF5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2EC151E-DA5A-4695-A0EB-1C46C4F42FB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E457AF5B-637A-45B1-92FA-FC4096B8C912\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(6\\\\)i1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEAFD220-48D7-46EE-8537-A69C5F8D0F2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6D9BA55-F193-4BCA-ACC2-BBC892E9D7E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46974023-379B-4475-A59F-BD340043CFAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D71C21E1-BC04-4537-B64D-76492F282B76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF5C9424-067B-4604-A197-478D4BFE72F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01CC34CD-3004-4EA3-9DD1-E9CA0E2336E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F228FB3-0015-456A-A49C-7B1284F641B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A99F0772-C2C0-4356-896C-30ED62B7887E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D0E67EE-AF42-4B53-B70A-45562CE164D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B086B50F-03C8-4C5C-8D4D-37EA33C6D7C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5783901-D472-4DA3-B836-45704F3A6A20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E39ABB80-0A2C-4B9F-BD62-59863BC2E451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A77C844-EAF8-497E-820F-EF2A87451319\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E319ADC-C636-4933-BD50-B613677AD4C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5E052D7-9811-416F-A5AA-7DB2DC8B9F71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"522425D5-1EFE-4F07-88FE-9EE4376D7171\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"145A21CA-3E35-4F73-9451-72EF1265ECA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47186E81-9EAD-4AD6-B888-F1F94C2EA128\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0F08381-956E-4E97-8226-6EDC66C281D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A211E02C-BF5F-4587-8416-7A3F15E1920B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54CCAA24-53BB-4998-B986-358701A8A8F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B2560DA-E091-4344-A7D0-9BEEB6998AC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7A526C3-8B1F-44BB-BCEE-C3D8140CDF3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D12B5F13-392E-4BE0-AFC0-BAB2E989A08F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10151339-0261-4F5D-9601-F048C0B70908\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2498113D-65B7-4144-AD1C-9FCB6534B7BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84685E46-066D-42B4-8800-7D529AFC4FAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s2a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C712A3E4-388E-4B58-B079-D67E4FA0D729\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C96B72B0-0F9E-44AC-870E-84DC484173E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99299759-15D1-4BEB-95D3-8D53C27674A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s4a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A525BF43-E098-47DC-A32C-1A43B0F810D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C74A6F1-1A75-4D57-BDAA-68110CE604B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3290C7D-BB60-4095-BBFF-0484C1FEA071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFA74FF4-FD5B-4EE9-969F-93EAC73D89B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D273495-EA24-4D04-BA90-710B22B4C003\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6742F7A-F4AC-49AB-954B-1595F7ECBD1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEA90AE6-0BC8-442E-81F3-49E6C8D71F72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"692B182F-4E9A-41C0-B254-0B0362A7B726\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(22\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B20E6F8-5E33-4F24-BB8B-8B61E39C01E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ew:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77CF347D-F8D5-4D3D-AF23-E89A8C77AC46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"878773DC-1360-4608-AB17-0081B33B11F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C2B085A-57AF-4A84-A354-166E61B5CAF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C181E469-32B1-48AD-86F2-63AA790C5EEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A35979BE-B33F-4709-8B36-FB8297E321FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66130668-1107-42B3-BFAF-5640D3AC7595\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0333A54-6370-4327-BF38-B873F3AC6615\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27CF87CF-3EC9-46C0-A98C-25F6055A3E5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7A93F44-8924-4787-AF35-4D6937B87086\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABADA146-ACE1-4CE0-8CD3-A3F25EEAA3E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"216D7B37-0925-4A83-980D-2145B00793BE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"856842DE-6995-4CB5-A500-6D851BBF3DC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"862661A6-07AC-4FD3-B84C-977F66EDE29E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30806B3-C98C-4D4B-AF11-0743EBB5B50B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CF3B7A3-F63F-472D-87D8-5EB767E0DE4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"18937501-09CF-48AC-A4FD-7ADE162BEF99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C22E4042-3628-4A7E-BD93-1F3F282F9E14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99EC3F33-4A8D-46CE-A5FC-913E03F6DEBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A84C2CA8-1BA4-4899-9AFF-443FBC5003D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B5E50CF-9084-459B-AFE5-5E0C63E17AB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7F9FC27-5954-4374-BE61-E0E563A0DD11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ez:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFC9A8EF-FE37-42CB-A33F-4B6AF29A8827\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ez1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0C9F1F1-EA5E-4921-A862-06304CE55C4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)fx:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8508A0FF-D18D-430C-9A26-6B5BBFD7DF70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)fy:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"393A274B-BAA4-46F3-BC35-BE697B96A684\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)fz:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AD274CE-D174-471A-8423-02F33F63B574\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA143186-1E3B-4B5F-A5FD-AE90A2664AFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A4912CA3-2311-4D0F-8767-6815F43BE645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC91248E-CE91-4BAA-B52B-4AB77AAF77B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36953AD6-CE36-480E-8679-DE5EEBCC5A26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F26D07A7-41E4-4768-AE14-8E0604BAF0C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C1685F6-181F-41AA-8C6A-9038388C9963\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F83F949-8F27-4FF7-A586-BDCDAA52B2EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F571ECA8-0AB1-4BC0-A6AE-06BAE1FD2375\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6F402D2-7DCE-4D22-BA71-ADB3622058D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E67F0D3-5722-49F3-80FA-8BA7292C085D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA79BC8E-753F-4245-9885-A7A2733E4013\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B820873-78DF-401B-8A99-EB1F115FED35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sec:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA4A5F6D-CEEC-4BBF-9E4A-2D3B1D148371\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sec1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86F88317-18BE-4484-A027-D69500937799\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sec2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF6CCDEE-0D38-4C6B-82D8-CDE5067CC704\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sed:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C342FEA-F2AC-4E0C-946E-1F7DB2994D14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sed1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82284ED7-CA08-447E-8EA7-FCD33D500BBB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0C112D4-820D-4BFD-AD59-4957E7D5FDF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1EAF282-5537-4836-BC54-BB7EA023BF35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF228683-2C83-477B-904E-54E1446928A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74DDE240-25BC-40F0-B8F4-D2D94389C08F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"359E5A44-2CE6-463A-B9A4-C8BE21491D15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sef:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91100DDF-D654-479A-A773-2F31AF0F2516\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sef1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA38F4E3-5D3B-46B1-A6E8-8E0B02B0F52A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sef2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"845B3CC7-E49B-45B0-BE89-05135A97A39D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sef3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E729850A-5D31-4332-AC37-C9442B7CB795\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B69AF0E-CF4D-417F-9E5A-B8540FAB2EA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"768A5932-EEF1-4A39-A054-CA54DE4CAC94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seg3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0E87B20-EF04-476D-829A-6F1433DD9854\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B142BAA-613A-40F8-9FD2-EB081867B3F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A632D64-8E99-496A-8DE7-4A2458D1D7E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48263C15-99F4-424D-AE45-F3A17E291F7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0048C46A-BC09-4958-B4FB-EA69B25E4EAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA202662-DD3B-44BD-A6A0-F31056A85759\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(27\\\\)sbk9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BE7AFD4-966B-4F15-9C57-C3B2D0CF3781\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B752C842-B50D-4BE9-93E6-CAD0560B679E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD4ECB0B-62BD-4429-BF35-9ECBDAC952E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sg2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A46E63C-D7D4-47ED-8C83-E7EBA5B17A62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sg3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"616C69BF-7431-4D40-BD31-929D4CE8C7EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"940F55CA-49E2-4353-9714-BA6A86D9DD66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"703C31A0-4E23-4D3E-9764-4A43A55AEDF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B6B1A28-415B-4AA9-8CAF-2552B64D79C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE45B81D-7F63-41ED-A163-0103A702023C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEB656D5-1D86-4D3C-9A1B-92E6CE404E51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE955775-49ED-4495-A70A-2C1315E95D58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C88AF23-D873-4723-908D-E2898E9ED3E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9A57EC0-6DE8-4552-BAC6-EB173D84AFCB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F81076A-6583-4184-B8FE-1544792BCA74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"329678E4-D593-4E96-A33B-E8DBF87730E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"052091E6-A3E9-4E90-BBD5-1E0ED25998E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0AD7780-0194-47E9-980C-35215DFFD198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF116D8B-2C19-402A-9733-540CF79D80A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC2A4B06-3E30-4633-9D9F-07AD91ED4281\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A35F3267-6978-4816-8DBC-2C7E2CFEE35A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AF7FB11-5610-4EDC-8F08-4FF5EF0182E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD3B4F88-99E5-4C1F-A160-821B3A99F0B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68AA7812-D193-4AE1-82F2-BDAD51929D63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9545967F-C55D-48A4-B70A-3E9B2D7E1617\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98DBB5F7-D105-4F8E-B144-C392D3FC6AAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D97AB797-74DB-4414-B895-8D3403CF0334\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A503C16-2719-435C-9CCE-B9743A42E9A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77A73E2A-287A-48A0-90F2-9AA2DCC8595D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)ex1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C93174C2-4F87-42DF-856C-E9938DBC4DF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)ex2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A199EA0-3C40-4AB4-B67B-B4E0DA3E2512\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)ex3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F10924FB-9326-4EE2-B6FD-37011A2C2E9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1DB20CD-004C-478C-B19C-48D7C0B6FE3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3E6E66F-D0F2-4CF7-AB96-D6DB38746972\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64D15762-83B5-40AB-8832-F8B5EE1D789D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25BCC700-7375-477C-9585-16DF7AC3852A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA49B682-E7ED-44CE-906C-9DD9D183583C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E632468F-4B62-4937-8CA6-5B8023451F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C853E612-2C4B-4595-AD6F-22E34B68C69A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC3E6D9B-BCC6-452A-8420-87E601B74949\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA609E08-3369-4359-B126-19A54D537C42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15085505-6E63-40B7-9F71-7BF6F965FBD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71ADE6DE-5C2A-4D34-BE8B-A6ADEC61246E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43710D33-1685-4EA9-948F-2B79122C4A0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DE43284-9902-4701-916A-FF10AE966842\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"859A0347-C043-41F4-B2CC-EC54E36A81A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA011033-D263-4D47-8F33-844DB9C0B6B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14FBF27D-7288-4251-9846-064AAD6E6AB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7988103E-FEC8-4F3D-AB7C-645C0D5070EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)sq2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0888AE6-9FC0-4927-B74F-65711EDB4DE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAA8E712-36F0-43EF-AED9-BDE4EA6CD6FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BA61004-EC61-4E03-A2FC-DAEBD5E10F49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9E61C16-55F9-4054-8CC2-38D5197A1FDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49E8D759-07E9-49DB-B8EB-A9C06A8D8031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C923698-3017-49B8-9DAF-98584CE0402C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADBCA495-DD1B-473F-B1FD-D8EA414497EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7EF0685-7BEF-4F84-902C-DFE533CD2F34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F114FD7-F62C-4A24-9CE6-C9A7136465F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"892F72BE-B65F-4271-9042-3B459DFBB43C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7715D0D0-E8B2-444A-A590-7B5B0BFA713F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B526DE1-EEA7-47E4-B291-09C02F018A16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A00F4FE4-769F-4268-A623-DD56F12D7F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D97983D5-B4D4-4A69-8573-A978EF9F8859\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CFC6E74-0AAA-4CB4-B119-30ED3DB95749\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80B33EF2-3157-457D-BB77-CE99C9F02A17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2477EEC8-93F2-45D2-AFF6-8D83AE5195B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2570C01-A377-421E-B2A1-EC05A87DC684\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6B7D11D-1C92-4369-A446-2CC58AEC70D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BF19E91-370E-4F3E-A6ED-778A0493912F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"072FFEF0-72C9-4C19-8A3B-9633DDCA24E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46AE17A1-7FC7-4197-825C-92B32AC64D82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00328248-72C7-4646-9312-5EAA7FE0D41E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5535D673-8DF3-4737-A531-E7B28C419235\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5D97E83-3091-4E46-818C-503D7D1F9D1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE109462-C870-4C66-A7AE-B1ADED3B8DDB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14D0156C-3153-4A64-8491-A6A1B60FE5CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C075F42D-27C1-46A2-893A-5C0D9BE13861\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AF11222-0EA2-4E6B-B6DC-D16FCFEDE807\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE0BE6E0-3D82-4B2A-9B4B-C50021F0687A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)ex1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD063290-8E11-43E3-B55E-411551074C60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5898745E-C1D3-4D0E-8476-2EEAA4327B5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"887C5632-F3F7-4EDB-A065-D81F64A9B15C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD397982-87E8-46CF-95A5-61435849D02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B648C2EF-489B-4F62-B898-110A09794810\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41DADD4F-B761-406B-8BF1-A7AF0C6896D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)ez:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9600F1FE-17F6-4F6D-886A-ED95FEA9A3D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17356A3C-0C05-46A7-89EF-A2C48DDEC4A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE5C5C5D-B40A-4DD6-A10C-C8713CCF2E12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE68EAC3-05F4-46C5-8A48-4ECFF1844BBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5D896F9-9E25-464F-B6C5-55A2DD38CC44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FF566A3-331A-4A8A-9EEF-D1FBF71BF4C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0623C531-CFF1-4C45-B8A7-BCF2C4678222\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"794B72BB-52D0-4307-8A61-73AA2477885A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E66D10-84F4-486D-BFAF-B7D4AE2E5583\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C364500B-B7B0-47CC-9277-8D43BAB6E6D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0B797B2-6AB2-4946-88C0-12D71258CCE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F12B9DA7-28C4-4584-A548-6B06874F9C00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD0C66F2-D158-497D-8683-2264F58A33B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CE361F3-BA5B-453C-A58C-6E8CB84BC101\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C55E31F-B291-4FE9-81FB-A91E95323863\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83184158-7C5F-4294-895E-7CF5B76A0F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A081B105-AD3F-4529-B3E7-D8B0851C83B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3142DA6-0FA9-4CEC-95FC-938AFD944BAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)wo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1644E8D2-E3F2-4ACB-A0D0-F374B565D121\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC24BF9-DCD1-4974-A2C7-654E9B469C1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA6F8F86-8C63-4A29-A384-62A849848EE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ex1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19D89B24-5DE1-4E15-B539-EC3FF6BA0658\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ex2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87760068-4255-4D18-A62D-FDC156F7A654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ex3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8AF551C-1482-489C-AC4B-DF3E9BBB0F73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"904C4D5C-F603-42CE-9CAD-28B01223452B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ez:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06D0BBED-E68E-43B7-93F5-FC5DEE7BEB41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63C5C43F-67A3-4000-845E-FDA620AD1B90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"565F3777-89E2-4159-9D8E-629EB7A56837\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD7C3DF8-2B59-41EB-A151-15E46348DF9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"700DDE2E-922C-426F-8751-BADD15055AD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D6CA171-4BE2-4204-BDAB-EA19BCD4842A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84766AF1-DC74-4D64-A4E1-56B377D6CE48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D4A0517-EF86-4655-B4B4-246ED3A84803\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0E3912E-11F7-421B-A5C4-35568A6E386B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"360F3E49-D75A-4ACE-B775-14055272C861\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5362C676-5002-4ABC-9C60-97D4B65A399D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D14EB41-CD6A-483A-8F68-9072E436807D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC201905-7DBF-4E2B-B732-62641F51C170\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"377669B9-952D-4527-9C24-E6713E749C1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AABCE40E-04D5-4248-A374-EAB938575C2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)ez:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7ABC42E8-E304-4D00-8C6C-604F3EE13DF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9D38633-31AE-42E9-8FFA-77C8EFA9AABB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6D6D9CC-70F0-475C-8AB0-48980596BE47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BEECEF97-EC6A-43C8-A7AB-5C48948183FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(60\\\\)ez4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D593974-6D7B-4AF8-85B2-A77D8BE5CD6F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.2\\\\(60\\\\)ez5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7B4BFC4-F2C9-4D5E-AD22-3AAF36CFB12A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:12.4\\\\(25e\\\\)jaz1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81CA75FF-8C2E-4D9C-BE57-34EF801C28D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AF55C0A-768F-445A-AF40-2B553363AF18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"971AAF00-63AA-4B3F-8E0F-B8FBD011C071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"551A0087-5926-46AF-B1DA-3AA18FAB87E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E19A2402-F662-4900-8137-B14EB2537173\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5757C194-AF18-434C-9F19-2FC775720556\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28722F17-AF23-4435-AF9B-996798ACF2C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)xo1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"587450DF-77E4-4320-9191-383EBE5A6CB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ej:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C5D50E8-99DB-4B15-B0F2-84674A9346A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ej1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A101303-CFB2-4EF9-AD68-AF6D8E1E8148\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C965E814-7ABE-4C45-8EA8-B6818BC213F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4556022D-5B0C-4F7A-868C-9EC01F716D16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7760B1FF-BC56-49F4-8020-439EA2F53AC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49229E8B-19ED-4E5E-AA2E-F699C033F4A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9A4AC61-4386-4218-91B7-6CE776D8050B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59403A6B-3488-4F81-BE3C-A06AF1731B99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"796E5094-9A88-42E2-949B-D6D59651F04B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8EBCA86-C027-4514-A2A9-613899FD9A01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02ABF12A-78BD-459D-BF53-065A56C385AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D15A929-0C2B-4C3D-99E4-0E7D46217216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D00EB0E-92D3-4C5B-B107-730B47BD6E01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF7F6A52-9AA9-4441-A137-7EE3470C155C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"92CEEA13-0B40-4203-8BAE-09374C9B1FE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6CA27BF-13BC-4C13-A049-FA50247ACE9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82C8B101-CB42-43CF-98CE-44EE5FBC9BF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"054583DC-AAF8-4BF0-AC13-5A488476C161\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ez:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8422A740-0029-4C05-A7FE-12F12CD73B0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A9B13E-8CF7-4879-8C33-8E690291335F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A634C47-2FD6-4106-86B6-DD465A5394E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05DDA3F8-7207-4FC9-B491-F49418975D5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D09AEBD6-56E7-4D22-B300-C904464FE75F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97525468-9E3E-4E34-8319-B4DFB51BC4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"611A649F-161B-4683-98D5-4C8150838039\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F414ABC6-B95C-48ED-BC15-817356248776\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"137D26AB-CA68-4CBC-91E8-8C0901D5BF19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se10a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"343F5C35-A0C0-4747-95BA-D4044C64508B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"713C55A8-F24D-45FE-88AA-1D1EFEC88339\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11F7D280-D099-495F-B860-D96F485BAF81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B62A7038-EBCF-4996-8795-3BF95CBDE6B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"815EAC82-48B1-47A2-80D7-8CEE806E4B9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F68B4687-CC90-45D8-989D-8DF38940C8A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F755B9BE-3DF6-49AE-847E-F74B696A49A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAF429A0-4A54-48FA-B69B-D34898E987EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A867AA1-E46F-4027-A41B-6AE1A27EB2F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4EF4082D-8F3E-4274-83DD-431E99C395B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"230ACE85-877C-45D7-A2A9-0085C421292A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D37BA5F4-9D5C-4D92-A6D3-055B79049719\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ED6E6E2-AB47-442C-93B9-DEBA9D124B31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3CC7F08-343B-40CC-9D03-81EE4924D6C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31444A2D-BBF0-4D6A-A898-5EC4E782CC43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D39E1ED-2F67-4116-9BF5-44CA8EF9A016\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"729613AF-4C56-4514-9ECD-6A466C278E0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"368F2F9E-FD52-4A74-8378-DF246252B745\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E452976-8876-40D7-8880-29197DB5457A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCE5C762-5329-47E9-8D0C-C0A546AC24CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D93F335-8058-45BA-8653-9F3E4A5FA28E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF152F35-32C6-4C2A-BC91-90AAE442F239\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2a\\\\)ex5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CD47CBD-A833-4CD0-A62C-22FBB7A4244D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.0\\\\(2a\\\\)se9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BC9108D-B313-4C07-A9E3-5C2591304919\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(1\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8A89C06-8384-4B23-8D3A-293C9035FC73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(1\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94836415-1A1D-4DC2-BDAF-BE5B06EA5C18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(1\\\\)sg2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"00B7F513-E991-47A4-A96B-2EB90B15D197\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4E5F22B-2CD3-4A14-AB2B-E039CF001140\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15102BA5-E96F-468C-8F8E-4F8F9E947533\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1F481FC-D16B-461C-BCBB-D58B58D1647D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42D47483-F300-4224-86B2-6FBEFA35EE63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC9E74C5-4BF5-4F29-938F-3E71784F08AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2963A4BD-1414-40CA-A949-9CE61B3C61C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A6C5B60-9524-4A5A-A8CA-3C18730E18F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0B09C15-62E9-4278-806C-03D47B75E336\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg8a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFFA4F2A-4BE5-4FD5-A3D4-2B28D6A25A53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sy15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACE1712A-1A44-4BD1-B114-318D4EC4977A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)mra3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C71593C6-B365-47D2-958D-A99FFB64101A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svk4b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C5BF4FA-139A-4789-A9C1-84B6DEFFD300\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svk4c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"009E4B3F-4384-4DBD-9D88-0A191BB92C6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svo2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B853917E-D8E2-4CBD-BB4F-CB447BE052F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svp1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82784B3A-A4EA-4BBE-9ACE-BAE4895372CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B725B7-AFBB-4F0D-87BA-38477E250374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CBD931B-9D7F-452A-A567-60ED7EA1D2B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)ey:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D601E90-6F2A-4C66-97A2-152031C88DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3A156FE-590E-49DB-819D-4103D629829D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F6C767-042C-4277-90F4-F81D9AFFF227\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D33DB919-4F82-43C6-830A-A9D4FC043B42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"72782F95-948D-489B-A19A-9DAB825DFE4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F904CD0-8609-47F7-988C-613DE26BDBB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC3A39FE-69F6-4BB9-A9CE-D516A3802538\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB9B7058-3467-4CCE-B9A4-71CF8143FEC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90447919-CC40-4CA5-A488-2FCF0F25ABE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEF74559-F418-48EA-9CA7-A9574CAFC97E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5A1ADB8-DF62-4CB6-8075-2F0956BB0126\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB0F2B2A-F273-4166-826F-88B54A480BB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"194D54FC-F399-4C86-AE04-FB3FD828DDA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F98E150B-C806-4CF6-83EC-0C16A44F3EFB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1C85E0E-A920-4501-AC23-0F7534CF88EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50CB7858-C857-41E2-9E5D-9368EEC2825E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10438F4B-281D-4C2F-B4C3-DC3D47B0033A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"681E360E-2287-4BE7-8228-77C235DFA901\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81800178-449A-4B61-9611-5FB2FC4DBC75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7316ED4-FABD-49E0-AA21-394D327435F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24A56EF3-4E88-4220-846A-A9BE1E496311\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)sc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B29CAEE-A01B-4156-A871-43F3CC90ECB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)sc3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6879F438-0A0E-460C-A52F-3EE2F0EC2C3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)sc4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A925CDF2-3A2E-499C-B38F-1D086534F11E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C846C74-7644-4DAB-A4B8-B33464EBE92E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5DDB0B25-95E0-4796-A56F-1A59EF7EA283\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(2b\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0687FD87-BAED-4776-9B94-3C9EA7CCE79A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB214EAE-AEB7-4359-AD8C-86CCC080EF96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"757000B2-A8EB-464A-9A2D-EC4D920A0569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B42618DF-F118-41A7-96E5-24C229DA020E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26F6FC68-BF4A-4511-8B46-A93C81E349B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7582DA8C-2360-4E8C-90F8-6194F269CD1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94FD5120-C385-4F16-AB3F-979D851DF8D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3a\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"260E5F96-48DB-41C4-B45E-5BE0367DD7E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3m\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA06788C-E529-4024-9565-EAF5D90D68C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3m\\\\)e7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96274788-A5AC-4740-A915-C381593203C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(3m\\\\)e8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FD15D65-9471-4755-9EDB-04ECF34DFD8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80114F8D-320D-41FF-ADD3-729E250A8CD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"879C4495-3B26-4370-8708-16F5002E37CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8C2BB1F-79DF-4471-B75F-C22CEBB5380F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F5A55B3-49E4-4C48-B942-4816504BAA30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e5a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5BDAB63-EA0E-486D-B146-7E0060F70066\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62AADD63-CEA3-461B-94EA-0CDAB4A2ED00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB704746-C27B-4C6B-948C-B8C0A3F40782\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BBF92BEC-AA46-46DF-8C1E-956F3E506E69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C226FE9-61A0-4873-B277-1B8ADB397B32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD5BD905-75C3-47AE-8D19-6225BD808B37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56DE452A-6852-4879-9187-8A152E6E260E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD3047E4-BCC3-41A7-9DCD-15C25D14EC44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7785E177-C04E-4170-9C35-B4259D14EA85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CAE727E-E552-4222-8FF0-6146A813BDEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7850295-C728-4448-ABA7-D01397DBBE5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65589A68-58A4-4BD4-8A26-C629AE610953\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8A64C8F-6380-47CA-8116-E3438B953F84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jaz1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D4358B9-F3DB-46AC-A3A8-114E25F676DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jn1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B171170-4BBD-4E09-BF5A-6DA3F110C7D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4a\\\\)ea5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"734AA8D5-5BB9-4E1D-B8CB-0A14BADA9EF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4m\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F65F813B-C080-4028-8E1E-A81827917DD4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4m\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ABBCE48-B9D1-4EFB-BF64-CF30F5294EB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4m\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D54D10E-D94E-4731-9988-4EC1786FF4E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4n\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4DC02AA6-E046-4EC9-9FFB-8B2C76FBE027\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4o\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A2BB34B-D902-4064-BADC-56B5379E92CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4o\\\\)e3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"55D0A0A2-DB62-4C92-9877-CF8CA01B1A10\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4p\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2316E962-6C56-4F45-9575-274506B9D4C6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4q\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42D3DFE3-7576-4D56-ABD2-425C28B56960\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4s\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A39AFD5E-8FCA-4EC6-9472-FD208CB2A555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(4s\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D249815-5A8A-40E4-A943-6AB1A2250CDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F112DE64-0042-4FB9-945D-3107468193E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E027FB12-862F-413E-AA2B-4BBD90AE3650\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD28874B-148A-4299-9AA1-67A550B25F8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45B80CBC-961F-4EE8-A998-C0A827151EDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7131776-5DEB-4B96-8483-B81B538E24FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)ea:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE991877-18E0-4374-A441-C2316085CCA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)ex:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A2EB46D-16E0-4C31-8634-C33D70B5381A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"757EB1A1-4764-4108-9AB1-F33CF9CEE574\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5b\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F29B2E6F-ED6C-4568-9042-7A1BD96A9E07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(5c\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7803B445-FE22-4D4B-9F3A-68EFE528195E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"199DCF1B-8A1E-47CC-87A6-64E6F21D8886\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5B78669-3B28-4F1D-993D-85282A7D0E96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD05109E-1183-419D-96A1-9CD5EA5ECC3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7551128E-9E23-4C42-A681-6BE64D284C93\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)sy4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31605A68-9398-4239-A137-DD0516BD2660\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFEF03FA-FBF2-477F-A5E2-67F47610897A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86C0900A-1354-4A20-B5ED-8C005BCE4D74\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3104D911-5FFC-4605-B234-6FD40A206DC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC787C70-6540-4AF7-9F05-8FD86284091E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC716D3D-5C37-4E36-8F6B-53801DC7225E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5E289B7-7692-448B-B15E-224AF4F01D94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E42A8A6F-A732-4441-A94F-FCDFA960EB9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE9EC5B2-CAE1-4C8F-8F96-FE006049FF96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"895D2447-BD8A-473C-B26E-06897080DD2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8169591-4C3D-4C32-A24F-EACDBC62B77F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5944EA5-29A2-438A-AA5E-ABC45E298419\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD6584D8-AE44-40D0-990C-94C377DBF275\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A52C1850-27F7-40C8-BA26-660D160AD163\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.0sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E519217-3180-4C49-863F-0D10E47F1A82\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"930678B3-1527-4967-9D8F-27FC0DA060AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AAC822D-E886-46A9-80E8-06DD753A458E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E312CE6B-F3F5-40B3-8862-3BB1314376E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58A34268-7618-48D2-8872-27B5B624543B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6893B368-D3C1-416D-A4E8-6484AF91C7CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2017A75-CC29-4161-85CB-7A531E5ABB3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C809C7E-738B-461F-9155-BC19AAC8B661\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.0sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D918A4A-7E60-4C8B-86D8-82BCA99B0844\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6CDB780-F259-4A2D-B32C-0401601715FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.1sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"596A43FC-0DDA-4AF6-A4A4-A488B5740D5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8DBFACA-112F-48F6-BF0C-37FC6D133EC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95384E18-A319-4BFA-912F-7AC7C664A80A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85512107-7E38-4C00-96D0-01D9EE7DD903\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7707BC4D-6090-44CF-B304-A54A46FAD32C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D28F4F-5E14-48C1-8353-4D6A8C657FB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C14EB390-BA15-45C9-B971-D66CD98B0EDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BCF5A7C-202D-44F8-97D3-694F876050D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"748C5458-8F16-4DA4-8BDE-D00BF42DC8C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3EA559D-5184-4E19-8A32-ECA41C930AE8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B82207E-7E19-4E0A-93E6-C631897793D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"716D8805-D461-4066-9BFD-1EA895E4B997\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B4A02F04-6717-403D-8A6B-B365F74DEE00\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7150819E-EFB5-4224-975C-84EDBBB2881D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E81F4068-35A1-4712-9B88-F6E574B2DE20\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28DDB45D-1B19-4FAB-B985-F8E5D38A3ED6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29794A8C-B1CC-492F-9A68-02EEE994743B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CBBDA12-AF2E-400B-979D-3657F1F2C15B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C7F55DC-38F5-4B19-A699-90E1D302A04B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC32DB11-4E23-492E-A00E-E0DBF9131C64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA2306E8-ABFD-4C37-A911-7B35A654147C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455DAAB8-83B4-44B9-B2F7-2DC9EA796898\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F462360-3597-420B-ACB8-44A6F622C8B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39DED4C1-E7AF-48E0-8B1A-839A87E52992\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96CA4E70-28BE-434C-811A-C16474CFD87C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E77A9A46-517E-467B-A702-E6F6DD9FCD96\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD485792-290B-4553-AAB2-DA7427DE7131\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB7139C7-3C02-46C9-8F89-CB517A706CC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C0AD00E6-A155-4CCB-B329-7B536BEBC976\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D365DFD-C99B-4F33-9A90-1162C7A4D3EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"671F6847-6855-41BF-A148-944AEEB32A5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7207B1F1-AF21-4C02-A163-4289503A026C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7CC0497-24F5-42ED-99A6-4C8642F73F08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"120DA9BF-1153-41C8-B80D-3F99E0E28A8F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89812FA8-230C-4F62-8AA8-7F13FA86B805\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D17DB28-2559-4837-8B4B-7CC722D73324\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D92991EE-BB4A-499D-8F14-F7D0E32BE31E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A56AE607-0AD0-487A-A266-C15EAF40F2CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"705971E9-7FB4-43EA-A1AE-C91865EADE16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F481A851-D607-4CEF-87C5-147FFBC97D3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"355F4945-4FFA-469F-A799-815F371C637B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1432B59F-5A66-4A5A-B3F7-E297700ED9C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"013DD522-1561-4468-A350-C872B78FC291\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6907E1FE-760E-4557-A472-1A1F0052B82B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62291CDD-A775-44B4-85F3-CE1D494F55FE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"658EDFE2-6EC8-4DD3-AACA-C168F942712A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FCBE369-81ED-4C94-8C44-53C6F4A087CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90005E78-413A-47D7-82B3-A3011E6B118D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D764D126-4604-43DD-9A66-BDD32565D893\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06067D8B-79BD-4982-909F-7C08BE5660C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9EC727B-AF92-460D-B61D-F45ECEEE5D56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5604A84-8240-45B6-9027-B03AA549CD5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B9846AE-1344-4EE4-9FDF-6CE17D9461FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25725655-EBDE-4538-8AE1-CF5C81F09C5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A98F2654-46F3-4C63-A2C2-48B372C655B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D4E206B-37BF-4D61-BE90-80BB65C0C582\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3598539F-0EEB-45D6-8BA5-A2A3F69D556C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60C5FC5B-BE2E-4BAC-AC23-58666BDEB553\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3822447-EB80-4DF2-B7F2-471F55BA99C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BC99316-75AC-45EB-B6BB-DB014ED08ECA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.2h:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E275E7D-C89D-42DE-9301-C19A54FEE964\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C98DED36-D4B5-48D6-964E-EEEE97936700\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en el c\\u00f3digo de procesamiento CMP (Cluster Management Protocol) del software Cisco IOS y Cisco IOS XE podr\\u00eda permitir que un atacante adyacente no autenticado desencadene una denegaci\\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a una validaci\\u00f3n de entrada insuficiente al procesar paquetes de gesti\\u00f3n CMP. Un atacante podr\\u00eda explotar esta vulnerabilidad enviando paquetes de gesti\\u00f3n CMP maliciosos a un dispositivo afectado. Si se explota con \\u00e9xito, podr\\u00eda permitir que el switch se reinicie, provocando una denegaci\\u00f3n de servicio (DoS). El switch se recargar\\u00e1 autom\\u00e1ticamente.\"}]",
"id": "CVE-2019-1746",
"lastModified": "2024-11-21T04:37:15.843",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 7.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.0}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 6.1, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.5, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-03-28T00:29:00.590",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/107612\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/107612\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-1746\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2019-03-28T00:29:00.590\",\"lastModified\":\"2024-11-21T04:37:15.843\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el c\u00f3digo de procesamiento CMP (Cluster Management Protocol) del software Cisco IOS y Cisco IOS XE podr\u00eda permitir que un atacante adyacente no autenticado desencadene una denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente al procesar paquetes de gesti\u00f3n CMP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes de gesti\u00f3n CMP maliciosos a un dispositivo afectado. Si se explota con \u00e9xito, podr\u00eda permitir que el switch se reinicie, provocando una denegaci\u00f3n de servicio (DoS). El switch se recargar\u00e1 autom\u00e1ticamente.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":6.1,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1168DD8-4DF7-4A2B-B080-D267BF815F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCEF5EBB-226A-4E8F-A78D-9C1754F1FBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3316587B-3BCE-4F4A-8835-BDC12A7F12F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"148C0902-66C4-4952-8319-40B8B145A901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1037D61F-BDE2-4956-9B27-25FD5408F1A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(6\\\\)ea2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CC077AA-909C-4344-B5A9-F71FBCC34B97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)ea1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C8E9BF-1C07-47FE-8F98-ED5960D302FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(8\\\\)ea1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F299684D-4676-4810-9BC3-1E28DF75E776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDCAFA73-B3F1-4527-8D7B-9B1B8263B50C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7201D2F-08A9-4E13-A294-5987D6B8775D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94824D7A-6CCE-4ACC-A48B-D8AA7E6518C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ea1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF711F3A-63A1-470F-927C-7EE5176B3F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(9\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2465A016-415C-4EE9-9DEC-B71C3EDC0BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91195861-AC53-4468-B1BB-3144A6F3CB3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(11\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0690F55-8755-40F4-A2C1-34335ACDEBAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C20A694-A84E-47F4-ACCA-BF6AC9C2BF8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(12c\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9944C77A-16EF-4908-930A-5B6C47BA897D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC069569-859C-41DB-93FE-57E8B3F2EBCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1B7978F-4C1F-4F96-AF73-D5A1AC94F2FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B39BBB71-C9BF-4566-8CCB-E613DE4AB06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(13\\\\)ea1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17B63153-D51A-40AE-887B-CC9362263602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)az:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67B8FCAC-27A3-4AA4-9A28-9FE526EE52E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1229A52-54B6-478F-A419-8D0340336BF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"548C1020-E629-4F47-B8D2-AFBF77EC01DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(14\\\\)ea1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0688FE12-857D-4654-A778-CB836402DFC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC3D006-6C20-43B9-9100-E427895AA3F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D670129B-4D75-4E55-91B3-126BD8A53722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41768F22-7164-458E-8753-9B89BEDBAFBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CFDD737-B7D0-45A0-A6D6-3494FE8B777B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(19\\\\)ea1d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0CE611-2E4D-454D-A247-18744A6E74E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4041EB0-F402-4C01-9337-212E3E461AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00388B56-F514-4A9F-95FE-1D8239BE1EF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F846F7FF-3ECE-4390-B0F2-50B5AFCD568F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(20\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A56097-E614-4FE2-AA09-3FC5EDDB0170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26B2BF3F-8B92-41BC-946F-E0BBEC874257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A640A1B7-8A59-43A6-8675-7E95FACF7A7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76B7F08A-15D1-4194-B476-E528B6AF8198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B46F396D-2A00-4DB3-9BDE-F2291E7782BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB440BC6-9FC8-4EFD-B05E-3F5A5A68F8EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF4A473-C851-4D2F-A22E-66A267A1BDB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD4687F-D78C-41C8-B2B8-D140813A8619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"052CBE3E-F871-4AFC-8DBB-E6783A5D7B17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8C33CF-9FD2-4DC5-B69C-0C8E0C6A987F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DFF09A6-DE59-4CBF-AF02-DF2862C05D1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA39450E-25BE-40CA-B419-D939C3D39832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA069FDD-BC7C-4C61-955F-F6F2179091ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E74792B-0E3E-45E1-B86E-34233330EB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEE3D38F-5DD5-44C5-BB38-571F81B1BC82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA5D0F6-810F-40E0-8CAE-3B01C13CC857\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB63B163-E48F-4D40-BD9F-518F24B27C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EDFB452-63BA-44AD-9972-7CCF43D0F730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea10b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C72D3246-8E14-4A27-8A9B-2A1572849966\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB7FAC8-DD25-4C24-8AF1-F2B97ACB722C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6761711F-AD6C-4844-9DCD-D2827FA0CDF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2EC151E-DA5A-4695-A0EB-1C46C4F42FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.1\\\\(22\\\\)ea14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E457AF5B-637A-45B1-92FA-FC4096B8C912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(6\\\\)i1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEAFD220-48D7-46EE-8537-A69C5F8D0F2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D9BA55-F193-4BCA-ACC2-BBC892E9D7E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46974023-379B-4475-A59F-BD340043CFAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D71C21E1-BC04-4537-B64D-76492F282B76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF5C9424-067B-4604-A197-478D4BFE72F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01CC34CD-3004-4EA3-9DD1-E9CA0E2336E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F228FB3-0015-456A-A49C-7B1284F641B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(14\\\\)sz6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99F0772-C2C0-4356-896C-30ED62B7887E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D0E67EE-AF42-4B53-B70A-45562CE164D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B086B50F-03C8-4C5C-8D4D-37EA33C6D7C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5783901-D472-4DA3-B836-45704F3A6A20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39ABB80-0A2C-4B9F-BD62-59863BC2E451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A77C844-EAF8-497E-820F-EF2A87451319\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E319ADC-C636-4933-BD50-B613677AD4C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(18\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E052D7-9811-416F-A5AA-7DB2DC8B9F71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522425D5-1EFE-4F07-88FE-9EE4376D7171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"145A21CA-3E35-4F73-9451-72EF1265ECA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)eu2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47186E81-9EAD-4AD6-B888-F1F94C2EA128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F08381-956E-4E97-8226-6EDC66C281D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A211E02C-BF5F-4587-8416-7A3F15E1920B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54CCAA24-53BB-4998-B986-358701A8A8F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B2560DA-E091-4344-A7D0-9BEEB6998AC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ewa4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7A526C3-8B1F-44BB-BCEE-C3D8140CDF3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D12B5F13-392E-4BE0-AFC0-BAB2E989A08F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10151339-0261-4F5D-9601-F048C0B70908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2498113D-65B7-4144-AD1C-9FCB6534B7BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84685E46-066D-42B4-8800-7D529AFC4FAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C712A3E4-388E-4B58-B079-D67E4FA0D729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C96B72B0-0F9E-44AC-870E-84DC484173E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99299759-15D1-4BEB-95D3-8D53C27674A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s4a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A525BF43-E098-47DC-A32C-1A43B0F810D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C74A6F1-1A75-4D57-BDAA-68110CE604B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3290C7D-BB60-4095-BBFF-0484C1FEA071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFA74FF4-FD5B-4EE9-969F-93EAC73D89B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D273495-EA24-4D04-BA90-710B22B4C003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6742F7A-F4AC-49AB-954B-1595F7ECBD1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA90AE6-0BC8-442E-81F3-49E6C8D71F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(20\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"692B182F-4E9A-41C0-B254-0B0362A7B726\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(22\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B20E6F8-5E33-4F24-BB8B-8B61E39C01E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ew:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77CF347D-F8D5-4D3D-AF23-E89A8C77AC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"878773DC-1360-4608-AB17-0081B33B11F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C2B085A-57AF-4A84-A354-166E61B5CAF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C181E469-32B1-48AD-86F2-63AA790C5EEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A35979BE-B33F-4709-8B36-FB8297E321FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66130668-1107-42B3-BFAF-5640D3AC7595\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0333A54-6370-4327-BF38-B873F3AC6615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CF87CF-3EC9-46C0-A98C-25F6055A3E5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7A93F44-8924-4787-AF35-4D6937B87086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABADA146-ACE1-4CE0-8CD3-A3F25EEAA3E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"216D7B37-0925-4A83-980D-2145B00793BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"856842DE-6995-4CB5-A500-6D851BBF3DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"862661A6-07AC-4FD3-B84C-977F66EDE29E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30806B3-C98C-4D4B-AF11-0743EBB5B50B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CF3B7A3-F63F-472D-87D8-5EB767E0DE4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ewa14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18937501-09CF-48AC-A4FD-7ADE162BEF99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C22E4042-3628-4A7E-BD93-1F3F282F9E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99EC3F33-4A8D-46CE-A5FC-913E03F6DEBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A84C2CA8-1BA4-4899-9AFF-443FBC5003D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B5E50CF-9084-459B-AFE5-5E0C63E17AB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ey4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7F9FC27-5954-4374-BE61-E0E563A0DD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC9A8EF-FE37-42CB-A33F-4B6AF29A8827\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)ez1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0C9F1F1-EA5E-4921-A862-06304CE55C4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)fx:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8508A0FF-D18D-430C-9A26-6B5BBFD7DF70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)fy:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"393A274B-BAA4-46F3-BC35-BE697B96A684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)fz:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD274CE-D174-471A-8423-02F33F63B574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA143186-1E3B-4B5F-A5FD-AE90A2664AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4912CA3-2311-4D0F-8767-6815F43BE645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)s2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC91248E-CE91-4BAA-B52B-4AB77AAF77B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36953AD6-CE36-480E-8679-DE5EEBCC5A26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F26D07A7-41E4-4768-AE14-8E0604BAF0C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1685F6-181F-41AA-8C6A-9038388C9963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F83F949-8F27-4FF7-A586-BDCDAA52B2EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F571ECA8-0AB1-4BC0-A6AE-06BAE1FD2375\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6F402D2-7DCE-4D22-BA71-ADB3622058D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E67F0D3-5722-49F3-80FA-8BA7292C085D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA79BC8E-753F-4245-9885-A7A2733E4013\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seb4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B820873-78DF-401B-8A99-EB1F115FED35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA4A5F6D-CEEC-4BBF-9E4A-2D3B1D148371\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sec1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F88317-18BE-4484-A027-D69500937799\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sec2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF6CCDEE-0D38-4C6B-82D8-CDE5067CC704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sed:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C342FEA-F2AC-4E0C-946E-1F7DB2994D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sed1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82284ED7-CA08-447E-8EA7-FCD33D500BBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0C112D4-820D-4BFD-AD59-4957E7D5FDF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1EAF282-5537-4836-BC54-BB7EA023BF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF228683-2C83-477B-904E-54E1446928A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74DDE240-25BC-40F0-B8F4-D2D94389C08F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)see4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"359E5A44-2CE6-463A-B9A4-C8BE21491D15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sef:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91100DDF-D654-479A-A773-2F31AF0F2516\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sef1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA38F4E3-5D3B-46B1-A6E8-8E0B02B0F52A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sef2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"845B3CC7-E49B-45B0-BE89-05135A97A39D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sef3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E729850A-5D31-4332-AC37-C9442B7CB795\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B69AF0E-CF4D-417F-9E5A-B8540FAB2EA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768A5932-EEF1-4A39-A054-CA54DE4CAC94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)seg3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0E87B20-EF04-476D-829A-6F1433DD9854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B142BAA-613A-40F8-9FD2-EB081867B3F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A632D64-8E99-496A-8DE7-4A2458D1D7E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48263C15-99F4-424D-AE45-F3A17E291F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0048C46A-BC09-4958-B4FB-EA69B25E4EAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(25\\\\)sg4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA202662-DD3B-44BD-A6A0-F31056A85759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(27\\\\)sbk9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BE7AFD4-966B-4F15-9C57-C3B2D0CF3781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B752C842-B50D-4BE9-93E6-CAD0560B679E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD4ECB0B-62BD-4429-BF35-9ECBDAC952E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A46E63C-D7D4-47ED-8C83-E7EBA5B17A62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sg3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"616C69BF-7431-4D40-BD31-929D4CE8C7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"940F55CA-49E2-4353-9714-BA6A86D9DD66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703C31A0-4E23-4D3E-9764-4A43A55AEDF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6B1A28-415B-4AA9-8CAF-2552B64D79C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE45B81D-7F63-41ED-A163-0103A702023C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB656D5-1D86-4D3C-9A1B-92E6CE404E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE955775-49ED-4495-A70A-2C1315E95D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C88AF23-D873-4723-908D-E2898E9ED3E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9A57EC0-6DE8-4552-BAC6-EB173D84AFCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F81076A-6583-4184-B8FE-1544792BCA74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"329678E4-D593-4E96-A33B-E8DBF87730E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"052091E6-A3E9-4E90-BBD5-1E0ED25998E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(31\\\\)sga11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0AD7780-0194-47E9-980C-35215DFFD198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF116D8B-2C19-402A-9733-540CF79D80A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC2A4B06-3E30-4633-9D9F-07AD91ED4281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A35F3267-6978-4816-8DBC-2C7E2CFEE35A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AF7FB11-5610-4EDC-8F08-4FF5EF0182E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(35\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD3B4F88-99E5-4C1F-A160-821B3A99F0B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68AA7812-D193-4AE1-82F2-BDAD51929D63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9545967F-C55D-48A4-B70A-3E9B2D7E1617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98DBB5F7-D105-4F8E-B144-C392D3FC6AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97AB797-74DB-4414-B895-8D3403CF0334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(37\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A503C16-2719-435C-9CCE-B9743A42E9A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A73E2A-287A-48A0-90F2-9AA2DCC8595D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C93174C2-4F87-42DF-856C-E9938DBC4DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)ex2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A199EA0-3C40-4AB4-B67B-B4E0DA3E2512\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)ex3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F10924FB-9326-4EE2-B6FD-37011A2C2E9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DB20CD-004C-478C-B19C-48D7C0B6FE3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E6E66F-D0F2-4CF7-AB96-D6DB38746972\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D15762-83B5-40AB-8832-F8B5EE1D789D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25BCC700-7375-477C-9585-16DF7AC3852A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(40\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA49B682-E7ED-44CE-906C-9DD9D183583C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E632468F-4B62-4937-8CA6-5B8023451F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C853E612-2C4B-4595-AD6F-22E34B68C69A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3E6D9B-BCC6-452A-8420-87E601B74949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA609E08-3369-4359-B126-19A54D537C42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15085505-6E63-40B7-9F71-7BF6F965FBD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ADE6DE-5C2A-4D34-BE8B-A6ADEC61246E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43710D33-1685-4EA9-948F-2B79122C4A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DE43284-9902-4701-916A-FF10AE966842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"859A0347-C043-41F4-B2CC-EC54E36A81A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA011033-D263-4D47-8F33-844DB9C0B6B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14FBF27D-7288-4251-9846-064AAD6E6AB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7988103E-FEC8-4F3D-AB7C-645C0D5070EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(44\\\\)sq2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0888AE6-9FC0-4927-B74F-65711EDB4DE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAA8E712-36F0-43EF-AED9-BDE4EA6CD6FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BA61004-EC61-4E03-A2FC-DAEBD5E10F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9E61C16-55F9-4054-8CC2-38D5197A1FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E8D759-07E9-49DB-B8EB-A9C06A8D8031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C923698-3017-49B8-9DAF-98584CE0402C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(46\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADBCA495-DD1B-473F-B1FD-D8EA414497EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7EF0685-7BEF-4F84-902C-DFE533CD2F34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F114FD7-F62C-4A24-9CE6-C9A7136465F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"892F72BE-B65F-4271-9042-3B459DFBB43C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7715D0D0-E8B2-444A-A590-7B5B0BFA713F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B526DE1-EEA7-47E4-B291-09C02F018A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A00F4FE4-769F-4268-A623-DD56F12D7F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D97983D5-B4D4-4A69-8573-A978EF9F8859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFC6E74-0AAA-4CB4-B119-30ED3DB95749\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80B33EF2-3157-457D-BB77-CE99C9F02A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2477EEC8-93F2-45D2-AFF6-8D83AE5195B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2570C01-A377-421E-B2A1-EC05A87DC684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B7D11D-1C92-4369-A446-2CC58AEC70D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF19E91-370E-4F3E-A6ED-778A0493912F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sg8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"072FFEF0-72C9-4C19-8A3B-9633DDCA24E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46AE17A1-7FC7-4197-825C-92B32AC64D82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00328248-72C7-4646-9312-5EAA7FE0D41E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5535D673-8DF3-4737-A531-E7B28C419235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D97E83-3091-4E46-818C-503D7D1F9D1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE109462-C870-4C66-A7AE-B1ADED3B8DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14D0156C-3153-4A64-8491-A6A1B60FE5CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C075F42D-27C1-46A2-893A-5C0D9BE13861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(50\\\\)sq7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF11222-0EA2-4E6B-B6DC-D16FCFEDE807\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE0BE6E0-3D82-4B2A-9B4B-C50021F0687A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD063290-8E11-43E3-B55E-411551074C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5898745E-C1D3-4D0E-8476-2EEAA4327B5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"887C5632-F3F7-4EDB-A065-D81F64A9B15C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD397982-87E8-46CF-95A5-61435849D02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(52\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B648C2EF-489B-4F62-B898-110A09794810\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41DADD4F-B761-406B-8BF1-A7AF0C6896D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9600F1FE-17F6-4F6D-886A-ED95FEA9A3D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17356A3C-0C05-46A7-89EF-A2C48DDEC4A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE5C5C5D-B40A-4DD6-A10C-C8713CCF2E12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE68EAC3-05F4-46C5-8A48-4ECFF1844BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D896F9-9E25-464F-B6C5-55A2DD38CC44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF566A3-331A-4A8A-9EEF-D1FBF71BF4C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0623C531-CFF1-4C45-B8A7-BCF2C4678222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"794B72BB-52D0-4307-8A61-73AA2477885A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E66D10-84F4-486D-BFAF-B7D4AE2E5583\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C364500B-B7B0-47CC-9277-8D43BAB6E6D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B797B2-6AB2-4946-88C0-12D71258CCE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12B9DA7-28C4-4584-A548-6B06874F9C00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD0C66F2-D158-497D-8683-2264F58A33B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CE361F3-BA5B-453C-A58C-6E8CB84BC101\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(53\\\\)sg11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C55E31F-B291-4FE9-81FB-A91E95323863\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83184158-7C5F-4294-895E-7CF5B76A0F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A081B105-AD3F-4529-B3E7-D8B0851C83B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3142DA6-0FA9-4CEC-95FC-938AFD944BAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)wo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1644E8D2-E3F2-4ACB-A0D0-F374B565D121\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(54\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC24BF9-DCD1-4974-A2C7-654E9B469C1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6F8F86-8C63-4A29-A384-62A849848EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19D89B24-5DE1-4E15-B539-EC3FF6BA0658\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ex2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87760068-4255-4D18-A62D-FDC156F7A654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ex3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8AF551C-1482-489C-AC4B-DF3E9BBB0F73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904C4D5C-F603-42CE-9CAD-28B01223452B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06D0BBED-E68E-43B7-93F5-FC5DEE7BEB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63C5C43F-67A3-4000-845E-FDA620AD1B90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565F3777-89E2-4159-9D8E-629EB7A56837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD7C3DF8-2B59-41EB-A151-15E46348DF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"700DDE2E-922C-426F-8751-BADD15055AD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6CA171-4BE2-4204-BDAB-EA19BCD4842A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84766AF1-DC74-4D64-A4E1-56B377D6CE48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D4A0517-EF86-4655-B4B4-246ED3A84803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0E3912E-11F7-421B-A5C4-35568A6E386B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"360F3E49-D75A-4ACE-B775-14055272C861\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5362C676-5002-4ABC-9C60-97D4B65A399D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D14EB41-CD6A-483A-8F68-9072E436807D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC201905-7DBF-4E2B-B732-62641F51C170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(55\\\\)se13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"377669B9-952D-4527-9C24-E6713E749C1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AABCE40E-04D5-4248-A374-EAB938575C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ABC42E8-E304-4D00-8C6C-604F3EE13DF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D38633-31AE-42E9-8FFA-77C8EFA9AABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D6D9CC-70F0-475C-8AB0-48980596BE47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(58\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEECEF97-EC6A-43C8-A7AB-5C48948183FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(60\\\\)ez4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D593974-6D7B-4AF8-85B2-A77D8BE5CD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.2\\\\(60\\\\)ez5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7B4BFC4-F2C9-4D5E-AD22-3AAF36CFB12A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:12.4\\\\(25e\\\\)jaz1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81CA75FF-8C2E-4D9C-BE57-34EF801C28D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AF55C0A-768F-445A-AF40-2B553363AF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D75DC6-D7B1-46D2-ABEF-97D908992FF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"971AAF00-63AA-4B3F-8E0F-B8FBD011C071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"551A0087-5926-46AF-B1DA-3AA18FAB87E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E19A2402-F662-4900-8137-B14EB2537173\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5757C194-AF18-434C-9F19-2FC775720556\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28722F17-AF23-4435-AF9B-996798ACF2C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(1\\\\)xo1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"587450DF-77E4-4320-9191-383EBE5A6CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ej:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C5D50E8-99DB-4B15-B0F2-84674A9346A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ej1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A101303-CFB2-4EF9-AD68-AF6D8E1E8148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C965E814-7ABE-4C45-8EA8-B6818BC213F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4556022D-5B0C-4F7A-868C-9EC01F716D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7760B1FF-BC56-49F4-8020-439EA2F53AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49229E8B-19ED-4E5E-AA2E-F699C033F4A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9A4AC61-4386-4218-91B7-6CE776D8050B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59403A6B-3488-4F81-BE3C-A06AF1731B99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"796E5094-9A88-42E2-949B-D6D59651F04B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8EBCA86-C027-4514-A2A9-613899FD9A01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02ABF12A-78BD-459D-BF53-065A56C385AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D15A929-0C2B-4C3D-99E4-0E7D46217216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D00EB0E-92D3-4C5B-B107-730B47BD6E01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF7F6A52-9AA9-4441-A137-7EE3470C155C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ex13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92CEEA13-0B40-4203-8BAE-09374C9B1FE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CA27BF-13BC-4C13-A049-FA50247ACE9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82C8B101-CB42-43CF-98CE-44EE5FBC9BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ey3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054583DC-AAF8-4BF0-AC13-5A488476C161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)ez:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8422A740-0029-4C05-A7FE-12F12CD73B0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A9B13E-8CF7-4879-8C33-8E690291335F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A634C47-2FD6-4106-86B6-DD465A5394E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05DDA3F8-7207-4FC9-B491-F49418975D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09AEBD6-56E7-4D22-B300-C904464FE75F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97525468-9E3E-4E34-8319-B4DFB51BC4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611A649F-161B-4683-98D5-4C8150838039\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F414ABC6-B95C-48ED-BC15-817356248776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"137D26AB-CA68-4CBC-91E8-8C0901D5BF19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"343F5C35-A0C0-4747-95BA-D4044C64508B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713C55A8-F24D-45FE-88AA-1D1EFEC88339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F7D280-D099-495F-B860-D96F485BAF81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)se13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62A7038-EBCF-4996-8795-3BF95CBDE6B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"815EAC82-48B1-47A2-80D7-8CEE806E4B9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F68B4687-CC90-45D8-989D-8DF38940C8A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F755B9BE-3DF6-49AE-847E-F74B696A49A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF429A0-4A54-48FA-B69B-D34898E987EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A867AA1-E46F-4027-A41B-6AE1A27EB2F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF4082D-8F3E-4274-83DD-431E99C395B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"230ACE85-877C-45D7-A2A9-0085C421292A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D37BA5F4-9D5C-4D92-A6D3-055B79049719\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED6E6E2-AB47-442C-93B9-DEBA9D124B31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3CC7F08-343B-40CC-9D03-81EE4924D6C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sg11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31444A2D-BBF0-4D6A-A898-5EC4E782CC43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D39E1ED-2F67-4116-9BF5-44CA8EF9A016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"729613AF-4C56-4514-9ECD-6A466C278E0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"368F2F9E-FD52-4A74-8378-DF246252B745\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E452976-8876-40D7-8880-29197DB5457A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE5C762-5329-47E9-8D0C-C0A546AC24CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D93F335-8058-45BA-8653-9F3E4A5FA28E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)sqd8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF152F35-32C6-4C2A-BC91-90AAE442F239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2\\\\)xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2a\\\\)ex5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD47CBD-A833-4CD0-A62C-22FBB7A4244D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.0\\\\(2a\\\\)se9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC9108D-B313-4C07-A9E3-5C2591304919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(1\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8A89C06-8384-4B23-8D3A-293C9035FC73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(1\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94836415-1A1D-4DC2-BDAF-BE5B06EA5C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(1\\\\)sg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00B7F513-E991-47A4-A96B-2EB90B15D197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E5F22B-2CD3-4A14-AB2B-E039CF001140\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15102BA5-E96F-468C-8F8E-4F8F9E947533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F481FC-D16B-461C-BCBB-D58B58D1647D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42D47483-F300-4224-86B2-6FBEFA35EE63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC9E74C5-4BF5-4F29-938F-3E71784F08AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2963A4BD-1414-40CA-A949-9CE61B3C61C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6C5B60-9524-4A5A-A8CA-3C18730E18F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0B09C15-62E9-4278-806C-03D47B75E336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sg8a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFFA4F2A-4BE5-4FD5-A3D4-2B28D6A25A53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)sy15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACE1712A-1A44-4BD1-B114-318D4EC4977A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)mra3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71593C6-B365-47D2-958D-A99FFB64101A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svk4b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5BF4FA-139A-4789-A9C1-84B6DEFFD300\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svk4c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"009E4B3F-4384-4DBD-9D88-0A191BB92C6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svo2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B853917E-D8E2-4CBD-BB4F-CB447BE052F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(3\\\\)svp1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82784B3A-A4EA-4BBE-9ACE-BAE4895372CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B725B7-AFBB-4F0D-87BA-38477E250374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CBD931B-9D7F-452A-A567-60ED7EA1D2B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)ey:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D601E90-6F2A-4C66-97A2-152031C88DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A156FE-590E-49DB-819D-4103D629829D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F6C767-042C-4277-90F4-F81D9AFFF227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D33DB919-4F82-43C6-830A-A9D4FC043B42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72782F95-948D-489B-A19A-9DAB825DFE4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F904CD0-8609-47F7-988C-613DE26BDBB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3A39FE-69F6-4BB9-A9CE-D516A3802538\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB9B7058-3467-4CCE-B9A4-71CF8143FEC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90447919-CC40-4CA5-A488-2FCF0F25ABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEF74559-F418-48EA-9CA7-A9574CAFC97E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5A1ADB8-DF62-4CB6-8075-2F0956BB0126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e7b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB0F2B2A-F273-4166-826F-88B54A480BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"194D54FC-F399-4C86-AE04-FB3FD828DDA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e9a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F98E150B-C806-4CF6-83EC-0C16A44F3EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)e10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1C85E0E-A920-4501-AC23-0F7534CF88EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50CB7858-C857-41E2-9E5D-9368EEC2825E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10438F4B-281D-4C2F-B4C3-DC3D47B0033A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"681E360E-2287-4BE7-8228-77C235DFA901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81800178-449A-4B61-9611-5FB2FC4DBC75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7316ED4-FABD-49E0-AA21-394D327435F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A56EF3-4E88-4220-846A-A9BE1E496311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)eb2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)sc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B29CAEE-A01B-4156-A871-43F3CC90ECB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)sc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6879F438-0A0E-460C-A52F-3EE2F0EC2C3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)sc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A925CDF2-3A2E-499C-B38F-1D086534F11E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C846C74-7644-4DAB-A4B8-B33464EBE92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2a\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DDB0B25-95E0-4796-A56F-1A59EF7EA283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0687FD87-BAED-4776-9B94-3C9EA7CCE79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB214EAE-AEB7-4359-AD8C-86CCC080EF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757000B2-A8EB-464A-9A2D-EC4D920A0569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"102BF855-ED1C-4D26-85D9-74B2BE0E9CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42618DF-F118-41A7-96E5-24C229DA020E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26F6FC68-BF4A-4511-8B46-A93C81E349B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7582DA8C-2360-4E8C-90F8-6194F269CD1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D6FBCE-F1F0-437B-A9B0-57F717C974F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94FD5120-C385-4F16-AB3F-979D851DF8D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"260E5F96-48DB-41C4-B45E-5BE0367DD7E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3m\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA06788C-E529-4024-9565-EAF5D90D68C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3m\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96274788-A5AC-4740-A915-C381593203C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3m\\\\)e8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FD15D65-9471-4755-9EDB-04ECF34DFD8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80114F8D-320D-41FF-ADD3-729E250A8CD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"879C4495-3B26-4370-8708-16F5002E37CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8C2BB1F-79DF-4471-B75F-C22CEBB5380F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5A55B3-49E4-4C48-B942-4816504BAA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e5a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5BDAB63-EA0E-486D-B146-7E0060F70066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AADD63-CEA3-461B-94EA-0CDAB4A2ED00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)e7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB704746-C27B-4C6B-948C-B8C0A3F40782\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF92BEC-AA46-46DF-8C1E-956F3E506E69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C226FE9-61A0-4873-B277-1B8ADB397B32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5BD905-75C3-47AE-8D19-6225BD808B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DE452A-6852-4879-9187-8A152E6E260E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3047E4-BCC3-41A7-9DCD-15C25D14EC44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7785E177-C04E-4170-9C35-B4259D14EA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CAE727E-E552-4222-8FF0-6146A813BDEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ea9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7850295-C728-4448-ABA7-D01397DBBE5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65589A68-58A4-4BD4-8A26-C629AE610953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)ec2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8A64C8F-6380-47CA-8116-E3438B953F84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jaz1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D4358B9-F3DB-46AC-A3A8-114E25F676DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)jn1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B171170-4BBD-4E09-BF5A-6DA3F110C7D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4a\\\\)ea5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"734AA8D5-5BB9-4E1D-B8CB-0A14BADA9EF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4m\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F65F813B-C080-4028-8E1E-A81827917DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4m\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABBCE48-B9D1-4EFB-BF64-CF30F5294EB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4m\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D54D10E-D94E-4731-9988-4EC1786FF4E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4n\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DC02AA6-E046-4EC9-9FFB-8B2C76FBE027\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4o\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2BB34B-D902-4064-BADC-56B5379E92CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4o\\\\)e3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D0A0A2-DB62-4C92-9877-CF8CA01B1A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4p\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2316E962-6C56-4F45-9575-274506B9D4C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4q\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42D3DFE3-7576-4D56-ABD2-425C28B56960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4s\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A39AFD5E-8FCA-4EC6-9472-FD208CB2A555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4s\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D249815-5A8A-40E4-A943-6AB1A2250CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F112DE64-0042-4FB9-945D-3107468193E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E027FB12-862F-413E-AA2B-4BBD90AE3650\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD28874B-148A-4299-9AA1-67A550B25F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45B80CBC-961F-4EE8-A998-C0A827151EDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)e2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7131776-5DEB-4B96-8483-B81B538E24FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)ea:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE991877-18E0-4374-A441-C2316085CCA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5\\\\)ex:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A2EB46D-16E0-4C31-8634-C33D70B5381A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5a\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"757EB1A1-4764-4108-9AB1-F33CF9CEE574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5b\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F29B2E6F-ED6C-4568-9042-7A1BD96A9E07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(5c\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7803B445-FE22-4D4B-9F3A-68EFE528195E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"199DCF1B-8A1E-47CC-87A6-64E6F21D8886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B78669-3B28-4F1D-993D-85282A7D0E96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD05109E-1183-419D-96A1-9CD5EA5ECC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3C73A3A-4B84-476F-AC3C-81DCB527E29A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7551128E-9E23-4C42-A681-6BE64D284C93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(6\\\\)e1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(1\\\\)sy4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31605A68-9398-4239-A137-DD0516BD2660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.5\\\\(3\\\\)s10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFEF03FA-FBF2-477F-A5E2-67F47610897A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86C0900A-1354-4A20-B5ED-8C005BCE4D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3104D911-5FFC-4605-B234-6FD40A206DC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC787C70-6540-4AF7-9F05-8FD86284091E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC716D3D-5C37-4E36-8F6B-53801DC7225E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5E289B7-7692-448B-B15E-224AF4F01D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42A8A6F-A732-4441-A94F-FCDFA960EB9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE9EC5B2-CAE1-4C8F-8F96-FE006049FF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"895D2447-BD8A-473C-B26E-06897080DD2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8169591-4C3D-4C32-A24F-EACDBC62B77F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5944EA5-29A2-438A-AA5E-ABC45E298419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD6584D8-AE44-40D0-990C-94C377DBF275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A52C1850-27F7-40C8-BA26-660D160AD163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.0sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E519217-3180-4C49-863F-0D10E47F1A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"930678B3-1527-4967-9D8F-27FC0DA060AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAC822D-E886-46A9-80E8-06DD753A458E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E312CE6B-F3F5-40B3-8862-3BB1314376E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A34268-7618-48D2-8872-27B5B624543B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6893B368-D3C1-416D-A4E8-6484AF91C7CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2017A75-CC29-4161-85CB-7A531E5ABB3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C809C7E-738B-461F-9155-BC19AAC8B661\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.0sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D918A4A-7E60-4C8B-86D8-82BCA99B0844\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6CDB780-F259-4A2D-B32C-0401601715FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.1sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"596A43FC-0DDA-4AF6-A4A4-A488B5740D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8DBFACA-112F-48F6-BF0C-37FC6D133EC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95384E18-A319-4BFA-912F-7AC7C664A80A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85512107-7E38-4C00-96D0-01D9EE7DD903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7707BC4D-6090-44CF-B304-A54A46FAD32C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D28F4F-5E14-48C1-8353-4D6A8C657FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C14EB390-BA15-45C9-B971-D66CD98B0EDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BCF5A7C-202D-44F8-97D3-694F876050D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"748C5458-8F16-4DA4-8BDE-D00BF42DC8C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3EA559D-5184-4E19-8A32-ECA41C930AE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B82207E-7E19-4E0A-93E6-C631897793D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"716D8805-D461-4066-9BFD-1EA895E4B997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A02F04-6717-403D-8A6B-B365F74DEE00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7150819E-EFB5-4224-975C-84EDBBB2881D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E81F4068-35A1-4712-9B88-F6E574B2DE20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28DDB45D-1B19-4FAB-B985-F8E5D38A3ED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29794A8C-B1CC-492F-9A68-02EEE994743B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CBBDA12-AF2E-400B-979D-3657F1F2C15B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C7F55DC-38F5-4B19-A699-90E1D302A04B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC32DB11-4E23-492E-A00E-E0DBF9131C64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA2306E8-ABFD-4C37-A911-7B35A654147C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455DAAB8-83B4-44B9-B2F7-2DC9EA796898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F462360-3597-420B-ACB8-44A6F622C8B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39DED4C1-E7AF-48E0-8B1A-839A87E52992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96CA4E70-28BE-434C-811A-C16474CFD87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E77A9A46-517E-467B-A702-E6F6DD9FCD96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD485792-290B-4553-AAB2-DA7427DE7131\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB7139C7-3C02-46C9-8F89-CB517A706CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0AD00E6-A155-4CCB-B329-7B536BEBC976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D365DFD-C99B-4F33-9A90-1162C7A4D3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"671F6847-6855-41BF-A148-944AEEB32A5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7207B1F1-AF21-4C02-A163-4289503A026C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7CC0497-24F5-42ED-99A6-4C8642F73F08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"120DA9BF-1153-41C8-B80D-3F99E0E28A8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89812FA8-230C-4F62-8AA8-7F13FA86B805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D17DB28-2559-4837-8B4B-7CC722D73324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D92991EE-BB4A-499D-8F14-F7D0E32BE31E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56AE607-0AD0-487A-A266-C15EAF40F2CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"705971E9-7FB4-43EA-A1AE-C91865EADE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F481A851-D607-4CEF-87C5-147FFBC97D3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"355F4945-4FFA-469F-A799-815F371C637B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1432B59F-5A66-4A5A-B3F7-E297700ED9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"013DD522-1561-4468-A350-C872B78FC291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6907E1FE-760E-4557-A472-1A1F0052B82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62291CDD-A775-44B4-85F3-CE1D494F55FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"658EDFE2-6EC8-4DD3-AACA-C168F942712A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FCBE369-81ED-4C94-8C44-53C6F4A087CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90005E78-413A-47D7-82B3-A3011E6B118D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D764D126-4604-43DD-9A66-BDD32565D893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06067D8B-79BD-4982-909F-7C08BE5660C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9EC727B-AF92-460D-B61D-F45ECEEE5D56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5604A84-8240-45B6-9027-B03AA549CD5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B9846AE-1344-4EE4-9FDF-6CE17D9461FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25725655-EBDE-4538-8AE1-CF5C81F09C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A98F2654-46F3-4C63-A2C2-48B372C655B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4E206B-37BF-4D61-BE90-80BB65C0C582\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3598539F-0EEB-45D6-8BA5-A2A3F69D556C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60C5FC5B-BE2E-4BAC-AC23-58666BDEB553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3822447-EB80-4DF2-B7F2-471F55BA99C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BC99316-75AC-45EB-B6BB-DB014ED08ECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.2h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E275E7D-C89D-42DE-9301-C19A54FEE964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C98DED36-D4B5-48D6-964E-EEEE97936700\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/107612\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/107612\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\", \"name\": \"20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/107612\", \"name\": \"107612\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T18:28:42.410Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-1746\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-21T18:59:52.919534Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-21T19:01:19.770Z\"}}], \"cna\": {\"title\": \"Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"source\": {\"defect\": [[\"CSCvj25068\", \"CSCvj25124\"]], \"advisory\": \"cisco-sa-20190327-cmp-dos\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"CHANGED\", \"version\": \"3.0\", \"baseScore\": 7.4, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS and IOS XE Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.2.0SG\"}, {\"status\": \"affected\", \"version\": \"3.2.1SG\"}, {\"status\": \"affected\", \"version\": \"3.2.2SG\"}, {\"status\": \"affected\", \"version\": \"3.2.3SG\"}, {\"status\": \"affected\", \"version\": \"3.2.4SG\"}, {\"status\": \"affected\", \"version\": \"3.2.5SG\"}, {\"status\": \"affected\", \"version\": \"3.2.6SG\"}, {\"status\": \"affected\", \"version\": \"3.2.7SG\"}, {\"status\": \"affected\", \"version\": \"3.2.8SG\"}, {\"status\": \"affected\", \"version\": \"3.2.9SG\"}, {\"status\": \"affected\", \"version\": \"3.2.10SG\"}, {\"status\": \"affected\", \"version\": \"3.2.11SG\"}, {\"status\": \"affected\", \"version\": \"3.3.0SG\"}, {\"status\": \"affected\", \"version\": \"3.3.2SG\"}, {\"status\": \"affected\", \"version\": \"3.3.1SG\"}, {\"status\": \"affected\", \"version\": \"3.3.0XO\"}, {\"status\": \"affected\", \"version\": \"3.3.1XO\"}, {\"status\": \"affected\", \"version\": \"3.3.2XO\"}, {\"status\": \"affected\", \"version\": \"3.4.0SG\"}, {\"status\": \"affected\", \"version\": \"3.4.2SG\"}, {\"status\": \"affected\", \"version\": \"3.4.1SG\"}, {\"status\": \"affected\", \"version\": \"3.4.3SG\"}, {\"status\": \"affected\", \"version\": \"3.4.4SG\"}, {\"status\": \"affected\", \"version\": \"3.4.5SG\"}, {\"status\": \"affected\", \"version\": \"3.4.6SG\"}, {\"status\": \"affected\", \"version\": \"3.4.7SG\"}, {\"status\": \"affected\", \"version\": \"3.4.8SG\"}, {\"status\": \"affected\", \"version\": \"3.5.0E\"}, {\"status\": \"affected\", \"version\": \"3.5.1E\"}, {\"status\": \"affected\", \"version\": \"3.5.2E\"}, {\"status\": \"affected\", \"version\": \"3.5.3E\"}, {\"status\": \"affected\", \"version\": \"3.10.4S\"}, {\"status\": \"affected\", \"version\": \"3.12.0aS\"}, {\"status\": \"affected\", \"version\": \"3.6.0E\"}, {\"status\": \"affected\", \"version\": \"3.6.1E\"}, {\"status\": \"affected\", \"version\": \"3.6.0aE\"}, {\"status\": \"affected\", \"version\": \"3.6.0bE\"}, {\"status\": \"affected\", \"version\": \"3.6.2aE\"}, {\"status\": \"affected\", \"version\": \"3.6.2E\"}, {\"status\": \"affected\", \"version\": \"3.6.3E\"}, {\"status\": \"affected\", \"version\": \"3.6.4E\"}, {\"status\": \"affected\", \"version\": \"3.6.5E\"}, {\"status\": \"affected\", \"version\": \"3.6.6E\"}, {\"status\": \"affected\", \"version\": \"3.6.5aE\"}, {\"status\": \"affected\", \"version\": \"3.6.5bE\"}, {\"status\": \"affected\", \"version\": \"3.6.7E\"}, {\"status\": \"affected\", \"version\": \"3.6.8E\"}, {\"status\": \"affected\", \"version\": \"3.6.7aE\"}, {\"status\": \"affected\", \"version\": \"3.6.7bE\"}, {\"status\": \"affected\", \"version\": \"3.6.9E\"}, {\"status\": \"affected\", \"version\": \"3.6.10E\"}, {\"status\": \"affected\", \"version\": \"3.3.0SQ\"}, {\"status\": \"affected\", \"version\": \"3.3.1SQ\"}, {\"status\": \"affected\", \"version\": \"3.4.0SQ\"}, {\"status\": \"affected\", \"version\": \"3.4.1SQ\"}, {\"status\": \"affected\", \"version\": \"3.7.0E\"}, {\"status\": \"affected\", \"version\": \"3.7.1E\"}, {\"status\": \"affected\", \"version\": \"3.7.2E\"}, {\"status\": \"affected\", \"version\": \"3.7.3E\"}, {\"status\": \"affected\", \"version\": \"3.7.4E\"}, {\"status\": \"affected\", \"version\": \"3.7.5E\"}, {\"status\": \"affected\", \"version\": \"3.5.0SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.1SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.2SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.3SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.4SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.5SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.6SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.7SQ\"}, {\"status\": \"affected\", \"version\": \"3.5.8SQ\"}, {\"status\": \"affected\", \"version\": \"3.16.1S\"}, {\"status\": \"affected\", \"version\": \"3.16.0bS\"}, {\"status\": \"affected\", \"version\": \"3.16.10S\"}, {\"status\": \"affected\", \"version\": \"3.8.0E\"}, {\"status\": \"affected\", \"version\": \"3.8.1E\"}, {\"status\": \"affected\", \"version\": \"3.8.2E\"}, {\"status\": \"affected\", \"version\": \"3.8.3E\"}, {\"status\": \"affected\", \"version\": \"3.8.4E\"}, {\"status\": \"affected\", \"version\": \"3.8.5E\"}, {\"status\": \"affected\", \"version\": \"3.8.5aE\"}, {\"status\": \"affected\", \"version\": \"3.8.6E\"}, {\"status\": \"affected\", \"version\": \"3.8.7E\"}, {\"status\": \"affected\", \"version\": \"3.9.0E\"}, {\"status\": \"affected\", \"version\": \"3.9.1E\"}, {\"status\": \"affected\", \"version\": \"3.9.2E\"}, {\"status\": \"affected\", \"version\": \"3.9.2bE\"}, {\"status\": \"affected\", \"version\": \"16.9.2h\"}, {\"status\": \"affected\", \"version\": \"3.10.0E\"}, {\"status\": \"affected\", \"version\": \"3.10.1E\"}, {\"status\": \"affected\", \"version\": \"3.10.0cE\"}, {\"status\": \"affected\", \"version\": \"3.10.1aE\"}, {\"status\": \"affected\", \"version\": \"3.10.1sE\"}, {\"status\": \"affected\", \"version\": \"16.12.1\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"datePublic\": \"2019-03-27T00:00:00.000Z\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\", \"name\": \"20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}, {\"url\": \"http://www.securityfocus.com/bid/107612\", \"name\": \"107612\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2019-03-29T06:06:05.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"7.4\", \"vectorString\": \"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\"}}, \"source\": {\"defect\": [[\"CSCvj25068\", \"CSCvj25124\"]], \"advisory\": \"cisco-sa-20190327-cmp-dos\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"3.2.0SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.1SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.2SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.3SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.4SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.5SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.6SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.7SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.8SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.9SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.10SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.2.11SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.0SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.2SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.1SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.0XO\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.1XO\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.2XO\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.0SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.2SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.1SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.3SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.4SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.5SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.6SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.7SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.8SG\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.4S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.12.0aS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.0aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.0bE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.2aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.6E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.5bE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.8E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.7bE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.9E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.6.10E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.0SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.3.1SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.0SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.4.1SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.7.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.0SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.1SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.2SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.3SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.4SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.5SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.6SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.7SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.5.8SQ\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.1S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.0bS\", \"version_affected\": \"=\"}, {\"version_value\": \"3.16.10S\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.3E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.4E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.5E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.5aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.6E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.8.7E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.2E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.9.2bE\", \"version_affected\": \"=\"}, {\"version_value\": \"16.9.2h\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.0E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1E\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.0cE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1aE\", \"version_affected\": \"=\"}, {\"version_value\": \"3.10.1sE\", \"version_affected\": \"=\"}, {\"version_value\": \"16.12.1\", \"version_affected\": \"=\"}]}, \"product_name\": \"Cisco IOS and IOS XE Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\", \"name\": \"20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"refsource\": \"CISCO\"}, {\"url\": \"http://www.securityfocus.com/bid/107612\", \"name\": \"107612\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-20\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-1746\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2019-03-27T16:00:00-0700\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2019-1746\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-21T19:41:58.266Z\", \"dateReserved\": \"2018-12-06T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2019-03-27T23:45:13.618Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2019-AVI-133
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | IOS XE | Cisco IOS XE | ||
| Cisco | N/A | Cisco ASR 900 RSP3 | ||
| Cisco | IOS | Cisco IOS | ||
| Cisco | N/A | Cisco Catalyst 4500/4500X | ||
| Cisco | IOS XE | Routeurs Cisco avec un module Sierra Wireless WWAN cellular interface et exécutant une version logicielle Cisco IOS Release 15.8(3)M ou Cisco IOS XE Release 16.10.1 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco IOS XE",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASR 900 RSP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 4500/4500X",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Routeurs Cisco avec un module Sierra Wireless WWAN cellular interface et ex\u00e9cutant une version logicielle Cisco IOS Release 15.8(3)M ou Cisco IOS XE Release 16.10.1",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1752"
},
{
"name": "CVE-2019-1743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1743"
},
{
"name": "CVE-2019-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1749"
},
{
"name": "CVE-2019-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1739"
},
{
"name": "CVE-2019-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1753"
},
{
"name": "CVE-2019-1751",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1751"
},
{
"name": "CVE-2019-1748",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1748"
},
{
"name": "CVE-2019-1755",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1755"
},
{
"name": "CVE-2019-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1747"
},
{
"name": "CVE-2019-1742",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1742"
},
{
"name": "CVE-2019-1741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1741"
},
{
"name": "CVE-2019-1738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1738"
},
{
"name": "CVE-2019-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1746"
},
{
"name": "CVE-2019-1756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1756"
},
{
"name": "CVE-2019-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1737"
},
{
"name": "CVE-2019-1754",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1754"
},
{
"name": "CVE-2019-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1745"
},
{
"name": "CVE-2019-1740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1740"
},
{
"name": "CVE-2019-1750",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1750"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-133",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-afu du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-nat64 du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-ipsla-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-ipsla-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-cmp-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-sms-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-sms-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-isdn du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-isdn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-xecmd du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xecmd"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-cmdinject du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinject"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-evss du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-evss"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-cmdinj du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinj"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-nbar du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nbar"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-pnp-cert du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-pnp-cert"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-rsp3-ospf du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-rsp3-ospf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-eta-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-eta-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-pe du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-pe"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-xeid du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xeid"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-privesc du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-privesc"
}
]
}
CERTFR-2019-AVI-133
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | IOS XE | Cisco IOS XE | ||
| Cisco | N/A | Cisco ASR 900 RSP3 | ||
| Cisco | IOS | Cisco IOS | ||
| Cisco | N/A | Cisco Catalyst 4500/4500X | ||
| Cisco | IOS XE | Routeurs Cisco avec un module Sierra Wireless WWAN cellular interface et exécutant une version logicielle Cisco IOS Release 15.8(3)M ou Cisco IOS XE Release 16.10.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cisco IOS XE",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ASR 900 RSP3",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 4500/4500X",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Routeurs Cisco avec un module Sierra Wireless WWAN cellular interface et ex\u00e9cutant une version logicielle Cisco IOS Release 15.8(3)M ou Cisco IOS XE Release 16.10.1",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1752"
},
{
"name": "CVE-2019-1743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1743"
},
{
"name": "CVE-2019-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1749"
},
{
"name": "CVE-2019-1739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1739"
},
{
"name": "CVE-2019-1753",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1753"
},
{
"name": "CVE-2019-1751",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1751"
},
{
"name": "CVE-2019-1748",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1748"
},
{
"name": "CVE-2019-1755",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1755"
},
{
"name": "CVE-2019-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1747"
},
{
"name": "CVE-2019-1742",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1742"
},
{
"name": "CVE-2019-1741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1741"
},
{
"name": "CVE-2019-1738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1738"
},
{
"name": "CVE-2019-1746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1746"
},
{
"name": "CVE-2019-1756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1756"
},
{
"name": "CVE-2019-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1737"
},
{
"name": "CVE-2019-1754",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1754"
},
{
"name": "CVE-2019-1745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1745"
},
{
"name": "CVE-2019-1740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1740"
},
{
"name": "CVE-2019-1750",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1750"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-133",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-afu du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-afu"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-nat64 du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-ipsla-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-ipsla-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-cmp-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-sms-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-sms-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-isdn du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-isdn"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-xecmd du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xecmd"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-cmdinject du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinject"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-evss du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-evss"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-cmdinj du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-cmdinj"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-nbar du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nbar"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-pnp-cert du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-pnp-cert"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-rsp3-ospf du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-rsp3-ospf"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-eta-dos du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-eta-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-pe du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-pe"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-xeid du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-xeid"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20190327-iosxe-privesc du 27 mars 2017",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-iosxe-privesc"
}
]
}
BDU:2019-01318
Vulnerability from fstec - Published: 27.03.2019{
"CVSS 2.0": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "15.2(4)E (Cisco IOS), 15.0(2)SG5 (Cisco IOS), 15.1(2)SG3 (Cisco IOS), 3.7.0e (Cisco IOS XE), 3.7.1e (Cisco IOS XE), 3.7.2e (Cisco IOS XE), 3.7.4e (Cisco IOS XE), 3.7.5e (Cisco IOS XE), 3.7.3e (Cisco IOS XE), 15.2(2)E5b (Cisco IOS), 15.2(5a)E1 (Cisco IOS), 12.2(55)SE (Cisco IOS), 12.2(55)SE3 (Cisco IOS), 12.2(58)SE (Cisco IOS), 12.2(55)SE1 (Cisco IOS), 12.2(58)SE1 (Cisco IOS), 12.2(55)SE4 (Cisco IOS), 12.2(58)SE2 (Cisco IOS), 12.2(55)SE5 (Cisco IOS), 12.2(55)SE10 (Cisco IOS), 12.2(55)EX (Cisco IOS), 12.2(55)EX2 (Cisco IOS), 12.2(55)EX3 (Cisco IOS), 12.2(58)EX (Cisco IOS), 12.2(55)EY (Cisco IOS), 12.2(58)EZ (Cisco IOS), 12.2(60)EZ4 (Cisco IOS), 12.2(60)EZ5 (Cisco IOS), 15.0(1)EY (Cisco IOS), 15.0(1)EY1 (Cisco IOS), 15.0(1)EY2 (Cisco IOS), 15.0(2)EY (Cisco IOS), 15.0(2)EY1 (Cisco IOS), 15.0(2)EY2 (Cisco IOS), 15.0(2)EY3 (Cisco IOS), 15.0(1)SE (Cisco IOS), 15.0(2)SE (Cisco IOS), 15.0(1)SE1 (Cisco IOS), 15.0(1)SE2 (Cisco IOS), 15.0(1)SE3 (Cisco IOS), 15.0(2)SE1 (Cisco IOS), 15.0(2)SE2 (Cisco IOS), 15.0(2)SE3 (Cisco IOS), 15.0(2)SE4 (Cisco IOS), 15.0(2)SE5 (Cisco IOS), 15.0(2)SE6 (Cisco IOS), 15.0(2)SE7 (Cisco IOS), 15.0(2)SE8 (Cisco IOS), 15.0(2)SE9 (Cisco IOS), 15.0(2)SE10 (Cisco IOS), 15.0(2)SE11 (Cisco IOS), 15.0(2)SE10a (Cisco IOS), 15.0(2)SE12 (Cisco IOS), 15.1(1)SG (Cisco IOS), 15.1(2)SG (Cisco IOS), 15.1(1)SG1 (Cisco IOS), 15.1(1)SG2 (Cisco IOS), 15.1(2)SG1 (Cisco IOS), 15.1(2)SG2 (Cisco IOS), 15.1(2)SG4 (Cisco IOS), 15.1(2)SG6 (Cisco IOS), 15.1(2)SG7 (Cisco IOS), 15.1(2)SG8 (Cisco IOS), 15.1(2)SG8a (Cisco IOS), 15.0(2)EX10 (Cisco IOS), 15.0(2)EX11 (Cisco IOS), 15.0(2)EX13 (Cisco IOS), 15.0(2)EX12 (Cisco IOS), 15.2(1)E (Cisco IOS), 15.2(2)E (Cisco IOS), 15.2(1)E1 (Cisco IOS), 15.2(3)E (Cisco IOS), 15.2(1)E2 (Cisco IOS), 15.2(1)E3 (Cisco IOS), 15.2(2)E1 (Cisco IOS), 15.2(3)E1 (Cisco IOS), 15.2(2)E2 (Cisco IOS), 15.2(2)E3 (Cisco IOS), 15.2(2a)E2 (Cisco IOS), 15.2(3)E2 (Cisco IOS), 15.2(3a)E (Cisco IOS), 15.2(3)E3 (Cisco IOS), 15.2(3m)E2 (Cisco IOS), 15.2(4)E1 (Cisco IOS), 15.2(2)E4 (Cisco IOS), 15.2(2)E5 (Cisco IOS), 15.2(4)E2 (Cisco IOS), 15.2(4m)E1 (Cisco IOS), 15.2(3)E4 (Cisco IOS), 15.2(5)E (Cisco IOS), 15.2(4)E3 (Cisco IOS), 15.2(2)E6 (Cisco IOS), 15.2(5)E1 (Cisco IOS), 15.2(4m)E3 (Cisco IOS), 15.2(3m)E8 (Cisco IOS), 15.2(2)E5a (Cisco IOS), 15.2(3)E5 (Cisco IOS), 15.2(4o)E2 (Cisco IOS), 15.2(4)E4 (Cisco IOS), 15.2(2)E7 (Cisco IOS), 15.2(5)E2 (Cisco IOS), 15.2(4p)E1 (Cisco IOS), 15.2(6)E (Cisco IOS), 15.2(5)E2b (Cisco IOS), 15.2(4)E5 (Cisco IOS), 15.2(5)E2c (Cisco IOS), 15.2(4m)E2 (Cisco IOS), 15.2(4o)E3 (Cisco IOS), 15.2(6)E0a (Cisco IOS), 15.2(2)E7b (Cisco IOS), 15.2(4)E5a (Cisco IOS), 15.2(6)E0c (Cisco IOS), 15.0(2)EZ (Cisco IOS), 15.2(1)EY (Cisco IOS), 15.0(2)EJ (Cisco IOS), 15.0(2)EJ1 (Cisco IOS), 15.2(5)EX (Cisco IOS), 15.2(2)EB (Cisco IOS), 15.2(2)EB1 (Cisco IOS), 15.2(2)EB2 (Cisco IOS), 15.2(4)EC1 (Cisco IOS), 15.2(4)EC2 (Cisco IOS), 12.2(55)SE2 (Cisco IOS), 12.2(55)EX1 (Cisco IOS), 12.2(55)EZ (Cisco IOS), 15.0(2)EX (Cisco IOS), 15.0(2)EX1 (Cisco IOS), 15.0(2)EX2 (Cisco IOS), 15.0(2)EX3 (Cisco IOS), 15.0(2)EX4 (Cisco IOS), 15.0(2)EX5 (Cisco IOS), 15.0(2)EX6 (Cisco IOS), 15.0(2)EX7 (Cisco IOS), 15.0(2)EX8 (Cisco IOS), 15.0(2a)EX5 (Cisco IOS), 15.2(2b)E (Cisco IOS), 15.2(2a)E1 (Cisco IOS), 15.2(3m)E7 (Cisco IOS), 15.2(5a)E (Cisco IOS), 15.2(5b)E (Cisco IOS), 15.2(5c)E (Cisco IOS), 3.3.0XO (Cisco IOS XE), 3.4.0SG (Cisco IOS XE), 3.4.2SG (Cisco IOS XE), 3.4.1SG (Cisco IOS XE), 3.4.3SG (Cisco IOS XE), 3.4.4SG (Cisco IOS XE), 3.4.5SG (Cisco IOS XE), 3.4.6SG (Cisco IOS XE), 3.4.7SG (Cisco IOS XE), 3.4.8SG (Cisco IOS XE), 3.5.0E (Cisco IOS XE), 3.5.1E (Cisco IOS XE), 3.5.2E (Cisco IOS XE), 3.5.3E (Cisco IOS XE), 3.6.0E (Cisco IOS XE), 3.6.1E (Cisco IOS XE), 3.6.0aE (Cisco IOS XE), 3.6.0bE (Cisco IOS XE), 3.6.2aE (Cisco IOS XE), 3.6.2E (Cisco IOS XE), 3.6.3E (Cisco IOS XE), 3.6.4E (Cisco IOS XE), 3.6.5E (Cisco IOS XE), 3.6.6E (Cisco IOS XE), 3.6.5aE (Cisco IOS XE), 3.6.7E (Cisco IOS XE), 3.6.7aE (Cisco IOS XE), 3.6.7bE (Cisco IOS XE), 3.8.0E (Cisco IOS XE), 3.8.1E (Cisco IOS XE), 3.8.2E (Cisco IOS XE), 3.8.3E (Cisco IOS XE), 3.8.4E (Cisco IOS XE), 3.8.5E (Cisco IOS XE), 3.8.5aE (Cisco IOS XE), 3.9.0E (Cisco IOS XE), 3.9.1E (Cisco IOS XE), 3.9.2E (Cisco IOS XE), 3.9.2bE (Cisco IOS XE), 3.10.0E (Cisco IOS XE), 3.10.0cE (Cisco IOS XE), 3.10.4S (Cisco IOS XE), 3.12.0aS (Cisco IOS XE), 3.16.1S (Cisco IOS XE), 3.16.0bS (Cisco IOS XE), 3.2.1SG (Cisco IOS XE), 3.2.2SG (Cisco IOS XE), 3.2.3SG (Cisco IOS XE), 3.2.4SG (Cisco IOS XE), 3.2.5SG (Cisco IOS XE), 3.2.6SG (Cisco IOS XE), 3.2.7SG (Cisco IOS XE), 3.2.8SG (Cisco IOS XE), 3.2.9SG (Cisco IOS XE), 3.2.10SG (Cisco IOS XE), 3.2.11SG (Cisco IOS XE), 3.3.0SG (Cisco IOS XE), 3.3.2SG (Cisco IOS XE), 3.3.1SG (Cisco IOS XE), 3.3.0SQ (Cisco IOS XE), 3.3.1SQ (Cisco IOS XE), 3.4.0SQ (Cisco IOS XE), 3.4.1SQ (Cisco IOS XE), 3.5.0SQ (Cisco IOS XE), 3.5.1SQ (Cisco IOS XE), 3.5.2SQ (Cisco IOS XE), 3.5.3SQ (Cisco IOS XE), 3.5.4SQ (Cisco IOS XE), 3.5.5SQ (Cisco IOS XE), 3.5.6SQ (Cisco IOS XE), 3.5.7SQ (Cisco IOS XE), 15.2(4s)E1 (Cisco IOS), 15.2(3)EA1 (Cisco IOS), 15.2(4a)EA5 (Cisco IOS), 15.1(3)SVO2 (Cisco IOS), 12.2(6)I1 (Cisco IOS), 15.1(3)SVP1 (Cisco IOS), 3.6.10E (Cisco IOS XE), 15.1(3)SVK4b (Cisco IOS), 15.1(3)SVK4c (Cisco IOS), 3.2.0SG (Cisco IOS XE), 3.6.9E (Cisco IOS XE), 3.5.8SQ (Cisco IOS XE), 3.16.10S (Cisco IOS XE), 3.8.6E (Cisco IOS XE), 3.8.7E (Cisco IOS XE), 16.9.2h (Cisco IOS XE), 16.12.1 (Cisco IOS XE), 3.10.1E (Cisco IOS XE), 3.10.1aE (Cisco IOS XE), 3.10.1sE (Cisco IOS XE), 12.2(22)S (Cisco IOS), 12.2(20)S (Cisco IOS), 12.2(18)S (Cisco IOS), 12.2(25)S (Cisco IOS), 12.2(20)S2a (Cisco IOS), 12.2(20)S4a (Cisco IOS), 12.2(20)S5 (Cisco IOS), 12.2(18)S1 (Cisco IOS), 12.2(20)S4 (Cisco IOS), 12.2(18)S2 (Cisco IOS), 12.2(18)S4 (Cisco IOS), 12.2(25)S2 (Cisco IOS), 12.2(20)S2 (Cisco IOS), 12.2(18)S3 (Cisco IOS), 12.2(20)S6 (Cisco IOS), 12.2(20)S3 (Cisco IOS), 12.2(25)S1 (Cisco IOS), 12.2(20)S1 (Cisco IOS), 12.1(9)EX (Cisco IOS), 12.1(22)EA8 (Cisco IOS), 12.1(20)EA1b (Cisco IOS), 12.1(11)EA1a (Cisco IOS), 12.1(22)EA12 (Cisco IOS), 12.1(22)EA6 (Cisco IOS), 12.1(14)EA1 (Cisco IOS), 12.1(9)EA1d (Cisco IOS), 12.1(19)EA1b (Cisco IOS), 12.1(22)EA3 (Cisco IOS), 12.1(14)EA1b (Cisco IOS), 12.1(20)EA2 (Cisco IOS), 12.1(22)EA4a (Cisco IOS), 12.1(8)EA1b (Cisco IOS), 12.1(14)EA1a (Cisco IOS), 12.1(22)EA5a (Cisco IOS), 12.1(22)EA13 (Cisco IOS), 12.1(22)EA1a (Cisco IOS), 12.1(12c)EA1a (Cisco IOS), 12.1(13)EA1c (Cisco IOS), 12.1(22)EA1b (Cisco IOS), 12.1(8)EA1c (Cisco IOS), 12.1(22)EA5 (Cisco IOS), 12.1(22)EA10b (Cisco IOS), 12.1(6)EA2a (Cisco IOS), 12.1(20)EA1a (Cisco IOS), 12.1(22)EA11 (Cisco IOS), 12.1(22)EA7 (Cisco IOS), 12.1(6)EA2 (Cisco IOS), 12.1(9)EA1a (Cisco IOS), 12.1(22)EA1 (Cisco IOS), 12.1(13)EA1b (Cisco IOS), 12.1(20)EA1 (Cisco IOS), 12.1(13)EA1 (Cisco IOS), 12.1(9)EA1c (Cisco IOS), 12.1(6)EA1a (Cisco IOS), 12.1(19)EA1a (Cisco IOS), 12.1(22)EA2 (Cisco IOS), 12.1(19)EA1d (Cisco IOS), 12.1(22)EA9 (Cisco IOS), 12.1(6)EA2b (Cisco IOS), 12.1(9)EA1 (Cisco IOS), 12.1(22)EA14 (Cisco IOS), 12.1(6)EA2c (Cisco IOS), 12.1(11)EA1 (Cisco IOS), 12.1(22)EA8a (Cisco IOS), 12.1(12c)EA1 (Cisco IOS), 12.1(22)EA10a (Cisco IOS), 12.1(19)EA1 (Cisco IOS), 12.1(19)EA1c (Cisco IOS), 12.1(6)EA1 (Cisco IOS), 12.1(22)EA10 (Cisco IOS), 12.1(22)EA4 (Cisco IOS), 12.1(13)EA1a (Cisco IOS), 12.1(22)EA6a (Cisco IOS), 12.2(14)SZ (Cisco IOS), 12.2(14)SZ5 (Cisco IOS), 12.2(14)SZ6 (Cisco IOS), 12.2(14)SZ3 (Cisco IOS), 12.2(14)SZ4 (Cisco IOS), 12.2(14)SZ1 (Cisco IOS), 12.2(14)SZ2 (Cisco IOS), 12.2(25)EW (Cisco IOS), 12.2(20)EWA (Cisco IOS), 12.2(25)EWA (Cisco IOS), 12.2(25)EWA6 (Cisco IOS), 12.2(25)EWA5 (Cisco IOS), 12.2(25)EWA1 (Cisco IOS), 12.2(25)EWA10 (Cisco IOS), 12.2(25)EWA8 (Cisco IOS), 12.2(20)EWA1 (Cisco IOS), 12.2(25)EWA11 (Cisco IOS), 12.2(25)EWA9 (Cisco IOS), 12.2(25)EWA2 (Cisco IOS), 12.2(25)EWA14 (Cisco IOS), 12.2(25)EWA4 (Cisco IOS), 12.2(20)EWA3 (Cisco IOS), 12.2(25)EWA3 (Cisco IOS), 12.2(25)EWA7 (Cisco IOS), 12.2(20)EWA4 (Cisco IOS), 12.2(25)EWA12 (Cisco IOS), 12.2(25)EWA13 (Cisco IOS), 12.2(20)EWA2 (Cisco IOS), 12.2(35)SE (Cisco IOS), 12.2(18)SE (Cisco IOS), 12.2(20)SE (Cisco IOS), 12.2(25)SE (Cisco IOS), 12.2(37)SE (Cisco IOS), 12.2(53)SE1 (Cisco IOS), 12.2(25)SE2 (Cisco IOS), 12.2(40)SE2 (Cisco IOS), 12.2(46)SE (Cisco IOS), 12.2(46)SE2 (Cisco IOS), 12.2(50)SE2 (Cisco IOS), 12.2(35)SE5 (Cisco IOS), 12.2(50)SE1 (Cisco IOS), 12.2(44)SE2 (Cisco IOS), 12.2(20)SE3 (Cisco IOS), 12.2(35)SE1 (Cisco IOS), 12.2(50)SE5 (Cisco IOS), 12.2(44)SE1 (Cisco IOS), 12.2(53)SE (Cisco IOS), 12.2(37)SE1 (Cisco IOS), 12.2(25)SE3 (Cisco IOS), 12.2(35)SE3 (Cisco IOS), 12.2(44)SE4 (Cisco IOS), 12.2(40)SE (Cisco IOS), 12.2(44)SE (Cisco IOS), 12.2(52)SE (Cisco IOS), 12.2(50)SE3 (Cisco IOS), 12.2(35)SE2 (Cisco IOS), 12.2(18)SE1 (Cisco IOS), 12.2(40)SE1 (Cisco IOS), 12.2(20)SE1 (Cisco IOS), 12.2(44)SE6 (Cisco IOS), 12.2(44)SE3 (Cisco IOS), 12.2(53)SE2 (Cisco IOS), 12.2(52)SE1 (Cisco IOS), 12.2(46)SE1 (Cisco IOS), 12.2(20)SE2 (Cisco IOS), 12.2(54)SE (Cisco IOS), 12.2(44)SE5 (Cisco IOS), 12.2(50)SE4 (Cisco IOS), 12.2(50)SE (Cisco IOS), 12.2(20)SE4 (Cisco IOS), 12.1(14)AZ (Cisco IOS), 12.2(20)EU (Cisco IOS), 12.2(20)EU1 (Cisco IOS), 12.2(20)EU2 (Cisco IOS), 12.2(20)EX (Cisco IOS), 12.2(44)EX (Cisco IOS), 12.2(40)EX3 (Cisco IOS), 12.2(40)EX (Cisco IOS), 12.2(52)EX (Cisco IOS), 12.2(44)EX1 (Cisco IOS), 12.2(40)EX2 (Cisco IOS), 12.2(40)EX1 (Cisco IOS), 12.2(46)EX (Cisco IOS), 12.2(52)EX1 (Cisco IOS), 12.2(25)SEB (Cisco IOS), 12.2(25)SEB2 (Cisco IOS), 12.2(25)SEB1 (Cisco IOS), 12.2(25)SEB4 (Cisco IOS), 12.2(25)SEB3 (Cisco IOS), 12.2(25)SEA (Cisco IOS), 12.2(25)EY (Cisco IOS), 12.2(46)EY (Cisco IOS), 12.2(25)EY1 (Cisco IOS), 12.2(53)EY (Cisco IOS), 12.2(25)EY3 (Cisco IOS), 12.2(37)EY (Cisco IOS), 12.2(25)EY2 (Cisco IOS), 12.2(25)EY4 (Cisco IOS), 12.2(25)EZ (Cisco IOS), 12.2(25)EZ1 (Cisco IOS), 12.2(53)EZ (Cisco IOS), 12.2(25)SEC (Cisco IOS), 12.2(25)SEC2 (Cisco IOS), 12.2(25)SEC1 (Cisco IOS), 12.2(31)SG (Cisco IOS), 12.2(25)SG (Cisco IOS), 12.2(37)SG (Cisco IOS), 12.2(44)SG (Cisco IOS), 12.2(50)SG3 (Cisco IOS), 12.2(31)SG1 (Cisco IOS), 12.2(31)SG3 (Cisco IOS), 12.2(50)SG6 (Cisco IOS), 12.2(53)SG1 (Cisco IOS), 12.2(46)SG (Cisco IOS), 12.2(25)SG1 (Cisco IOS), 12.2(53)SG2 (Cisco IOS), 12.2(50)SG5 (Cisco IOS), 12.2(37)SG1 (Cisco IOS), 12.2(53)SG3 (Cisco IOS), 12.2(50)SG8 (Cisco IOS), 12.2(25)SG3 (Cisco IOS), 12.2(50)SG2 (Cisco IOS), 12.2(40)SG (Cisco IOS), 12.2(25)SG2 (Cisco IOS), 12.2(54)SG1 (Cisco IOS), 12.2(44)SG1 (Cisco IOS), 12.2(50)SG1 (Cisco IOS), 12.2(52)SG (Cisco IOS), 12.2(54)SG (Cisco IOS), 12.2(31)SG2 (Cisco IOS), 12.2(50)SG (Cisco IOS), 12.2(25)SG4 (Cisco IOS), 12.2(50)SG7 (Cisco IOS), 12.2(53)SG4 (Cisco IOS), 12.2(50)SG4 (Cisco IOS), 12.2(46)SG1 (Cisco IOS), 12.2(53)SG5 (Cisco IOS), 12.2(53)SG6 (Cisco IOS), 12.2(53)SG7 (Cisco IOS), 12.2(53)SG8 (Cisco IOS), 12.2(53)SG9 (Cisco IOS), 12.2(53)SG10 (Cisco IOS), 12.2(53)SG11 (Cisco IOS), 12.2(25)FX (Cisco IOS), 12.2(25)FY (Cisco IOS), 12.2(25)SEF (Cisco IOS), 12.2(25)SEF1 (Cisco IOS), 12.2(25)SEF2 (Cisco IOS), 12.2(25)SEF3 (Cisco IOS), 12.2(25)SEE (Cisco IOS), 12.2(25)SEE1 (Cisco IOS), 12.2(25)SEE3 (Cisco IOS), 12.2(25)SEE4 (Cisco IOS), 12.2(25)SEE2 (Cisco IOS), 12.2(25)SED (Cisco IOS), 12.2(25)SED1 (Cisco IOS), 12.2(31)SGA (Cisco IOS), 12.2(31)SGA3 (Cisco IOS), 12.2(31)SGA2 (Cisco IOS), 12.2(31)SGA10 (Cisco IOS), 12.2(31)SGA5 (Cisco IOS), 12.2(31)SGA4 (Cisco IOS), 12.2(31)SGA11 (Cisco IOS), 12.2(31)SGA6 (Cisco IOS), 12.2(31)SGA1 (Cisco IOS), 12.2(31)SGA7 (Cisco IOS), 12.2(31)SGA8 (Cisco IOS), 12.2(31)SGA9 (Cisco IOS), 12.2(25)SEG (Cisco IOS), 12.2(25)SEG1 (Cisco IOS), 12.2(25)SEG3 (Cisco IOS), 12.2(25)FZ (Cisco IOS), 12.2(52)XO (Cisco IOS), 12.2(54)XO (Cisco IOS), 12.2(40)XO (Cisco IOS), 12.2(44)SQ (Cisco IOS), 12.2(44)SQ2 (Cisco IOS), 12.2(50)SQ2 (Cisco IOS), 12.2(50)SQ1 (Cisco IOS), 12.2(50)SQ (Cisco IOS), 12.2(50)SQ3 (Cisco IOS), 12.2(50)SQ4 (Cisco IOS), 12.2(50)SQ5 (Cisco IOS), 12.2(50)SQ6 (Cisco IOS), 12.2(50)SQ7 (Cisco IOS), 15.0(1)XO1 (Cisco IOS), 15.0(1)XO (Cisco IOS), 15.0(2)XO (Cisco IOS), 12.2(54)WO (Cisco IOS), 12.2(27)SBK9 (Cisco IOS), 15.0(2)SE13 (Cisco IOS), 15.0(2)SG (Cisco IOS), 15.0(2)SG1 (Cisco IOS), 15.0(2)SG2 (Cisco IOS), 15.0(2)SG3 (Cisco IOS), 15.0(2)SG4 (Cisco IOS), 15.0(2)SG6 (Cisco IOS), 15.0(2)SG7 (Cisco IOS), 15.0(2)SG8 (Cisco IOS), 15.0(2)SG9 (Cisco IOS), 15.0(2)SG10 (Cisco IOS), 15.0(2)SG11 (Cisco IOS), 15.1(2)SY15 (Cisco IOS), 12.4(25e)JAZ1 (Cisco IOS), 15.2(2)E8 (Cisco IOS), 15.2(6)E1 (Cisco IOS), 15.2(4)E6 (Cisco IOS), 15.2(2)E9 (Cisco IOS), 15.2(6)E1a (Cisco IOS), 15.2(4)E7 (Cisco IOS), 15.2(6)E1s (Cisco IOS), 15.2(2)E10 (Cisco IOS), 15.2(2)E9a (Cisco IOS), 15.2(4s)E2 (Cisco IOS), 15.1(3)MRA3 (Cisco IOS), 15.2(4)JN1 (Cisco IOS), 15.2(2)SC1 (Cisco IOS), 15.2(2)SC3 (Cisco IOS), 15.2(2)SC4 (Cisco IOS), 15.2(4)JAZ1 (Cisco IOS), 15.5(3)S10 (Cisco IOS), 15.2(2)EA; (Cisco IOS), 15.2(2)EA1 (Cisco IOS), 15.2(2)EA2 (Cisco IOS), 15.2(3)EA (Cisco IOS), 15.2(4)EA (Cisco IOS), 15.2(4)EA1 (Cisco IOS), 15.2(2)EA3 (Cisco IOS), 15.2(4)EA3 (Cisco IOS), 15.2(5)EA (Cisco IOS), 15.2(4)EA4 (Cisco IOS), 15.2(4)EA2 (Cisco IOS), 15.2(4)EA5 (Cisco IOS), 15.2(4)EA6 (Cisco IOS), 15.2(4)EA7 (Cisco IOS), 15.2(4)EA8 (Cisco IOS), 15.2(4)EA9 (Cisco IOS), 15.0(2)SQD (Cisco IOS), 15.0(2)SQD1 (Cisco IOS), 15.0(2)SQD2 (Cisco IOS), 15.0(2)SQD3 (Cisco IOS), 15.0(2)SQD4 (Cisco IOS), 15.0(2)SQD5 (Cisco IOS), 15.0(2)SQD6 (Cisco IOS), 15.0(2)SQD7 (Cisco IOS), 15.0(2)SQD8 (Cisco IOS), 15.5(1)SY4 (Cisco IOS)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.03.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.04.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-01318",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-1746",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Cisco IOS, Cisco IOS XE",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0443 Cluster Management Protocol (CMP) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco IOS \u0438 Cisco IOS XE, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043f\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0443 Cluster Management Protocol (CMP) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco IOS \u0438 Cisco IOS XE \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 CMP-\u043f\u0430\u043a\u0435\u0442\u043e\u0432",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,1)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,4)"
}
CISCO-SA-20190327-CMP-DOS
Vulnerability from csaf_cisco - Published: 2019-03-27 16:00 - Updated: 2019-03-27 16:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
12.2(46)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEF2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEF3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(18)SO1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(27)SBA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(46)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SQ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XO1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(46)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(46)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SQ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(35)SE5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(52)XO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EZ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEE4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SQ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(54)XO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)EX3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(28a)ZV1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(37)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(54)WO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SQ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EWA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(58)EZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(35)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)XO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SE5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(37)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEB2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(17b)SXA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(52)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(35)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EU1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(28)ZV1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)EX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SE4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEB4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)EZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA14
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EY3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(54)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(52)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(58)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(33)STE0
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(37)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(35)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)XO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(52)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(18)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(54)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SE6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEB3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)EX2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SQ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(40)EX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EWA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(52)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(46)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EWA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EU2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(18)SO3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(46)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(29)SV2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(54)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SE5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SE4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)EZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(18)SO2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SED1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA13
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EY4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(46)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EWA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(52)EX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)S6a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)SE4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(27)SBK9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SQ3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)EX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(58)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)EX2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(58)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)XO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)EX3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SQ4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(58)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)EY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SQ5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(1)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(1)EY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EY1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EJ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SC1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EY2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SQ6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EY3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)MRA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EJ1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(60)EZ4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(53)SG11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)MRA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVH
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG1b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD6a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(50)SQ7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(60)EZ5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVH2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2b)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2a)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2a)EX5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(1)SD8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4d
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG1c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG3a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG3b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVH4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2a)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3a)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)EA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SC3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)SC4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(2)S3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3m)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG3c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(3)S0e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EB1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4e
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4f
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2a)SE9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.4(3)S0f
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4m)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3)E4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)EB2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(2)SG8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3m)E7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5a)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5)EA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5b)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EC1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4m)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(3m)E8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E5a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5c)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE10a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E5b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4n)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4o)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EC2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5a)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)E4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX13
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4p)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(6)E
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)E5
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(5)E2c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4m)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4o)E3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4q)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(6)E0a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(6)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.3(3)JAA1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(55)SE13
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)EX12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVB2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVF4c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVG1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVH4a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI2a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI31a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI31b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI3b
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVI3c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVJ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVJ2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(6)E0c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)E6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E9
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SQD8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SE12
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(6)E1a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)E7
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(6)E1s
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4)EA8
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4s)E1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(6)I1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(2)E9a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.2(4s)E2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.0(2)SG11a
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(60)EZ16
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVR1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVS
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVR2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVS1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVR3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVT1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVT2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVV1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.5(3)S10c
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVT3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVV2
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVT4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU11
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVW1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVV3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU20
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVX1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVV4
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVU21
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
15.1(3)SVR10
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.1(9)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.1(14)AZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEF
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EU
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EWA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)FZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EWA6
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEE1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(35)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEF1
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(18)SO
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(18)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(20)EX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)EZ
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)FX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)FY
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEB
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEC
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SED
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(28)ZV
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(28)ZX
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(31)SGA
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(33)ZW
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(37)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(37)SE
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(44)SG
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
12.2(25)SEE3
Cisco / IOS
|
— |
Vendor Fix
fix
|
|
|
3.2.0SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.1SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.3.0SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.2SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.3SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.4SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.5SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.3.2SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.0SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.2SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.3.1SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.1SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.0E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.3SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.4SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.5SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.1E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.2E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.3E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.0E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.1E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.6SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.7SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.8SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.9SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.3.0SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.3.1SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.0SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.1SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.7.0E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.10SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.6SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.0SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.0bE
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.7.1E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.7.2E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.3E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.7SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.1SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.2SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.4E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.7.3E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.0E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.1E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.3SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.5E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.7.4E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.9.0E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.2E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.7.5E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.6E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.3E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.4SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.5aE
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.2.11SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.4.8SG
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.5bE
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.9.1E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.4E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.7E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.5SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.6SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.9.2E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.18.2aSP
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.5E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.7SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.10.0E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.9.2bE
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.11.1
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.10.1E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.8E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.5aE
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.10.0cE
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.6E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.6.9E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.5.8SQ
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.10.1aE
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.8.7E
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
3.10.1sE
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.6.5
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.1a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.3
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.1b
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.6.5a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.11.1a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.2s
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.1s
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.1c
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.1e
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.8.3
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.6.5b
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.3h
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.7.4
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.1d
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.11.1b
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.2
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.11.2
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.6.7
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.11.1s
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.4
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.3s
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.1f
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.3a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.11.1c
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1s
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.10.1g
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1c
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1w
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.2
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.4c
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.6.7a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1y
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.2a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.1.1a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.3
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.2s
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1x
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.1.1s
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1t
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.2t
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.5f
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.6.8
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.3s
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1z
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.3a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.1.2
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.1.1t
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.6
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.7
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.1.3
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.6.9
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.8
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1z1
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.4.1c
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.12.1z2
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.6.10
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.6.1y
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.8a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
16.9.8b
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.5.1c
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
|
|
17.12.6a
Cisco / Cisco IOS XE Software
|
— |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/c… | self |
| https://sec.cloudapps.cisco.com/security/center/v… | external |
| https://sec.cloudapps.cisco.com/security/center/r… | external |
| https://sec.cloudapps.cisco.com/security/center/c… | external |
| https://sec.cloudapps.cisco.com/security/center/v… | external |
| https://www.cisco.com/c/en/us/about/security-cent… | external |
| https://www.cisco.com/c/en/us/about/security-cent… | external |
| https://www.cisco.com/c/en/us/products/end-user-l… | external |
| https://www.cisco.com/go/psirt | external |
| https://www.cisco.com/c/en/us/support/web/tsd-cis… | external |
| https://sec.cloudapps.cisco.com/security/center/s… | external |
| https://sec.cloudapps.cisco.com/security/center/s… | external |
| https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/… | external |
| https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/… | external |
| https://www.cisco.com/c/en/us/td/docs/switches/la… | external |
| https://www.cisco.com/c/en/us/products/software/s… | external |
| https://sec.cloudapps.cisco.com/security/center/r… | external |
{
"document": {
"acknowledgments": [
{
"summary": "This vulnerability was found during the resolution of a Cisco TAC support case."
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"notes": [
{
"category": "summary",
"text": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device.\r\n\r\nThe vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos\"]\r\n\r\nThis advisory is part of the March 27, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 19 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-71135\"].",
"title": "Summary"
},
{
"category": "general",
"text": "This vulnerability affects Cisco Catalyst Switches that are running a vulnerable release of Cisco IOS or IOS XE Software when the switch meets all the following conditions:\r\n\r\nCMP is enabled. On some platforms, CMP is enabled by default.\r\nThe switch is configured to be part of a cluster domain.\r\nThe switch has a role of command switch or member switch.\r\n\r\nFor information about which Cisco IOS and IOS XE Software releases are vulnerable, see the Fixed Software [\"#fs\"] section of this advisory.\r\n Determining Whether the Switch Has a Vulnerable Configuration\r\nThere are two methods for determining whether the switch has a vulnerable configuration.\r\n\r\nOption 1: Using the show cluster | include cluster Command\r\n\r\nTo determine the status of CMP on a device and verify that is configured to be part of a cluster domain, use the show cluster | include cluster privileged EXEC command on the device. The following example shows the output of the show cluster | include cluster command on a Cisco Catalyst Switch that has CMP enabled and that is also part of a cluster domain.\r\n\r\n\r\nSWITCH#show cluster | include cluster\r\n \u003cROLE\u003e for cluster \u003cCLUSTER_NAME\u003e\r\n\n\r\nIf this command does not exist, or if it produces any other output, the device is not affected by the vulnerability described in this advisory.\r\n\r\nOption 2: Using the show running-config [all] Command\r\n\r\nTo determine whether a device is configured with CMP enabled, use the show running-config all | include cluster run privileged EXEC command on the device. The following example shows the output of the show running-config all | include cluster run command on a switch that has CMP enabled:\r\n\r\n\r\nSWITCH#show running-config all | include cluster run\n cluster run\r\n\r\n To determine whether a device has been configured to be part of a cluster domain either as a command switch or as a member switch, use the show running-config | include cluster commander|cluster member privileged EXEC command. On a switch that is not a part of a cluster domain, this command will result in empty output.\r\n\r\nThe following example shows the output of the show running-config | include cluster commander|cluster member command on a device that is configured to be part of cluster domain with a role of command switch.\r\n\r\n\r\nSWITCH#show running-config | include cluster commander|cluster member\ncluster member \u003cNUMBER\u003e mac-address \u003cMAC-ADDRESS\u003e\r\n\r\nThe following example shows the output of the show running-config | include cluster commander|cluster member command on a device that is configured to be part of cluster domain with a role of member switch.\r\n\r\n\r\nSWITCH#show running-config | include cluster commander|cluster member\ncluster commander-address \u003cMAC-ADDRESS\u003e \u003cCLUSTER-INFORMATION\u003e\r\n\r\nWhen Option 2 is used to assess the device, it is affected by the vulnerability described in this advisory only if both the following conditions are true:\r\n\r\nThe output of the show running-config all | include cluster run command includes the following exact string:\r\ncluster run\r\nThe show running-config | include cluster commander|cluster member command does not result in empty output.\r\n Determining the Cisco IOS Software Release\r\nTo determine which Cisco IOS Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS Software, the system banner displays text similar to Cisco Internetwork Operating System Software or Cisco IOS Software. The banner also displays the installed image name in parentheses, followed by the Cisco IOS Software release number and release name. Some Cisco devices do not support the show version command or may provide different output.\r\n\r\nThe following example shows the output of the command for a device that is running Cisco IOS Software Release 15.5(2)T1 and has an installed image name of C2951-UNIVERSALK9-M:\r\n\r\n\r\nRouter\u003e show version\r\n Cisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.5(2)T1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2015 by Cisco Systems, Inc. Compiled Mon 22-Jun-15 09:32 by prod_rel_team . . .\r\n\r\nFor information about the naming and numbering conventions for Cisco IOS Software releases, see the Cisco IOS and NX-OS Software Reference Guide [\"https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html\"].\r\nDetermining the Cisco IOS XE Software Release\r\nTo determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS XE Software, the system banner displays Cisco IOS Software, Cisco IOS XE Software, or similar text.\r\n\r\nThe following example shows the output of the command for a device that is running Cisco IOS XE Software Release 16.2.1 and has an installed image name of CAT3K_CAA-UNIVERSALK9-M:\r\n\r\n\r\nios-xe-device# show version\r\n Cisco IOS Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version Denali 16.2.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2016 by Cisco Systems, Inc. Compiled Sun 27-Mar-16 21:47 by mcpre . . .\r\n\r\nFor information about the naming and numbering conventions for Cisco IOS XE Software releases, see the Cisco IOS and NX-OS Software Reference Guide [\"https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html\"].",
"title": "Vulnerable Products"
},
{
"category": "general",
"text": "Only products listed in the Vulnerable Products [\"#vp\"] section of this advisory are known to be affected by this vulnerability.\r\n\r\nCisco has confirmed that this vulnerability does not affect Cisco IOS XR Software or Cisco NX-OS Software.",
"title": "Products Confirmed Not Vulnerable"
},
{
"category": "general",
"text": "CMP is a collection of underlying technologies that facilitate the management of a group of switches with use of a single IP address.\r\n\r\nIn each cluster, there is a master switch called the command switch, and the rest of the switches serve as member switches. The command switch provides the primary management interface for the entire cluster. Switches within a cluster domain use CMP to perform all signaling and configuration operations. CMP uses encapsulated Ethernet frames that contain a Subnetwork Access Protocol (SNAP) header with the Cisco Organizationally Unique Identifier (OUI) and CMP protocol identifier.\r\n\r\nThe vulnerability is due to insufficient input validation when processing CMP management packets. Due to the Layer 2 nature of CMP, only an attacker with access to the local network segment on which the targeted device resides could exploit the vulnerability described in this advisory. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.",
"title": "Details"
},
{
"category": "general",
"text": "Exploitation of this vulnerability could cause the affected switch to generate error messages similar to the following:\r\n\r\n\r\nMar 22 2019 10:18:29.180 EST: %DATACORRUPTION-CLUSTER_MEMBER_2-1-DATAINCONSISTENCY: copy error, -PC= 0x2A9E20z\r\n-Traceback= 463F74z 486D64z 2B8F2D8z 2A9E20z 2A7C74z 2A7EE8z 297DD08z 297A088z\r\nMar 22 2019 10:18:33.385 EST: %SYS-CLUSTER_MEMBER_2-3-TIMERNEG: Cannot start timer (0x48D3988) with negative offset (-805296368). -Process= \"Cluster Base\", ipl= 0, pid= 281\r\n-Traceback= 463F74z 1F22304z 2A17DCz 297DD08z 297A088z \nUnexpected exception to CPU vector 1 (undefined instruction), PC = 2 -Traceback= 0x2z 0x31EC60z 0x1655CF4z\r\n\r\nThe values printed after the -Traceback= text are version dependent. Customers are advised to contact their support organization to review the error messages and determine whether the device has been compromised by exploitation of this vulnerability.",
"title": "Indicators of Compromise"
},
{
"category": "general",
"text": "There are no workarounds that address this vulnerability.\r\n\r\nDisabling CMP would eliminate the exploit vector. Administrators can disable CMP by using the no cluster run command in global configuration mode. This action may be a suitable mitigation until switches that are affected by this vulnerability can be upgraded.",
"title": "Workarounds"
},
{
"category": "general",
"text": "Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttps://www.cisco.com/c/en/us/products/end-user-license-agreement.html [\"https://www.cisco.com/c/en/us/products/end-user-license-agreement.html\"]\r\n\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n Customers Without Service Contracts\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttps://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html [\"https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides a tool, the Cisco IOS Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"], that identifies any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use this tool to perform the following tasks:\r\n\r\nInitiate a search by choosing one or more releases from a drop-down list or uploading a file from a local system for the tool to parse\r\nEnter the output of the show version command for the tool to parse\r\nCreate a custom search by including all previously published Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication\r\n\r\nTo determine whether a release is affected by any published Cisco Security Advisory, use the Cisco IOS Software Checker [\"https://sec.cloudapps.cisco.com/security/center/softwarechecker.x\"] on Cisco.com or enter a Cisco IOS or IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S\u2014in the following field:\r\n\r\n\r\n\r\nBy default, the Cisco IOS Software Checker includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, use the Cisco IOS Software Checker on Cisco.com and check the Medium check box in the Impact Rating drop-down list.\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.\r\nNote: Starting with Cisco IOS XE Software Release 16.9.1, any upgrade will require Smart Licensing. Customers who plan to upgrade Cisco IOS XE to Release 16.9.1 or later are advised to consider the Smart Licensing requirement. The following documentation provides additional information: Smart Licensing [\"https://www.cisco.com/c/en/us/products/software/smart-accounts/software-licensing.html#~stickynav=3\"].",
"title": "Fixed Software"
},
{
"category": "general",
"text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.",
"title": "Vulnerability Policy"
},
{
"category": "general",
"text": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.",
"title": "Exploitation and Public Announcements"
},
{
"category": "general",
"text": "This vulnerability was found during the resolution of a Cisco TAC support case.",
"title": "Source"
},
{
"category": "legal_disclaimer",
"text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.",
"title": "Legal Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.",
"issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html",
"name": "Cisco",
"namespace": "https://wwww.cisco.com"
},
"references": [
{
"category": "self",
"summary": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"category": "external",
"summary": "Cisco Event Response: March 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-71135"
},
{
"category": "external",
"summary": "Cisco Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
},
{
"category": "external",
"summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"category": "external",
"summary": "Cisco Event Response: March 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication",
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-71135"
},
{
"category": "external",
"summary": "Cisco IOS and NX-OS Software Reference Guide",
"url": "https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html"
},
{
"category": "external",
"summary": "Cisco IOS and NX-OS Software Reference Guide",
"url": "https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html",
"url": "https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"
},
{
"category": "external",
"summary": "Cisco Security Advisories and Alerts page",
"url": "https://www.cisco.com/go/psirt"
},
{
"category": "external",
"summary": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html",
"url": "https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS Software Checker",
"url": "https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 2 Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3S Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"
},
{
"category": "external",
"summary": "Cisco\u0026nbsp;IOS XE 3SG Release Notes",
"url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"
},
{
"category": "external",
"summary": "Smart Licensing",
"url": "https://www.cisco.com/c/en/us/products/software/smart-accounts/software-licensing.html#~stickynav=3"
},
{
"category": "external",
"summary": "Security Vulnerability Policy",
"url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"
}
],
"title": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"tracking": {
"current_release_date": "2019-03-27T16:00:00+00:00",
"generator": {
"date": "2022-09-03T03:17:12+00:00",
"engine": {
"name": "TVCE"
}
},
"id": "cisco-sa-20190327-cmp-dos",
"initial_release_date": "2019-03-27T16:00:00+00:00",
"revision_history": [
{
"date": "2019-03-27T15:12:33+00:00",
"number": "1.0.0",
"summary": "Initial public release."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "12.2(20)S6a",
"product": {
"name": "12.2(20)S6a",
"product_id": "CSAFPID-107688"
}
}
],
"category": "product_version",
"name": "12.2S"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.1(9)EX",
"product": {
"name": "12.1(9)EX",
"product_id": "CSAFPID-35244"
}
}
],
"category": "product_version",
"name": "12.1EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)EW",
"product": {
"name": "12.2(25)EW",
"product_id": "CSAFPID-63912"
}
}
],
"category": "product_version",
"name": "12.2EW"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(20)EWA",
"product": {
"name": "12.2(20)EWA",
"product_id": "CSAFPID-60367"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA",
"product": {
"name": "12.2(25)EWA",
"product_id": "CSAFPID-60369"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA6",
"product": {
"name": "12.2(25)EWA6",
"product_id": "CSAFPID-62582"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA5",
"product": {
"name": "12.2(25)EWA5",
"product_id": "CSAFPID-103499"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA1",
"product": {
"name": "12.2(25)EWA1",
"product_id": "CSAFPID-103567"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA10",
"product": {
"name": "12.2(25)EWA10",
"product_id": "CSAFPID-103736"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA8",
"product": {
"name": "12.2(25)EWA8",
"product_id": "CSAFPID-104305"
}
},
{
"category": "service_pack",
"name": "12.2(20)EWA1",
"product": {
"name": "12.2(20)EWA1",
"product_id": "CSAFPID-104746"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA11",
"product": {
"name": "12.2(25)EWA11",
"product_id": "CSAFPID-104903"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA9",
"product": {
"name": "12.2(25)EWA9",
"product_id": "CSAFPID-105328"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA2",
"product": {
"name": "12.2(25)EWA2",
"product_id": "CSAFPID-105492"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA14",
"product": {
"name": "12.2(25)EWA14",
"product_id": "CSAFPID-105702"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA4",
"product": {
"name": "12.2(25)EWA4",
"product_id": "CSAFPID-106528"
}
},
{
"category": "service_pack",
"name": "12.2(20)EWA3",
"product": {
"name": "12.2(20)EWA3",
"product_id": "CSAFPID-106570"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA3",
"product": {
"name": "12.2(25)EWA3",
"product_id": "CSAFPID-106686"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA7",
"product": {
"name": "12.2(25)EWA7",
"product_id": "CSAFPID-106718"
}
},
{
"category": "service_pack",
"name": "12.2(20)EWA4",
"product": {
"name": "12.2(20)EWA4",
"product_id": "CSAFPID-106886"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA12",
"product": {
"name": "12.2(25)EWA12",
"product_id": "CSAFPID-107308"
}
},
{
"category": "service_pack",
"name": "12.2(25)EWA13",
"product": {
"name": "12.2(25)EWA13",
"product_id": "CSAFPID-107544"
}
},
{
"category": "service_pack",
"name": "12.2(20)EWA2",
"product": {
"name": "12.2(20)EWA2",
"product_id": "CSAFPID-107650"
}
}
],
"category": "product_version",
"name": "12.2EWA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(35)SE",
"product": {
"name": "12.2(35)SE",
"product_id": "CSAFPID-62600"
}
},
{
"category": "service_pack",
"name": "12.2(18)SE",
"product": {
"name": "12.2(18)SE",
"product_id": "CSAFPID-63898"
}
},
{
"category": "service_pack",
"name": "12.2(20)SE",
"product": {
"name": "12.2(20)SE",
"product_id": "CSAFPID-63903"
}
},
{
"category": "service_pack",
"name": "12.2(25)SE",
"product": {
"name": "12.2(25)SE",
"product_id": "CSAFPID-63916"
}
},
{
"category": "service_pack",
"name": "12.2(37)SE",
"product": {
"name": "12.2(37)SE",
"product_id": "CSAFPID-69801"
}
},
{
"category": "service_pack",
"name": "12.2(53)SE1",
"product": {
"name": "12.2(53)SE1",
"product_id": "CSAFPID-103648"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE",
"product": {
"name": "12.2(55)SE",
"product_id": "CSAFPID-103763"
}
},
{
"category": "service_pack",
"name": "12.2(25)SE2",
"product": {
"name": "12.2(25)SE2",
"product_id": "CSAFPID-103774"
}
},
{
"category": "service_pack",
"name": "12.2(40)SE2",
"product": {
"name": "12.2(40)SE2",
"product_id": "CSAFPID-103840"
}
},
{
"category": "service_pack",
"name": "12.2(46)SE",
"product": {
"name": "12.2(46)SE",
"product_id": "CSAFPID-103921"
}
},
{
"category": "service_pack",
"name": "12.2(46)SE2",
"product": {
"name": "12.2(46)SE2",
"product_id": "CSAFPID-104089"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE2",
"product": {
"name": "12.2(50)SE2",
"product_id": "CSAFPID-104101"
}
},
{
"category": "service_pack",
"name": "12.2(35)SE5",
"product": {
"name": "12.2(35)SE5",
"product_id": "CSAFPID-104191"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE1",
"product": {
"name": "12.2(50)SE1",
"product_id": "CSAFPID-104342"
}
},
{
"category": "service_pack",
"name": "12.2(44)SE2",
"product": {
"name": "12.2(44)SE2",
"product_id": "CSAFPID-104630"
}
},
{
"category": "service_pack",
"name": "12.2(20)SE3",
"product": {
"name": "12.2(20)SE3",
"product_id": "CSAFPID-104706"
}
},
{
"category": "service_pack",
"name": "12.2(35)SE1",
"product": {
"name": "12.2(35)SE1",
"product_id": "CSAFPID-104815"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE5",
"product": {
"name": "12.2(50)SE5",
"product_id": "CSAFPID-104855"
}
},
{
"category": "service_pack",
"name": "12.2(44)SE1",
"product": {
"name": "12.2(44)SE1",
"product_id": "CSAFPID-104970"
}
},
{
"category": "service_pack",
"name": "12.2(53)SE",
"product": {
"name": "12.2(53)SE",
"product_id": "CSAFPID-104972"
}
},
{
"category": "service_pack",
"name": "12.2(37)SE1",
"product": {
"name": "12.2(37)SE1",
"product_id": "CSAFPID-105043"
}
},
{
"category": "service_pack",
"name": "12.2(25)SE3",
"product": {
"name": "12.2(25)SE3",
"product_id": "CSAFPID-105185"
}
},
{
"category": "service_pack",
"name": "12.2(35)SE3",
"product": {
"name": "12.2(35)SE3",
"product_id": "CSAFPID-105186"
}
},
{
"category": "service_pack",
"name": "12.2(44)SE4",
"product": {
"name": "12.2(44)SE4",
"product_id": "CSAFPID-105285"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE3",
"product": {
"name": "12.2(55)SE3",
"product_id": "CSAFPID-105394"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE2",
"product": {
"name": "12.2(55)SE2",
"product_id": "CSAFPID-105689"
}
},
{
"category": "service_pack",
"name": "12.2(40)SE",
"product": {
"name": "12.2(40)SE",
"product_id": "CSAFPID-105780"
}
},
{
"category": "service_pack",
"name": "12.2(44)SE",
"product": {
"name": "12.2(44)SE",
"product_id": "CSAFPID-105881"
}
},
{
"category": "service_pack",
"name": "12.2(52)SE",
"product": {
"name": "12.2(52)SE",
"product_id": "CSAFPID-105973"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE",
"product": {
"name": "12.2(58)SE",
"product_id": "CSAFPID-105987"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE3",
"product": {
"name": "12.2(50)SE3",
"product_id": "CSAFPID-106016"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE1",
"product": {
"name": "12.2(55)SE1",
"product_id": "CSAFPID-106029"
}
},
{
"category": "service_pack",
"name": "12.2(35)SE2",
"product": {
"name": "12.2(35)SE2",
"product_id": "CSAFPID-106071"
}
},
{
"category": "service_pack",
"name": "12.2(18)SE1",
"product": {
"name": "12.2(18)SE1",
"product_id": "CSAFPID-106163"
}
},
{
"category": "service_pack",
"name": "12.2(40)SE1",
"product": {
"name": "12.2(40)SE1",
"product_id": "CSAFPID-106203"
}
},
{
"category": "service_pack",
"name": "12.2(20)SE1",
"product": {
"name": "12.2(20)SE1",
"product_id": "CSAFPID-106232"
}
},
{
"category": "service_pack",
"name": "12.2(44)SE6",
"product": {
"name": "12.2(44)SE6",
"product_id": "CSAFPID-106323"
}
},
{
"category": "service_pack",
"name": "12.2(44)SE3",
"product": {
"name": "12.2(44)SE3",
"product_id": "CSAFPID-106526"
}
},
{
"category": "service_pack",
"name": "12.2(53)SE2",
"product": {
"name": "12.2(53)SE2",
"product_id": "CSAFPID-106606"
}
},
{
"category": "service_pack",
"name": "12.2(52)SE1",
"product": {
"name": "12.2(52)SE1",
"product_id": "CSAFPID-106684"
}
},
{
"category": "service_pack",
"name": "12.2(46)SE1",
"product": {
"name": "12.2(46)SE1",
"product_id": "CSAFPID-106997"
}
},
{
"category": "service_pack",
"name": "12.2(20)SE2",
"product": {
"name": "12.2(20)SE2",
"product_id": "CSAFPID-107002"
}
},
{
"category": "service_pack",
"name": "12.2(54)SE",
"product": {
"name": "12.2(54)SE",
"product_id": "CSAFPID-107135"
}
},
{
"category": "service_pack",
"name": "12.2(44)SE5",
"product": {
"name": "12.2(44)SE5",
"product_id": "CSAFPID-107142"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE4",
"product": {
"name": "12.2(50)SE4",
"product_id": "CSAFPID-107209"
}
},
{
"category": "service_pack",
"name": "12.2(50)SE",
"product": {
"name": "12.2(50)SE",
"product_id": "CSAFPID-107630"
}
},
{
"category": "service_pack",
"name": "12.2(20)SE4",
"product": {
"name": "12.2(20)SE4",
"product_id": "CSAFPID-107692"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE1",
"product": {
"name": "12.2(58)SE1",
"product_id": "CSAFPID-109098"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE4",
"product": {
"name": "12.2(55)SE4",
"product_id": "CSAFPID-109439"
}
},
{
"category": "service_pack",
"name": "12.2(58)SE2",
"product": {
"name": "12.2(58)SE2",
"product_id": "CSAFPID-109808"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE5",
"product": {
"name": "12.2(55)SE5",
"product_id": "CSAFPID-111674"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE6",
"product": {
"name": "12.2(55)SE6",
"product_id": "CSAFPID-114665"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE7",
"product": {
"name": "12.2(55)SE7",
"product_id": "CSAFPID-184125"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE8",
"product": {
"name": "12.2(55)SE8",
"product_id": "CSAFPID-189187"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE9",
"product": {
"name": "12.2(55)SE9",
"product_id": "CSAFPID-192911"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE10",
"product": {
"name": "12.2(55)SE10",
"product_id": "CSAFPID-198542"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE11",
"product": {
"name": "12.2(55)SE11",
"product_id": "CSAFPID-210732"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE12",
"product": {
"name": "12.2(55)SE12",
"product_id": "CSAFPID-228057"
}
},
{
"category": "service_pack",
"name": "12.2(55)SE13",
"product": {
"name": "12.2(55)SE13",
"product_id": "CSAFPID-230962"
}
}
],
"category": "product_version",
"name": "12.2SE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(29)SV2",
"product": {
"name": "12.2(29)SV2",
"product_id": "CSAFPID-107073"
}
}
],
"category": "product_version",
"name": "12.2SV"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(17b)SXA1",
"product": {
"name": "12.2(17b)SXA1",
"product_id": "CSAFPID-105158"
}
}
],
"category": "product_version",
"name": "12.2SXA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.1(14)AZ",
"product": {
"name": "12.1(14)AZ",
"product_id": "CSAFPID-59974"
}
}
],
"category": "product_version",
"name": "12.1AZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(20)EU",
"product": {
"name": "12.2(20)EU",
"product_id": "CSAFPID-60365"
}
},
{
"category": "service_pack",
"name": "12.2(20)EU1",
"product": {
"name": "12.2(20)EU1",
"product_id": "CSAFPID-105216"
}
},
{
"category": "service_pack",
"name": "12.2(20)EU2",
"product": {
"name": "12.2(20)EU2",
"product_id": "CSAFPID-106930"
}
}
],
"category": "product_version",
"name": "12.2EU"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(20)EX",
"product": {
"name": "12.2(20)EX",
"product_id": "CSAFPID-63905"
}
},
{
"category": "service_pack",
"name": "12.2(44)EX",
"product": {
"name": "12.2(44)EX",
"product_id": "CSAFPID-104061"
}
},
{
"category": "service_pack",
"name": "12.2(40)EX3",
"product": {
"name": "12.2(40)EX3",
"product_id": "CSAFPID-104578"
}
},
{
"category": "service_pack",
"name": "12.2(40)EX",
"product": {
"name": "12.2(40)EX",
"product_id": "CSAFPID-104662"
}
},
{
"category": "service_pack",
"name": "12.2(52)EX",
"product": {
"name": "12.2(52)EX",
"product_id": "CSAFPID-105183"
}
},
{
"category": "service_pack",
"name": "12.2(44)EX1",
"product": {
"name": "12.2(44)EX1",
"product_id": "CSAFPID-105253"
}
},
{
"category": "service_pack",
"name": "12.2(40)EX2",
"product": {
"name": "12.2(40)EX2",
"product_id": "CSAFPID-106449"
}
},
{
"category": "service_pack",
"name": "12.2(40)EX1",
"product": {
"name": "12.2(40)EX1",
"product_id": "CSAFPID-106564"
}
},
{
"category": "service_pack",
"name": "12.2(55)EX",
"product": {
"name": "12.2(55)EX",
"product_id": "CSAFPID-106674"
}
},
{
"category": "service_pack",
"name": "12.2(46)EX",
"product": {
"name": "12.2(46)EX",
"product_id": "CSAFPID-106733"
}
},
{
"category": "service_pack",
"name": "12.2(52)EX1",
"product": {
"name": "12.2(52)EX1",
"product_id": "CSAFPID-107664"
}
},
{
"category": "service_pack",
"name": "12.2(55)EX1",
"product": {
"name": "12.2(55)EX1",
"product_id": "CSAFPID-108306"
}
},
{
"category": "service_pack",
"name": "12.2(55)EX2",
"product": {
"name": "12.2(55)EX2",
"product_id": "CSAFPID-109760"
}
},
{
"category": "service_pack",
"name": "12.2(55)EX3",
"product": {
"name": "12.2(55)EX3",
"product_id": "CSAFPID-111019"
}
},
{
"category": "service_pack",
"name": "12.2(58)EX",
"product": {
"name": "12.2(58)EX",
"product_id": "CSAFPID-113948"
}
}
],
"category": "product_version",
"name": "12.2EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SEB",
"product": {
"name": "12.2(25)SEB",
"product_id": "CSAFPID-63918"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEB2",
"product": {
"name": "12.2(25)SEB2",
"product_id": "CSAFPID-105058"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEB1",
"product": {
"name": "12.2(25)SEB1",
"product_id": "CSAFPID-105111"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEB4",
"product": {
"name": "12.2(25)SEB4",
"product_id": "CSAFPID-105430"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEB3",
"product": {
"name": "12.2(25)SEB3",
"product_id": "CSAFPID-106401"
}
}
],
"category": "product_version",
"name": "12.2SEB"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SEA",
"product": {
"name": "12.2(25)SEA",
"product_id": "CSAFPID-63911"
}
}
],
"category": "product_version",
"name": "12.2SEA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)EY",
"product": {
"name": "12.2(25)EY",
"product_id": "CSAFPID-62580"
}
},
{
"category": "service_pack",
"name": "12.2(46)EY",
"product": {
"name": "12.2(46)EY",
"product_id": "CSAFPID-103473"
}
},
{
"category": "service_pack",
"name": "12.2(55)EY",
"product": {
"name": "12.2(55)EY",
"product_id": "CSAFPID-103559"
}
},
{
"category": "service_pack",
"name": "12.2(25)EY1",
"product": {
"name": "12.2(25)EY1",
"product_id": "CSAFPID-104642"
}
},
{
"category": "service_pack",
"name": "12.2(53)EY",
"product": {
"name": "12.2(53)EY",
"product_id": "CSAFPID-105299"
}
},
{
"category": "service_pack",
"name": "12.2(25)EY3",
"product": {
"name": "12.2(25)EY3",
"product_id": "CSAFPID-105704"
}
},
{
"category": "service_pack",
"name": "12.2(37)EY",
"product": {
"name": "12.2(37)EY",
"product_id": "CSAFPID-106059"
}
},
{
"category": "service_pack",
"name": "12.2(25)EY2",
"product": {
"name": "12.2(25)EY2",
"product_id": "CSAFPID-106540"
}
},
{
"category": "service_pack",
"name": "12.2(25)EY4",
"product": {
"name": "12.2(25)EY4",
"product_id": "CSAFPID-107591"
}
}
],
"category": "product_version",
"name": "12.2EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(18)SO",
"product": {
"name": "12.2(18)SO",
"product_id": "CSAFPID-62602"
}
},
{
"category": "service_pack",
"name": "12.2(18)SO1",
"product": {
"name": "12.2(18)SO1",
"product_id": "CSAFPID-103832"
}
},
{
"category": "service_pack",
"name": "12.2(18)SO3",
"product": {
"name": "12.2(18)SO3",
"product_id": "CSAFPID-106982"
}
},
{
"category": "service_pack",
"name": "12.2(18)SO2",
"product": {
"name": "12.2(18)SO2",
"product_id": "CSAFPID-107289"
}
}
],
"category": "product_version",
"name": "12.2SO"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)EZ",
"product": {
"name": "12.2(25)EZ",
"product_id": "CSAFPID-63913"
}
},
{
"category": "service_pack",
"name": "12.2(25)EZ1",
"product": {
"name": "12.2(25)EZ1",
"product_id": "CSAFPID-104313"
}
},
{
"category": "service_pack",
"name": "12.2(58)EZ",
"product": {
"name": "12.2(58)EZ",
"product_id": "CSAFPID-104806"
}
},
{
"category": "service_pack",
"name": "12.2(53)EZ",
"product": {
"name": "12.2(53)EZ",
"product_id": "CSAFPID-105444"
}
},
{
"category": "service_pack",
"name": "12.2(55)EZ",
"product": {
"name": "12.2(55)EZ",
"product_id": "CSAFPID-107283"
}
},
{
"category": "service_pack",
"name": "12.2(60)EZ4",
"product": {
"name": "12.2(60)EZ4",
"product_id": "CSAFPID-197480"
}
},
{
"category": "service_pack",
"name": "12.2(60)EZ5",
"product": {
"name": "12.2(60)EZ5",
"product_id": "CSAFPID-204099"
}
},
{
"category": "service_pack",
"name": "12.2(60)EZ16",
"product": {
"name": "12.2(60)EZ16",
"product_id": "CSAFPID-262536"
}
}
],
"category": "product_version",
"name": "12.2EZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SEC",
"product": {
"name": "12.2(25)SEC",
"product_id": "CSAFPID-63919"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEC2",
"product": {
"name": "12.2(25)SEC2",
"product_id": "CSAFPID-104100"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEC1",
"product": {
"name": "12.2(25)SEC1",
"product_id": "CSAFPID-105923"
}
}
],
"category": "product_version",
"name": "12.2SEC"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(31)SG",
"product": {
"name": "12.2(31)SG",
"product_id": "CSAFPID-60292"
}
},
{
"category": "service_pack",
"name": "12.2(25)SG",
"product": {
"name": "12.2(25)SG",
"product_id": "CSAFPID-60399"
}
},
{
"category": "service_pack",
"name": "12.2(37)SG",
"product": {
"name": "12.2(37)SG",
"product_id": "CSAFPID-69479"
}
},
{
"category": "service_pack",
"name": "12.2(44)SG",
"product": {
"name": "12.2(44)SG",
"product_id": "CSAFPID-78260"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG3",
"product": {
"name": "12.2(50)SG3",
"product_id": "CSAFPID-103492"
}
},
{
"category": "service_pack",
"name": "12.2(31)SG1",
"product": {
"name": "12.2(31)SG1",
"product_id": "CSAFPID-103646"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG",
"product": {
"name": "12.2(53)SG",
"product_id": "CSAFPID-103649"
}
},
{
"category": "service_pack",
"name": "12.2(31)SG3",
"product": {
"name": "12.2(31)SG3",
"product_id": "CSAFPID-103678"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG6",
"product": {
"name": "12.2(50)SG6",
"product_id": "CSAFPID-103766"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG1",
"product": {
"name": "12.2(53)SG1",
"product_id": "CSAFPID-103775"
}
},
{
"category": "service_pack",
"name": "12.2(46)SG",
"product": {
"name": "12.2(46)SG",
"product_id": "CSAFPID-104041"
}
},
{
"category": "service_pack",
"name": "12.2(25)SG1",
"product": {
"name": "12.2(25)SG1",
"product_id": "CSAFPID-104158"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG2",
"product": {
"name": "12.2(53)SG2",
"product_id": "CSAFPID-104254"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG5",
"product": {
"name": "12.2(50)SG5",
"product_id": "CSAFPID-104591"
}
},
{
"category": "service_pack",
"name": "12.2(37)SG1",
"product": {
"name": "12.2(37)SG1",
"product_id": "CSAFPID-104696"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG3",
"product": {
"name": "12.2(53)SG3",
"product_id": "CSAFPID-104833"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG8",
"product": {
"name": "12.2(50)SG8",
"product_id": "CSAFPID-104896"
}
},
{
"category": "service_pack",
"name": "12.2(25)SG3",
"product": {
"name": "12.2(25)SG3",
"product_id": "CSAFPID-105290"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG2",
"product": {
"name": "12.2(50)SG2",
"product_id": "CSAFPID-105302"
}
},
{
"category": "service_pack",
"name": "12.2(40)SG",
"product": {
"name": "12.2(40)SG",
"product_id": "CSAFPID-105485"
}
},
{
"category": "service_pack",
"name": "12.2(25)SG2",
"product": {
"name": "12.2(25)SG2",
"product_id": "CSAFPID-105513"
}
},
{
"category": "service_pack",
"name": "12.2(54)SG1",
"product": {
"name": "12.2(54)SG1",
"product_id": "CSAFPID-105741"
}
},
{
"category": "service_pack",
"name": "12.2(44)SG1",
"product": {
"name": "12.2(44)SG1",
"product_id": "CSAFPID-105765"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG1",
"product": {
"name": "12.2(50)SG1",
"product_id": "CSAFPID-106145"
}
},
{
"category": "service_pack",
"name": "12.2(52)SG",
"product": {
"name": "12.2(52)SG",
"product_id": "CSAFPID-106156"
}
},
{
"category": "service_pack",
"name": "12.2(54)SG",
"product": {
"name": "12.2(54)SG",
"product_id": "CSAFPID-106291"
}
},
{
"category": "service_pack",
"name": "12.2(31)SG2",
"product": {
"name": "12.2(31)SG2",
"product_id": "CSAFPID-107077"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG",
"product": {
"name": "12.2(50)SG",
"product_id": "CSAFPID-107108"
}
},
{
"category": "service_pack",
"name": "12.2(25)SG4",
"product": {
"name": "12.2(25)SG4",
"product_id": "CSAFPID-107112"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG7",
"product": {
"name": "12.2(50)SG7",
"product_id": "CSAFPID-107301"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG4",
"product": {
"name": "12.2(53)SG4",
"product_id": "CSAFPID-107304"
}
},
{
"category": "service_pack",
"name": "12.2(50)SG4",
"product": {
"name": "12.2(50)SG4",
"product_id": "CSAFPID-107495"
}
},
{
"category": "service_pack",
"name": "12.2(46)SG1",
"product": {
"name": "12.2(46)SG1",
"product_id": "CSAFPID-107645"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG5",
"product": {
"name": "12.2(53)SG5",
"product_id": "CSAFPID-108062"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG6",
"product": {
"name": "12.2(53)SG6",
"product_id": "CSAFPID-109242"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG7",
"product": {
"name": "12.2(53)SG7",
"product_id": "CSAFPID-112131"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG8",
"product": {
"name": "12.2(53)SG8",
"product_id": "CSAFPID-117280"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG9",
"product": {
"name": "12.2(53)SG9",
"product_id": "CSAFPID-184567"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG10",
"product": {
"name": "12.2(53)SG10",
"product_id": "CSAFPID-188816"
}
},
{
"category": "service_pack",
"name": "12.2(53)SG11",
"product": {
"name": "12.2(53)SG11",
"product_id": "CSAFPID-197488"
}
}
],
"category": "product_version",
"name": "12.2SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)FX",
"product": {
"name": "12.2(25)FX",
"product_id": "CSAFPID-63914"
}
}
],
"category": "product_version",
"name": "12.2FX"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)FY",
"product": {
"name": "12.2(25)FY",
"product_id": "CSAFPID-63915"
}
}
],
"category": "product_version",
"name": "12.2FY"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(28)ZV",
"product": {
"name": "12.2(28)ZV",
"product_id": "CSAFPID-63927"
}
},
{
"category": "service_pack",
"name": "12.2(28a)ZV1",
"product": {
"name": "12.2(28a)ZV1",
"product_id": "CSAFPID-104599"
}
},
{
"category": "service_pack",
"name": "12.2(28)ZV1",
"product": {
"name": "12.2(28)ZV1",
"product_id": "CSAFPID-105236"
}
}
],
"category": "product_version",
"name": "12.2ZV"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(33)ZW",
"product": {
"name": "12.2(33)ZW",
"product_id": "CSAFPID-63937"
}
}
],
"category": "product_version",
"name": "12.2ZW"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(28)ZX",
"product": {
"name": "12.2(28)ZX",
"product_id": "CSAFPID-63930"
}
}
],
"category": "product_version",
"name": "12.2ZX"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SEF",
"product": {
"name": "12.2(25)SEF",
"product_id": "CSAFPID-60350"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEF1",
"product": {
"name": "12.2(25)SEF1",
"product_id": "CSAFPID-62601"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEF2",
"product": {
"name": "12.2(25)SEF2",
"product_id": "CSAFPID-103684"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEF3",
"product": {
"name": "12.2(25)SEF3",
"product_id": "CSAFPID-103801"
}
}
],
"category": "product_version",
"name": "12.2SEF"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SEE",
"product": {
"name": "12.2(25)SEE",
"product_id": "CSAFPID-60351"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEE1",
"product": {
"name": "12.2(25)SEE1",
"product_id": "CSAFPID-62587"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEE3",
"product": {
"name": "12.2(25)SEE3",
"product_id": "CSAFPID-95363"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEE4",
"product": {
"name": "12.2(25)SEE4",
"product_id": "CSAFPID-104355"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEE2",
"product": {
"name": "12.2(25)SEE2",
"product_id": "CSAFPID-105965"
}
}
],
"category": "product_version",
"name": "12.2SEE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SED",
"product": {
"name": "12.2(25)SED",
"product_id": "CSAFPID-63920"
}
},
{
"category": "service_pack",
"name": "12.2(25)SED1",
"product": {
"name": "12.2(25)SED1",
"product_id": "CSAFPID-107476"
}
}
],
"category": "product_version",
"name": "12.2SED"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(31)SGA",
"product": {
"name": "12.2(31)SGA",
"product_id": "CSAFPID-63936"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA3",
"product": {
"name": "12.2(31)SGA3",
"product_id": "CSAFPID-104153"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA2",
"product": {
"name": "12.2(31)SGA2",
"product_id": "CSAFPID-104467"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA10",
"product": {
"name": "12.2(31)SGA10",
"product_id": "CSAFPID-105392"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA5",
"product": {
"name": "12.2(31)SGA5",
"product_id": "CSAFPID-105466"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA4",
"product": {
"name": "12.2(31)SGA4",
"product_id": "CSAFPID-105539"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA11",
"product": {
"name": "12.2(31)SGA11",
"product_id": "CSAFPID-105572"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA6",
"product": {
"name": "12.2(31)SGA6",
"product_id": "CSAFPID-105760"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA1",
"product": {
"name": "12.2(31)SGA1",
"product_id": "CSAFPID-105824"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA7",
"product": {
"name": "12.2(31)SGA7",
"product_id": "CSAFPID-106496"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA8",
"product": {
"name": "12.2(31)SGA8",
"product_id": "CSAFPID-106746"
}
},
{
"category": "service_pack",
"name": "12.2(31)SGA9",
"product": {
"name": "12.2(31)SGA9",
"product_id": "CSAFPID-106971"
}
}
],
"category": "product_version",
"name": "12.2SGA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)SEG",
"product": {
"name": "12.2(25)SEG",
"product_id": "CSAFPID-60358"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEG1",
"product": {
"name": "12.2(25)SEG1",
"product_id": "CSAFPID-106247"
}
},
{
"category": "service_pack",
"name": "12.2(25)SEG3",
"product": {
"name": "12.2(25)SEG3",
"product_id": "CSAFPID-107325"
}
}
],
"category": "product_version",
"name": "12.2SEG"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(25)FZ",
"product": {
"name": "12.2(25)FZ",
"product_id": "CSAFPID-60368"
}
}
],
"category": "product_version",
"name": "12.2FZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(27)SBA4",
"product": {
"name": "12.2(27)SBA4",
"product_id": "CSAFPID-103855"
}
}
],
"category": "product_version",
"name": "12.2SBA"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(33)STE0",
"product": {
"name": "12.2(33)STE0",
"product_id": "CSAFPID-105999"
}
}
],
"category": "product_version",
"name": "12.2STE"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(52)XO",
"product": {
"name": "12.2(52)XO",
"product_id": "CSAFPID-104255"
}
},
{
"category": "service_pack",
"name": "12.2(54)XO",
"product": {
"name": "12.2(54)XO",
"product_id": "CSAFPID-104494"
}
},
{
"category": "service_pack",
"name": "12.2(40)XO",
"product": {
"name": "12.2(40)XO",
"product_id": "CSAFPID-104850"
}
}
],
"category": "product_version",
"name": "12.2XO"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(44)SQ",
"product": {
"name": "12.2(44)SQ",
"product_id": "CSAFPID-103930"
}
},
{
"category": "service_pack",
"name": "12.2(44)SQ2",
"product": {
"name": "12.2(44)SQ2",
"product_id": "CSAFPID-104091"
}
},
{
"category": "service_pack",
"name": "12.2(50)SQ2",
"product": {
"name": "12.2(50)SQ2",
"product_id": "CSAFPID-104427"
}
},
{
"category": "service_pack",
"name": "12.2(50)SQ1",
"product": {
"name": "12.2(50)SQ1",
"product_id": "CSAFPID-104743"
}
},
{
"category": "service_pack",
"name": "12.2(50)SQ",
"product": {
"name": "12.2(50)SQ",
"product_id": "CSAFPID-106466"
}
},
{
"category": "service_pack",
"name": "12.2(50)SQ3",
"product": {
"name": "12.2(50)SQ3",
"product_id": "CSAFPID-108172"
}
},
{
"category": "service_pack",
"name": "12.2(50)SQ4",
"product": {
"name": "12.2(50)SQ4",
"product_id": "CSAFPID-111045"
}
},
{
"category": "service_pack",
"name": "12.2(50)SQ5",
"product": {
"name": "12.2(50)SQ5",
"product_id": "CSAFPID-185274"
}
},
{
"category": "service_pack",
"name": "12.2(50)SQ6",
"product": {
"name": "12.2(50)SQ6",
"product_id": "CSAFPID-194649"
}
},
{
"category": "service_pack",
"name": "12.2(50)SQ7",
"product": {
"name": "12.2(50)SQ7",
"product_id": "CSAFPID-202716"
}
}
],
"category": "product_version",
"name": "12.2SQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)XO1",
"product": {
"name": "15.0(1)XO1",
"product_id": "CSAFPID-103955"
}
},
{
"category": "service_pack",
"name": "15.0(1)XO",
"product": {
"name": "15.0(1)XO",
"product_id": "CSAFPID-106072"
}
},
{
"category": "service_pack",
"name": "15.0(2)XO",
"product": {
"name": "15.0(2)XO",
"product_id": "CSAFPID-111005"
}
}
],
"category": "product_version",
"name": "15.0XO"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)EY",
"product": {
"name": "15.0(1)EY",
"product_id": "CSAFPID-104376"
}
},
{
"category": "service_pack",
"name": "15.0(1)EY1",
"product": {
"name": "15.0(1)EY1",
"product_id": "CSAFPID-115969"
}
},
{
"category": "service_pack",
"name": "15.0(1)EY2",
"product": {
"name": "15.0(1)EY2",
"product_id": "CSAFPID-187269"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY",
"product": {
"name": "15.0(2)EY",
"product_id": "CSAFPID-187932"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY1",
"product": {
"name": "15.0(2)EY1",
"product_id": "CSAFPID-190250"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY2",
"product": {
"name": "15.0(2)EY2",
"product_id": "CSAFPID-192831"
}
},
{
"category": "service_pack",
"name": "15.0(2)EY3",
"product": {
"name": "15.0(2)EY3",
"product_id": "CSAFPID-195481"
}
}
],
"category": "product_version",
"name": "15.0EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(54)WO",
"product": {
"name": "12.2(54)WO",
"product_id": "CSAFPID-104719"
}
}
],
"category": "product_version",
"name": "12.2WO"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(27)SBK9",
"product": {
"name": "12.2(27)SBK9",
"product_id": "CSAFPID-107832"
}
}
],
"category": "product_version",
"name": "12.2SBK"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)SE",
"product": {
"name": "15.0(1)SE",
"product_id": "CSAFPID-105660"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE",
"product": {
"name": "15.0(2)SE",
"product_id": "CSAFPID-107852"
}
},
{
"category": "service_pack",
"name": "15.0(1)SE1",
"product": {
"name": "15.0(1)SE1",
"product_id": "CSAFPID-111010"
}
},
{
"category": "service_pack",
"name": "15.0(1)SE2",
"product": {
"name": "15.0(1)SE2",
"product_id": "CSAFPID-113961"
}
},
{
"category": "service_pack",
"name": "15.0(1)SE3",
"product": {
"name": "15.0(1)SE3",
"product_id": "CSAFPID-115832"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE1",
"product": {
"name": "15.0(2)SE1",
"product_id": "CSAFPID-115939"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE2",
"product": {
"name": "15.0(2)SE2",
"product_id": "CSAFPID-116083"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE3",
"product": {
"name": "15.0(2)SE3",
"product_id": "CSAFPID-189455"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE4",
"product": {
"name": "15.0(2)SE4",
"product_id": "CSAFPID-190635"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE5",
"product": {
"name": "15.0(2)SE5",
"product_id": "CSAFPID-192706"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE6",
"product": {
"name": "15.0(2)SE6",
"product_id": "CSAFPID-195770"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE7",
"product": {
"name": "15.0(2)SE7",
"product_id": "CSAFPID-204097"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE8",
"product": {
"name": "15.0(2)SE8",
"product_id": "CSAFPID-209028"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE9",
"product": {
"name": "15.0(2)SE9",
"product_id": "CSAFPID-209029"
}
},
{
"category": "service_pack",
"name": "15.0(2a)SE9",
"product": {
"name": "15.0(2a)SE9",
"product_id": "CSAFPID-212329"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE10",
"product": {
"name": "15.0(2)SE10",
"product_id": "CSAFPID-213788"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE11",
"product": {
"name": "15.0(2)SE11",
"product_id": "CSAFPID-220466"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE10a",
"product": {
"name": "15.0(2)SE10a",
"product_id": "CSAFPID-222342"
}
},
{
"category": "service_pack",
"name": "15.0(2)SE12",
"product": {
"name": "15.0(2)SE12",
"product_id": "CSAFPID-234926"
}
}
],
"category": "product_version",
"name": "15.0SE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(1)SG",
"product": {
"name": "15.1(1)SG",
"product_id": "CSAFPID-106089"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG",
"product": {
"name": "15.1(2)SG",
"product_id": "CSAFPID-115477"
}
},
{
"category": "service_pack",
"name": "15.1(1)SG1",
"product": {
"name": "15.1(1)SG1",
"product_id": "CSAFPID-117196"
}
},
{
"category": "service_pack",
"name": "15.1(1)SG2",
"product": {
"name": "15.1(1)SG2",
"product_id": "CSAFPID-185281"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG1",
"product": {
"name": "15.1(2)SG1",
"product_id": "CSAFPID-188035"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG2",
"product": {
"name": "15.1(2)SG2",
"product_id": "CSAFPID-193283"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG3",
"product": {
"name": "15.1(2)SG3",
"product_id": "CSAFPID-194741"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG4",
"product": {
"name": "15.1(2)SG4",
"product_id": "CSAFPID-195489"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG5",
"product": {
"name": "15.1(2)SG5",
"product_id": "CSAFPID-197465"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG6",
"product": {
"name": "15.1(2)SG6",
"product_id": "CSAFPID-204187"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG7",
"product": {
"name": "15.1(2)SG7",
"product_id": "CSAFPID-209034"
}
},
{
"category": "service_pack",
"name": "15.1(2)SG8",
"product": {
"name": "15.1(2)SG8",
"product_id": "CSAFPID-214992"
}
}
],
"category": "product_version",
"name": "15.1SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SG",
"product": {
"name": "15.0(2)SG",
"product_id": "CSAFPID-107094"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG1",
"product": {
"name": "15.0(2)SG1",
"product_id": "CSAFPID-110186"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG2",
"product": {
"name": "15.0(2)SG2",
"product_id": "CSAFPID-111384"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG3",
"product": {
"name": "15.0(2)SG3",
"product_id": "CSAFPID-112141"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG4",
"product": {
"name": "15.0(2)SG4",
"product_id": "CSAFPID-114093"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG5",
"product": {
"name": "15.0(2)SG5",
"product_id": "CSAFPID-115688"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG6",
"product": {
"name": "15.0(2)SG6",
"product_id": "CSAFPID-117871"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG7",
"product": {
"name": "15.0(2)SG7",
"product_id": "CSAFPID-187233"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG8",
"product": {
"name": "15.0(2)SG8",
"product_id": "CSAFPID-192163"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG9",
"product": {
"name": "15.0(2)SG9",
"product_id": "CSAFPID-197481"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG10",
"product": {
"name": "15.0(2)SG10",
"product_id": "CSAFPID-209030"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG11",
"product": {
"name": "15.0(2)SG11",
"product_id": "CSAFPID-209031"
}
},
{
"category": "service_pack",
"name": "15.0(2)SG11a",
"product": {
"name": "15.0(2)SG11a",
"product_id": "CSAFPID-262335"
}
}
],
"category": "product_version",
"name": "15.0SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(1)EX",
"product": {
"name": "15.0(1)EX",
"product_id": "CSAFPID-109442"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX",
"product": {
"name": "15.0(2)EX",
"product_id": "CSAFPID-189064"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX1",
"product": {
"name": "15.0(2)EX1",
"product_id": "CSAFPID-189115"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX2",
"product": {
"name": "15.0(2)EX2",
"product_id": "CSAFPID-192910"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX3",
"product": {
"name": "15.0(2)EX3",
"product_id": "CSAFPID-194540"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX4",
"product": {
"name": "15.0(2)EX4",
"product_id": "CSAFPID-194913"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX5",
"product": {
"name": "15.0(2)EX5",
"product_id": "CSAFPID-195943"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX6",
"product": {
"name": "15.0(2)EX6",
"product_id": "CSAFPID-200496"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX7",
"product": {
"name": "15.0(2)EX7",
"product_id": "CSAFPID-201366"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX8",
"product": {
"name": "15.0(2)EX8",
"product_id": "CSAFPID-204831"
}
},
{
"category": "service_pack",
"name": "15.0(2a)EX5",
"product": {
"name": "15.0(2a)EX5",
"product_id": "CSAFPID-205064"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX10",
"product": {
"name": "15.0(2)EX10",
"product_id": "CSAFPID-211570"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX11",
"product": {
"name": "15.0(2)EX11",
"product_id": "CSAFPID-214797"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX13",
"product": {
"name": "15.0(2)EX13",
"product_id": "CSAFPID-225160"
}
},
{
"category": "service_pack",
"name": "15.0(2)EX12",
"product": {
"name": "15.0(2)EX12",
"product_id": "CSAFPID-230965"
}
}
],
"category": "product_version",
"name": "15.0EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EA",
"product": {
"name": "15.0(2)EA",
"product_id": "CSAFPID-117282"
}
},
{
"category": "service_pack",
"name": "15.0(2)EA1",
"product": {
"name": "15.0(2)EA1",
"product_id": "CSAFPID-193033"
}
}
],
"category": "product_version",
"name": "15.0EA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)E",
"product": {
"name": "15.2(1)E",
"product_id": "CSAFPID-183811"
}
},
{
"category": "service_pack",
"name": "15.2(2)E",
"product": {
"name": "15.2(2)E",
"product_id": "CSAFPID-187057"
}
},
{
"category": "service_pack",
"name": "15.2(1)E1",
"product": {
"name": "15.2(1)E1",
"product_id": "CSAFPID-195469"
}
},
{
"category": "service_pack",
"name": "15.2(3)E",
"product": {
"name": "15.2(3)E",
"product_id": "CSAFPID-197483"
}
},
{
"category": "service_pack",
"name": "15.2(1)E2",
"product": {
"name": "15.2(1)E2",
"product_id": "CSAFPID-198060"
}
},
{
"category": "service_pack",
"name": "15.2(1)E3",
"product": {
"name": "15.2(1)E3",
"product_id": "CSAFPID-200488"
}
},
{
"category": "service_pack",
"name": "15.2(2)E1",
"product": {
"name": "15.2(2)E1",
"product_id": "CSAFPID-201074"
}
},
{
"category": "service_pack",
"name": "15.2(2b)E",
"product": {
"name": "15.2(2b)E",
"product_id": "CSAFPID-204102"
}
},
{
"category": "service_pack",
"name": "15.2(4)E",
"product": {
"name": "15.2(4)E",
"product_id": "CSAFPID-204108"
}
},
{
"category": "service_pack",
"name": "15.2(3)E1",
"product": {
"name": "15.2(3)E1",
"product_id": "CSAFPID-204186"
}
},
{
"category": "service_pack",
"name": "15.2(2)E2",
"product": {
"name": "15.2(2)E2",
"product_id": "CSAFPID-204228"
}
},
{
"category": "service_pack",
"name": "15.2(2a)E1",
"product": {
"name": "15.2(2a)E1",
"product_id": "CSAFPID-204818"
}
},
{
"category": "service_pack",
"name": "15.2(2)E3",
"product": {
"name": "15.2(2)E3",
"product_id": "CSAFPID-205672"
}
},
{
"category": "service_pack",
"name": "15.2(2a)E2",
"product": {
"name": "15.2(2a)E2",
"product_id": "CSAFPID-209045"
}
},
{
"category": "service_pack",
"name": "15.2(3)E2",
"product": {
"name": "15.2(3)E2",
"product_id": "CSAFPID-209046"
}
},
{
"category": "service_pack",
"name": "15.2(3a)E",
"product": {
"name": "15.2(3a)E",
"product_id": "CSAFPID-209047"
}
},
{
"category": "service_pack",
"name": "15.2(3)E3",
"product": {
"name": "15.2(3)E3",
"product_id": "CSAFPID-209358"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E2",
"product": {
"name": "15.2(3m)E2",
"product_id": "CSAFPID-209359"
}
},
{
"category": "service_pack",
"name": "15.2(4)E1",
"product": {
"name": "15.2(4)E1",
"product_id": "CSAFPID-209887"
}
},
{
"category": "service_pack",
"name": "15.2(2)E4",
"product": {
"name": "15.2(2)E4",
"product_id": "CSAFPID-210766"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5",
"product": {
"name": "15.2(2)E5",
"product_id": "CSAFPID-211296"
}
},
{
"category": "service_pack",
"name": "15.2(4)E2",
"product": {
"name": "15.2(4)E2",
"product_id": "CSAFPID-213610"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E1",
"product": {
"name": "15.2(4m)E1",
"product_id": "CSAFPID-214072"
}
},
{
"category": "service_pack",
"name": "15.2(3)E4",
"product": {
"name": "15.2(3)E4",
"product_id": "CSAFPID-214078"
}
},
{
"category": "service_pack",
"name": "15.2(5)E",
"product": {
"name": "15.2(5)E",
"product_id": "CSAFPID-214556"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E7",
"product": {
"name": "15.2(3m)E7",
"product_id": "CSAFPID-216295"
}
},
{
"category": "service_pack",
"name": "15.2(4)E3",
"product": {
"name": "15.2(4)E3",
"product_id": "CSAFPID-217805"
}
},
{
"category": "service_pack",
"name": "15.2(2)E6",
"product": {
"name": "15.2(2)E6",
"product_id": "CSAFPID-218891"
}
},
{
"category": "service_pack",
"name": "15.2(5a)E",
"product": {
"name": "15.2(5a)E",
"product_id": "CSAFPID-218995"
}
},
{
"category": "service_pack",
"name": "15.2(5)E1",
"product": {
"name": "15.2(5)E1",
"product_id": "CSAFPID-220441"
}
},
{
"category": "service_pack",
"name": "15.2(5b)E",
"product": {
"name": "15.2(5b)E",
"product_id": "CSAFPID-220457"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E3",
"product": {
"name": "15.2(4m)E3",
"product_id": "CSAFPID-220664"
}
},
{
"category": "service_pack",
"name": "15.2(3m)E8",
"product": {
"name": "15.2(3m)E8",
"product_id": "CSAFPID-220689"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5a",
"product": {
"name": "15.2(2)E5a",
"product_id": "CSAFPID-221033"
}
},
{
"category": "service_pack",
"name": "15.2(5c)E",
"product": {
"name": "15.2(5c)E",
"product_id": "CSAFPID-221137"
}
},
{
"category": "service_pack",
"name": "15.2(2)E5b",
"product": {
"name": "15.2(2)E5b",
"product_id": "CSAFPID-222436"
}
},
{
"category": "service_pack",
"name": "15.2(4n)E2",
"product": {
"name": "15.2(4n)E2",
"product_id": "CSAFPID-222500"
}
},
{
"category": "service_pack",
"name": "15.2(4o)E2",
"product": {
"name": "15.2(4o)E2",
"product_id": "CSAFPID-222924"
}
},
{
"category": "service_pack",
"name": "15.2(5a)E1",
"product": {
"name": "15.2(5a)E1",
"product_id": "CSAFPID-223143"
}
},
{
"category": "service_pack",
"name": "15.2(4)E4",
"product": {
"name": "15.2(4)E4",
"product_id": "CSAFPID-224553"
}
},
{
"category": "service_pack",
"name": "15.2(2)E7",
"product": {
"name": "15.2(2)E7",
"product_id": "CSAFPID-224868"
}
},
{
"category": "service_pack",
"name": "15.2(5)E2",
"product": {
"name": "15.2(5)E2",
"product_id": "CSAFPID-225740"
}
},
{
"category": "service_pack",
"name": "15.2(4p)E1",
"product": {
"name": "15.2(4p)E1",
"product_id": "CSAFPID-226077"
}
},
{
"category": "service_pack",
"name": "15.2(6)E",
"product": {
"name": "15.2(6)E",
"product_id": "CSAFPID-227598"
}
},
{
"category": "service_pack",
"name": "15.2(4)E5",
"product": {
"name": "15.2(4)E5",
"product_id": "CSAFPID-227959"
}
},
{
"category": "service_pack",
"name": "15.2(5)E2c",
"product": {
"name": "15.2(5)E2c",
"product_id": "CSAFPID-228151"
}
},
{
"category": "service_pack",
"name": "15.2(2)E8",
"product": {
"name": "15.2(2)E8",
"product_id": "CSAFPID-230587"
}
},
{
"category": "service_pack",
"name": "15.2(4m)E2",
"product": {
"name": "15.2(4m)E2",
"product_id": "CSAFPID-230588"
}
},
{
"category": "service_pack",
"name": "15.2(4o)E3",
"product": {
"name": "15.2(4o)E3",
"product_id": "CSAFPID-230589"
}
},
{
"category": "service_pack",
"name": "15.2(4q)E1",
"product": {
"name": "15.2(4q)E1",
"product_id": "CSAFPID-230590"
}
},
{
"category": "service_pack",
"name": "15.2(6)E0a",
"product": {
"name": "15.2(6)E0a",
"product_id": "CSAFPID-230591"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1",
"product": {
"name": "15.2(6)E1",
"product_id": "CSAFPID-230592"
}
},
{
"category": "service_pack",
"name": "15.2(6)E0c",
"product": {
"name": "15.2(6)E0c",
"product_id": "CSAFPID-231245"
}
},
{
"category": "service_pack",
"name": "15.2(4)E6",
"product": {
"name": "15.2(4)E6",
"product_id": "CSAFPID-231471"
}
},
{
"category": "service_pack",
"name": "15.2(2)E9",
"product": {
"name": "15.2(2)E9",
"product_id": "CSAFPID-232765"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1a",
"product": {
"name": "15.2(6)E1a",
"product_id": "CSAFPID-238999"
}
},
{
"category": "service_pack",
"name": "15.2(4)E7",
"product": {
"name": "15.2(4)E7",
"product_id": "CSAFPID-239053"
}
},
{
"category": "service_pack",
"name": "15.2(6)E1s",
"product": {
"name": "15.2(6)E1s",
"product_id": "CSAFPID-240186"
}
},
{
"category": "service_pack",
"name": "15.2(4s)E1",
"product": {
"name": "15.2(4s)E1",
"product_id": "CSAFPID-241916"
}
},
{
"category": "service_pack",
"name": "15.2(2)E9a",
"product": {
"name": "15.2(2)E9a",
"product_id": "CSAFPID-247572"
}
},
{
"category": "service_pack",
"name": "15.2(4s)E2",
"product": {
"name": "15.2(4s)E2",
"product_id": "CSAFPID-250628"
}
}
],
"category": "product_version",
"name": "15.2E"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)MRA3",
"product": {
"name": "15.1(3)MRA3",
"product_id": "CSAFPID-195771"
}
},
{
"category": "service_pack",
"name": "15.1(3)MRA4",
"product": {
"name": "15.1(3)MRA4",
"product_id": "CSAFPID-198425"
}
}
],
"category": "product_version",
"name": "15.1MRA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVB1",
"product": {
"name": "15.1(3)SVB1",
"product_id": "CSAFPID-187958"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVB2",
"product": {
"name": "15.1(3)SVB2",
"product_id": "CSAFPID-230966"
}
}
],
"category": "product_version",
"name": "15.1SVB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.4(2)S3",
"product": {
"name": "15.4(2)S3",
"product_id": "CSAFPID-209096"
}
},
{
"category": "service_pack",
"name": "15.4(3)S0e",
"product": {
"name": "15.4(3)S0e",
"product_id": "CSAFPID-209569"
}
},
{
"category": "service_pack",
"name": "15.4(3)S0f",
"product": {
"name": "15.4(3)S0f",
"product_id": "CSAFPID-212635"
}
}
],
"category": "product_version",
"name": "15.4S"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EZ",
"product": {
"name": "15.0(2)EZ",
"product_id": "CSAFPID-190637"
}
}
],
"category": "product_version",
"name": "15.0EZ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)SC1a",
"product": {
"name": "15.2(1)SC1a",
"product_id": "CSAFPID-192423"
}
},
{
"category": "service_pack",
"name": "15.2(2)SC",
"product": {
"name": "15.2(2)SC",
"product_id": "CSAFPID-195636"
}
},
{
"category": "service_pack",
"name": "15.2(2)SC1",
"product": {
"name": "15.2(2)SC1",
"product_id": "CSAFPID-204094"
}
},
{
"category": "service_pack",
"name": "15.2(2)SC3",
"product": {
"name": "15.2(2)SC3",
"product_id": "CSAFPID-209060"
}
},
{
"category": "service_pack",
"name": "15.2(2)SC4",
"product": {
"name": "15.2(2)SC4",
"product_id": "CSAFPID-209061"
}
}
],
"category": "product_version",
"name": "15.2SC"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVD",
"product": {
"name": "15.1(3)SVD",
"product_id": "CSAFPID-191566"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVD1",
"product": {
"name": "15.1(3)SVD1",
"product_id": "CSAFPID-192447"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVD2",
"product": {
"name": "15.1(3)SVD2",
"product_id": "CSAFPID-194467"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVD3",
"product": {
"name": "15.1(3)SVD3",
"product_id": "CSAFPID-198214"
}
}
],
"category": "product_version",
"name": "15.1SVD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)EY",
"product": {
"name": "15.2(1)EY",
"product_id": "CSAFPID-191928"
}
}
],
"category": "product_version",
"name": "15.2EY"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)EJ",
"product": {
"name": "15.0(2)EJ",
"product_id": "CSAFPID-191948"
}
},
{
"category": "service_pack",
"name": "15.0(2)EJ1",
"product": {
"name": "15.0(2)EJ1",
"product_id": "CSAFPID-197471"
}
}
],
"category": "product_version",
"name": "15.0EJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(5)EX",
"product": {
"name": "15.2(5)EX",
"product_id": "CSAFPID-222530"
}
}
],
"category": "product_version",
"name": "15.2EX"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVF",
"product": {
"name": "15.1(3)SVF",
"product_id": "CSAFPID-193177"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF1",
"product": {
"name": "15.1(3)SVF1",
"product_id": "CSAFPID-195519"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF2",
"product": {
"name": "15.1(3)SVF2",
"product_id": "CSAFPID-196115"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF2a",
"product": {
"name": "15.1(3)SVF2a",
"product_id": "CSAFPID-209035"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4b",
"product": {
"name": "15.1(3)SVF4b",
"product_id": "CSAFPID-209036"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4d",
"product": {
"name": "15.1(3)SVF4d",
"product_id": "CSAFPID-209037"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4e",
"product": {
"name": "15.1(3)SVF4e",
"product_id": "CSAFPID-210990"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4f",
"product": {
"name": "15.1(3)SVF4f",
"product_id": "CSAFPID-211717"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVF4c",
"product": {
"name": "15.1(3)SVF4c",
"product_id": "CSAFPID-230967"
}
}
],
"category": "product_version",
"name": "15.1SVF"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVE",
"product": {
"name": "15.1(3)SVE",
"product_id": "CSAFPID-193180"
}
}
],
"category": "product_version",
"name": "15.1SVE"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(1)SD1",
"product": {
"name": "15.2(1)SD1",
"product_id": "CSAFPID-194439"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD2",
"product": {
"name": "15.2(1)SD2",
"product_id": "CSAFPID-195033"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD3",
"product": {
"name": "15.2(1)SD3",
"product_id": "CSAFPID-195688"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD4",
"product": {
"name": "15.2(1)SD4",
"product_id": "CSAFPID-196417"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD6",
"product": {
"name": "15.2(1)SD6",
"product_id": "CSAFPID-200489"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD6a",
"product": {
"name": "15.2(1)SD6a",
"product_id": "CSAFPID-201683"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD7",
"product": {
"name": "15.2(1)SD7",
"product_id": "CSAFPID-202565"
}
},
{
"category": "service_pack",
"name": "15.2(1)SD8",
"product": {
"name": "15.2(1)SD8",
"product_id": "CSAFPID-205731"
}
}
],
"category": "product_version",
"name": "15.2SD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.5(3)S10c",
"product": {
"name": "15.5(3)S10c",
"product_id": "CSAFPID-284568"
}
}
],
"category": "product_version",
"name": "15.5S"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVG",
"product": {
"name": "15.1(3)SVG",
"product_id": "CSAFPID-196528"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG2",
"product": {
"name": "15.1(3)SVG2",
"product_id": "CSAFPID-200486"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG3",
"product": {
"name": "15.1(3)SVG3",
"product_id": "CSAFPID-201336"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG1b",
"product": {
"name": "15.1(3)SVG1b",
"product_id": "CSAFPID-201448"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG1c",
"product": {
"name": "15.1(3)SVG1c",
"product_id": "CSAFPID-209038"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG3a",
"product": {
"name": "15.1(3)SVG3a",
"product_id": "CSAFPID-209039"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG3b",
"product": {
"name": "15.1(3)SVG3b",
"product_id": "CSAFPID-209040"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG3c",
"product": {
"name": "15.1(3)SVG3c",
"product_id": "CSAFPID-209465"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG2a",
"product": {
"name": "15.1(3)SVG2a",
"product_id": "CSAFPID-211982"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVG1a",
"product": {
"name": "15.1(3)SVG1a",
"product_id": "CSAFPID-230968"
}
}
],
"category": "product_version",
"name": "15.1SVG"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)EB",
"product": {
"name": "15.2(2)EB",
"product_id": "CSAFPID-197462"
}
},
{
"category": "service_pack",
"name": "15.2(2)EB1",
"product": {
"name": "15.2(2)EB1",
"product_id": "CSAFPID-209839"
}
},
{
"category": "service_pack",
"name": "15.2(2)EB2",
"product": {
"name": "15.2(2)EB2",
"product_id": "CSAFPID-214218"
}
}
],
"category": "product_version",
"name": "15.2EB"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(2)EA",
"product": {
"name": "15.2(2)EA",
"product_id": "CSAFPID-198063"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA1",
"product": {
"name": "15.2(2)EA1",
"product_id": "CSAFPID-209049"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA2",
"product": {
"name": "15.2(2)EA2",
"product_id": "CSAFPID-209050"
}
},
{
"category": "service_pack",
"name": "15.2(3)EA",
"product": {
"name": "15.2(3)EA",
"product_id": "CSAFPID-209051"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA",
"product": {
"name": "15.2(4)EA",
"product_id": "CSAFPID-210203"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA1",
"product": {
"name": "15.2(4)EA1",
"product_id": "CSAFPID-210958"
}
},
{
"category": "service_pack",
"name": "15.2(2)EA3",
"product": {
"name": "15.2(2)EA3",
"product_id": "CSAFPID-214217"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA3",
"product": {
"name": "15.2(4)EA3",
"product_id": "CSAFPID-214965"
}
},
{
"category": "service_pack",
"name": "15.2(5)EA",
"product": {
"name": "15.2(5)EA",
"product_id": "CSAFPID-220038"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA4",
"product": {
"name": "15.2(4)EA4",
"product_id": "CSAFPID-220460"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA2",
"product": {
"name": "15.2(4)EA2",
"product_id": "CSAFPID-220507"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA5",
"product": {
"name": "15.2(4)EA5",
"product_id": "CSAFPID-222419"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA6",
"product": {
"name": "15.2(4)EA6",
"product_id": "CSAFPID-228075"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA7",
"product": {
"name": "15.2(4)EA7",
"product_id": "CSAFPID-230992"
}
},
{
"category": "service_pack",
"name": "15.2(4)EA8",
"product": {
"name": "15.2(4)EA8",
"product_id": "CSAFPID-241614"
}
}
],
"category": "product_version",
"name": "15.2EA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVH",
"product": {
"name": "15.1(3)SVH",
"product_id": "CSAFPID-200502"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVH2",
"product": {
"name": "15.1(3)SVH2",
"product_id": "CSAFPID-204101"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVH4",
"product": {
"name": "15.1(3)SVH4",
"product_id": "CSAFPID-209041"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVH4a",
"product": {
"name": "15.1(3)SVH4a",
"product_id": "CSAFPID-230969"
}
}
],
"category": "product_version",
"name": "15.1SVH"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.3(3)JAA1",
"product": {
"name": "15.3(3)JAA1",
"product_id": "CSAFPID-230594"
}
}
],
"category": "product_version",
"name": "15.3JAA"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.0(2)SQD",
"product": {
"name": "15.0(2)SQD",
"product_id": "CSAFPID-204324"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD1",
"product": {
"name": "15.0(2)SQD1",
"product_id": "CSAFPID-209628"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD2",
"product": {
"name": "15.0(2)SQD2",
"product_id": "CSAFPID-211290"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD3",
"product": {
"name": "15.0(2)SQD3",
"product_id": "CSAFPID-217078"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD4",
"product": {
"name": "15.0(2)SQD4",
"product_id": "CSAFPID-220670"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD5",
"product": {
"name": "15.0(2)SQD5",
"product_id": "CSAFPID-225358"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD6",
"product": {
"name": "15.0(2)SQD6",
"product_id": "CSAFPID-226038"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD7",
"product": {
"name": "15.0(2)SQD7",
"product_id": "CSAFPID-227364"
}
},
{
"category": "service_pack",
"name": "15.0(2)SQD8",
"product": {
"name": "15.0(2)SQD8",
"product_id": "CSAFPID-232850"
}
}
],
"category": "product_version",
"name": "15.0SQD"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVI2",
"product": {
"name": "15.1(3)SVI2",
"product_id": "CSAFPID-209421"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI1a",
"product": {
"name": "15.1(3)SVI1a",
"product_id": "CSAFPID-209466"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI2a",
"product": {
"name": "15.1(3)SVI2a",
"product_id": "CSAFPID-230970"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI3",
"product": {
"name": "15.1(3)SVI3",
"product_id": "CSAFPID-230971"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI31a",
"product": {
"name": "15.1(3)SVI31a",
"product_id": "CSAFPID-230973"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI31b",
"product": {
"name": "15.1(3)SVI31b",
"product_id": "CSAFPID-230974"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI3b",
"product": {
"name": "15.1(3)SVI3b",
"product_id": "CSAFPID-230976"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVI3c",
"product": {
"name": "15.1(3)SVI3c",
"product_id": "CSAFPID-230977"
}
}
],
"category": "product_version",
"name": "15.1SVI"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVJ",
"product": {
"name": "15.1(3)SVJ",
"product_id": "CSAFPID-230982"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVJ2",
"product": {
"name": "15.1(3)SVJ2",
"product_id": "CSAFPID-230983"
}
}
],
"category": "product_version",
"name": "15.1SVJ"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.2(4)EC1",
"product": {
"name": "15.2(4)EC1",
"product_id": "CSAFPID-220461"
}
},
{
"category": "service_pack",
"name": "15.2(4)EC2",
"product": {
"name": "15.2(4)EC2",
"product_id": "CSAFPID-223086"
}
}
],
"category": "product_version",
"name": "15.2EC"
},
{
"branches": [
{
"category": "service_pack",
"name": "12.2(6)I1",
"product": {
"name": "12.2(6)I1",
"product_id": "CSAFPID-243144"
}
}
],
"category": "product_version",
"name": "12.2I"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVR1",
"product": {
"name": "15.1(3)SVR1",
"product_id": "CSAFPID-277230"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR2",
"product": {
"name": "15.1(3)SVR2",
"product_id": "CSAFPID-277253"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR3",
"product": {
"name": "15.1(3)SVR3",
"product_id": "CSAFPID-279337"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVR10",
"product": {
"name": "15.1(3)SVR10",
"product_id": "CSAFPID-290618"
}
}
],
"category": "product_version",
"name": "15.1SVR"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVS",
"product": {
"name": "15.1(3)SVS",
"product_id": "CSAFPID-277232"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVS1",
"product": {
"name": "15.1(3)SVS1",
"product_id": "CSAFPID-279335"
}
}
],
"category": "product_version",
"name": "15.1SVS"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVT1",
"product": {
"name": "15.1(3)SVT1",
"product_id": "CSAFPID-280759"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT2",
"product": {
"name": "15.1(3)SVT2",
"product_id": "CSAFPID-282026"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT3",
"product": {
"name": "15.1(3)SVT3",
"product_id": "CSAFPID-284785"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVT4",
"product": {
"name": "15.1(3)SVT4",
"product_id": "CSAFPID-286399"
}
}
],
"category": "product_version",
"name": "15.1SVT"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVU1",
"product": {
"name": "15.1(3)SVU1",
"product_id": "CSAFPID-283833"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU10",
"product": {
"name": "15.1(3)SVU10",
"product_id": "CSAFPID-284291"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU2",
"product": {
"name": "15.1(3)SVU2",
"product_id": "CSAFPID-284566"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU11",
"product": {
"name": "15.1(3)SVU11",
"product_id": "CSAFPID-286400"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU20",
"product": {
"name": "15.1(3)SVU20",
"product_id": "CSAFPID-289270"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVU21",
"product": {
"name": "15.1(3)SVU21",
"product_id": "CSAFPID-290557"
}
}
],
"category": "product_version",
"name": "15.1SVU"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVV1",
"product": {
"name": "15.1(3)SVV1",
"product_id": "CSAFPID-284341"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV2",
"product": {
"name": "15.1(3)SVV2",
"product_id": "CSAFPID-286029"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV3",
"product": {
"name": "15.1(3)SVV3",
"product_id": "CSAFPID-286940"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVV4",
"product": {
"name": "15.1(3)SVV4",
"product_id": "CSAFPID-289371"
}
}
],
"category": "product_version",
"name": "15.1SVV"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVW",
"product": {
"name": "15.1(3)SVW",
"product_id": "CSAFPID-286451"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVW1",
"product": {
"name": "15.1(3)SVW1",
"product_id": "CSAFPID-286844"
}
}
],
"category": "product_version",
"name": "15.1SVW"
},
{
"branches": [
{
"category": "service_pack",
"name": "15.1(3)SVX",
"product": {
"name": "15.1(3)SVX",
"product_id": "CSAFPID-286927"
}
},
{
"category": "service_pack",
"name": "15.1(3)SVX1",
"product": {
"name": "15.1(3)SVX1",
"product_id": "CSAFPID-289301"
}
}
],
"category": "product_version",
"name": "15.1SVX"
}
],
"category": "product_family",
"name": "IOS"
},
{
"branches": [
{
"branches": [
{
"category": "service_pack",
"name": "3.2.0SG",
"product": {
"name": "3.2.0SG",
"product_id": "CSAFPID-112457"
}
},
{
"category": "service_pack",
"name": "3.2.1SG",
"product": {
"name": "3.2.1SG",
"product_id": "CSAFPID-112458"
}
},
{
"category": "service_pack",
"name": "3.2.2SG",
"product": {
"name": "3.2.2SG",
"product_id": "CSAFPID-196224"
}
},
{
"category": "service_pack",
"name": "3.2.3SG",
"product": {
"name": "3.2.3SG",
"product_id": "CSAFPID-196225"
}
},
{
"category": "service_pack",
"name": "3.2.4SG",
"product": {
"name": "3.2.4SG",
"product_id": "CSAFPID-196226"
}
},
{
"category": "service_pack",
"name": "3.2.5SG",
"product": {
"name": "3.2.5SG",
"product_id": "CSAFPID-196227"
}
},
{
"category": "service_pack",
"name": "3.2.6SG",
"product": {
"name": "3.2.6SG",
"product_id": "CSAFPID-206195"
}
},
{
"category": "service_pack",
"name": "3.2.7SG",
"product": {
"name": "3.2.7SG",
"product_id": "CSAFPID-206196"
}
},
{
"category": "service_pack",
"name": "3.2.8SG",
"product": {
"name": "3.2.8SG",
"product_id": "CSAFPID-206197"
}
},
{
"category": "service_pack",
"name": "3.2.9SG",
"product": {
"name": "3.2.9SG",
"product_id": "CSAFPID-206198"
}
},
{
"category": "service_pack",
"name": "3.2.10SG",
"product": {
"name": "3.2.10SG",
"product_id": "CSAFPID-210068"
}
},
{
"category": "service_pack",
"name": "3.2.11SG",
"product": {
"name": "3.2.11SG",
"product_id": "CSAFPID-221184"
}
}
],
"category": "product_version",
"name": "3.2SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.3.0SG",
"product": {
"name": "3.3.0SG",
"product_id": "CSAFPID-188726"
}
},
{
"category": "service_pack",
"name": "3.3.2SG",
"product": {
"name": "3.3.2SG",
"product_id": "CSAFPID-196228"
}
},
{
"category": "service_pack",
"name": "3.3.1SG",
"product": {
"name": "3.3.1SG",
"product_id": "CSAFPID-196287"
}
}
],
"category": "product_version",
"name": "3.3SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.4.0SG",
"product": {
"name": "3.4.0SG",
"product_id": "CSAFPID-196230"
}
},
{
"category": "service_pack",
"name": "3.4.2SG",
"product": {
"name": "3.4.2SG",
"product_id": "CSAFPID-196231"
}
},
{
"category": "service_pack",
"name": "3.4.1SG",
"product": {
"name": "3.4.1SG",
"product_id": "CSAFPID-196288"
}
},
{
"category": "service_pack",
"name": "3.4.3SG",
"product": {
"name": "3.4.3SG",
"product_id": "CSAFPID-206165"
}
},
{
"category": "service_pack",
"name": "3.4.4SG",
"product": {
"name": "3.4.4SG",
"product_id": "CSAFPID-206166"
}
},
{
"category": "service_pack",
"name": "3.4.5SG",
"product": {
"name": "3.4.5SG",
"product_id": "CSAFPID-206167"
}
},
{
"category": "service_pack",
"name": "3.4.6SG",
"product": {
"name": "3.4.6SG",
"product_id": "CSAFPID-210070"
}
},
{
"category": "service_pack",
"name": "3.4.7SG",
"product": {
"name": "3.4.7SG",
"product_id": "CSAFPID-213785"
}
},
{
"category": "service_pack",
"name": "3.4.8SG",
"product": {
"name": "3.4.8SG",
"product_id": "CSAFPID-221185"
}
}
],
"category": "product_version",
"name": "3.4SG"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.5.0E",
"product": {
"name": "3.5.0E",
"product_id": "CSAFPID-197145"
}
},
{
"category": "service_pack",
"name": "3.5.1E",
"product": {
"name": "3.5.1E",
"product_id": "CSAFPID-206168"
}
},
{
"category": "service_pack",
"name": "3.5.2E",
"product": {
"name": "3.5.2E",
"product_id": "CSAFPID-206169"
}
},
{
"category": "service_pack",
"name": "3.5.3E",
"product": {
"name": "3.5.3E",
"product_id": "CSAFPID-206170"
}
}
],
"category": "product_version",
"name": "3.5E"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.6.0E",
"product": {
"name": "3.6.0E",
"product_id": "CSAFPID-206172"
}
},
{
"category": "service_pack",
"name": "3.6.1E",
"product": {
"name": "3.6.1E",
"product_id": "CSAFPID-206173"
}
},
{
"category": "service_pack",
"name": "3.6.0bE",
"product": {
"name": "3.6.0bE",
"product_id": "CSAFPID-210074"
}
},
{
"category": "service_pack",
"name": "3.6.3E",
"product": {
"name": "3.6.3E",
"product_id": "CSAFPID-212674"
}
},
{
"category": "service_pack",
"name": "3.6.4E",
"product": {
"name": "3.6.4E",
"product_id": "CSAFPID-213790"
}
},
{
"category": "service_pack",
"name": "3.6.5E",
"product": {
"name": "3.6.5E",
"product_id": "CSAFPID-217279"
}
},
{
"category": "service_pack",
"name": "3.6.6E",
"product": {
"name": "3.6.6E",
"product_id": "CSAFPID-220357"
}
},
{
"category": "service_pack",
"name": "3.6.5aE",
"product": {
"name": "3.6.5aE",
"product_id": "CSAFPID-221108"
}
},
{
"category": "service_pack",
"name": "3.6.5bE",
"product": {
"name": "3.6.5bE",
"product_id": "CSAFPID-222435"
}
},
{
"category": "service_pack",
"name": "3.6.7E",
"product": {
"name": "3.6.7E",
"product_id": "CSAFPID-224840"
}
},
{
"category": "service_pack",
"name": "3.6.8E",
"product": {
"name": "3.6.8E",
"product_id": "CSAFPID-229136"
}
},
{
"category": "service_pack",
"name": "3.6.9E",
"product": {
"name": "3.6.9E",
"product_id": "CSAFPID-232766"
}
}
],
"category": "product_version",
"name": "3.6E"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.3.0SQ",
"product": {
"name": "3.3.0SQ",
"product_id": "CSAFPID-206205"
}
},
{
"category": "service_pack",
"name": "3.3.1SQ",
"product": {
"name": "3.3.1SQ",
"product_id": "CSAFPID-206206"
}
}
],
"category": "product_version",
"name": "3.3SQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.4.0SQ",
"product": {
"name": "3.4.0SQ",
"product_id": "CSAFPID-206208"
}
},
{
"category": "service_pack",
"name": "3.4.1SQ",
"product": {
"name": "3.4.1SQ",
"product_id": "CSAFPID-206209"
}
}
],
"category": "product_version",
"name": "3.4SQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.7.0E",
"product": {
"name": "3.7.0E",
"product_id": "CSAFPID-206211"
}
},
{
"category": "service_pack",
"name": "3.7.1E",
"product": {
"name": "3.7.1E",
"product_id": "CSAFPID-210076"
}
},
{
"category": "service_pack",
"name": "3.7.2E",
"product": {
"name": "3.7.2E",
"product_id": "CSAFPID-210077"
}
},
{
"category": "service_pack",
"name": "3.7.3E",
"product": {
"name": "3.7.3E",
"product_id": "CSAFPID-213797"
}
},
{
"category": "service_pack",
"name": "3.7.4E",
"product": {
"name": "3.7.4E",
"product_id": "CSAFPID-217280"
}
},
{
"category": "service_pack",
"name": "3.7.5E",
"product": {
"name": "3.7.5E",
"product_id": "CSAFPID-220290"
}
}
],
"category": "product_version",
"name": "3.7E"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.5.0SQ",
"product": {
"name": "3.5.0SQ",
"product_id": "CSAFPID-210072"
}
},
{
"category": "service_pack",
"name": "3.5.1SQ",
"product": {
"name": "3.5.1SQ",
"product_id": "CSAFPID-213786"
}
},
{
"category": "service_pack",
"name": "3.5.2SQ",
"product": {
"name": "3.5.2SQ",
"product_id": "CSAFPID-213787"
}
},
{
"category": "service_pack",
"name": "3.5.3SQ",
"product": {
"name": "3.5.3SQ",
"product_id": "CSAFPID-217278"
}
},
{
"category": "service_pack",
"name": "3.5.4SQ",
"product": {
"name": "3.5.4SQ",
"product_id": "CSAFPID-220671"
}
},
{
"category": "service_pack",
"name": "3.5.5SQ",
"product": {
"name": "3.5.5SQ",
"product_id": "CSAFPID-225360"
}
},
{
"category": "service_pack",
"name": "3.5.6SQ",
"product": {
"name": "3.5.6SQ",
"product_id": "CSAFPID-226037"
}
},
{
"category": "service_pack",
"name": "3.5.7SQ",
"product": {
"name": "3.5.7SQ",
"product_id": "CSAFPID-227513"
}
},
{
"category": "service_pack",
"name": "3.5.8SQ",
"product": {
"name": "3.5.8SQ",
"product_id": "CSAFPID-232851"
}
}
],
"category": "product_version",
"name": "3.5SQ"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.8.0E",
"product": {
"name": "3.8.0E",
"product_id": "CSAFPID-213811"
}
},
{
"category": "service_pack",
"name": "3.8.1E",
"product": {
"name": "3.8.1E",
"product_id": "CSAFPID-213812"
}
},
{
"category": "service_pack",
"name": "3.8.2E",
"product": {
"name": "3.8.2E",
"product_id": "CSAFPID-217283"
}
},
{
"category": "service_pack",
"name": "3.8.3E",
"product": {
"name": "3.8.3E",
"product_id": "CSAFPID-220489"
}
},
{
"category": "service_pack",
"name": "3.8.4E",
"product": {
"name": "3.8.4E",
"product_id": "CSAFPID-222695"
}
},
{
"category": "service_pack",
"name": "3.8.5E",
"product": {
"name": "3.8.5E",
"product_id": "CSAFPID-226331"
}
},
{
"category": "service_pack",
"name": "3.8.5aE",
"product": {
"name": "3.8.5aE",
"product_id": "CSAFPID-231004"
}
},
{
"category": "service_pack",
"name": "3.8.6E",
"product": {
"name": "3.8.6E",
"product_id": "CSAFPID-231472"
}
},
{
"category": "service_pack",
"name": "3.8.7E",
"product": {
"name": "3.8.7E",
"product_id": "CSAFPID-239007"
}
}
],
"category": "product_version",
"name": "3.8E"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.18.2aSP",
"product": {
"name": "3.18.2aSP",
"product_id": "CSAFPID-226160"
}
}
],
"category": "product_version",
"name": "3.18SP"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.9.0E",
"product": {
"name": "3.9.0E",
"product_id": "CSAFPID-217282"
}
},
{
"category": "service_pack",
"name": "3.9.1E",
"product": {
"name": "3.9.1E",
"product_id": "CSAFPID-222483"
}
},
{
"category": "service_pack",
"name": "3.9.2E",
"product": {
"name": "3.9.2E",
"product_id": "CSAFPID-226158"
}
},
{
"category": "service_pack",
"name": "3.9.2bE",
"product": {
"name": "3.9.2bE",
"product_id": "CSAFPID-227755"
}
}
],
"category": "product_version",
"name": "3.9E"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.6.5",
"product": {
"name": "16.6.5",
"product_id": "CSAFPID-241736"
}
},
{
"category": "service_pack",
"name": "16.6.5a",
"product": {
"name": "16.6.5a",
"product_id": "CSAFPID-252235"
}
},
{
"category": "service_pack",
"name": "16.6.5b",
"product": {
"name": "16.6.5b",
"product_id": "CSAFPID-258170"
}
},
{
"category": "service_pack",
"name": "16.6.7",
"product": {
"name": "16.6.7",
"product_id": "CSAFPID-261241"
}
},
{
"category": "service_pack",
"name": "16.6.7a",
"product": {
"name": "16.6.7a",
"product_id": "CSAFPID-270097"
}
},
{
"category": "service_pack",
"name": "16.6.8",
"product": {
"name": "16.6.8",
"product_id": "CSAFPID-277148"
}
},
{
"category": "service_pack",
"name": "16.6.9",
"product": {
"name": "16.6.9",
"product_id": "CSAFPID-280801"
}
},
{
"category": "service_pack",
"name": "16.6.10",
"product": {
"name": "16.6.10",
"product_id": "CSAFPID-283835"
}
}
],
"category": "product_version",
"name": "16.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.7.4",
"product": {
"name": "16.7.4",
"product_id": "CSAFPID-258388"
}
}
],
"category": "product_version",
"name": "16.7"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.8.3",
"product": {
"name": "16.8.3",
"product_id": "CSAFPID-257984"
}
}
],
"category": "product_version",
"name": "16.8"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.9.3",
"product": {
"name": "16.9.3",
"product_id": "CSAFPID-251075"
}
},
{
"category": "service_pack",
"name": "16.9.2s",
"product": {
"name": "16.9.2s",
"product_id": "CSAFPID-252272"
}
},
{
"category": "service_pack",
"name": "16.9.3h",
"product": {
"name": "16.9.3h",
"product_id": "CSAFPID-258229"
}
},
{
"category": "service_pack",
"name": "16.9.4",
"product": {
"name": "16.9.4",
"product_id": "CSAFPID-262390"
}
},
{
"category": "service_pack",
"name": "16.9.3s",
"product": {
"name": "16.9.3s",
"product_id": "CSAFPID-262549"
}
},
{
"category": "service_pack",
"name": "16.9.3a",
"product": {
"name": "16.9.3a",
"product_id": "CSAFPID-263804"
}
},
{
"category": "service_pack",
"name": "16.9.4c",
"product": {
"name": "16.9.4c",
"product_id": "CSAFPID-268921"
}
},
{
"category": "service_pack",
"name": "16.9.5f",
"product": {
"name": "16.9.5f",
"product_id": "CSAFPID-276837"
}
},
{
"category": "service_pack",
"name": "16.9.6",
"product": {
"name": "16.9.6",
"product_id": "CSAFPID-277945"
}
},
{
"category": "service_pack",
"name": "16.9.7",
"product": {
"name": "16.9.7",
"product_id": "CSAFPID-280651"
}
},
{
"category": "service_pack",
"name": "16.9.8",
"product": {
"name": "16.9.8",
"product_id": "CSAFPID-280938"
}
},
{
"category": "service_pack",
"name": "16.9.8a",
"product": {
"name": "16.9.8a",
"product_id": "CSAFPID-290562"
}
},
{
"category": "service_pack",
"name": "16.9.8b",
"product": {
"name": "16.9.8b",
"product_id": "CSAFPID-290669"
}
}
],
"category": "product_version",
"name": "16.9"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.10.1a",
"product": {
"name": "16.10.1a",
"product_id": "CSAFPID-250629"
}
},
{
"category": "service_pack",
"name": "16.10.1b",
"product": {
"name": "16.10.1b",
"product_id": "CSAFPID-252045"
}
},
{
"category": "service_pack",
"name": "16.10.1s",
"product": {
"name": "16.10.1s",
"product_id": "CSAFPID-252913"
}
},
{
"category": "service_pack",
"name": "16.10.1c",
"product": {
"name": "16.10.1c",
"product_id": "CSAFPID-254688"
}
},
{
"category": "service_pack",
"name": "16.10.1e",
"product": {
"name": "16.10.1e",
"product_id": "CSAFPID-257955"
}
},
{
"category": "service_pack",
"name": "16.10.1d",
"product": {
"name": "16.10.1d",
"product_id": "CSAFPID-258900"
}
},
{
"category": "service_pack",
"name": "16.10.2",
"product": {
"name": "16.10.2",
"product_id": "CSAFPID-260917"
}
},
{
"category": "service_pack",
"name": "16.10.1f",
"product": {
"name": "16.10.1f",
"product_id": "CSAFPID-262595"
}
},
{
"category": "service_pack",
"name": "16.10.1g",
"product": {
"name": "16.10.1g",
"product_id": "CSAFPID-266259"
}
}
],
"category": "product_version",
"name": "16.10"
},
{
"branches": [
{
"category": "service_pack",
"name": "3.10.0E",
"product": {
"name": "3.10.0E",
"product_id": "CSAFPID-227555"
}
},
{
"category": "service_pack",
"name": "3.10.1E",
"product": {
"name": "3.10.1E",
"product_id": "CSAFPID-228689"
}
},
{
"category": "service_pack",
"name": "3.10.0cE",
"product": {
"name": "3.10.0cE",
"product_id": "CSAFPID-231246"
}
},
{
"category": "service_pack",
"name": "3.10.1aE",
"product": {
"name": "3.10.1aE",
"product_id": "CSAFPID-239000"
}
},
{
"category": "service_pack",
"name": "3.10.1sE",
"product": {
"name": "3.10.1sE",
"product_id": "CSAFPID-240187"
}
}
],
"category": "product_version",
"name": "3.10E"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.11.1",
"product": {
"name": "16.11.1",
"product_id": "CSAFPID-227918"
}
},
{
"category": "service_pack",
"name": "16.11.1a",
"product": {
"name": "16.11.1a",
"product_id": "CSAFPID-252271"
}
},
{
"category": "service_pack",
"name": "16.11.1b",
"product": {
"name": "16.11.1b",
"product_id": "CSAFPID-260741"
}
},
{
"category": "service_pack",
"name": "16.11.2",
"product": {
"name": "16.11.2",
"product_id": "CSAFPID-261240"
}
},
{
"category": "service_pack",
"name": "16.11.1s",
"product": {
"name": "16.11.1s",
"product_id": "CSAFPID-261465"
}
},
{
"category": "service_pack",
"name": "16.11.1c",
"product": {
"name": "16.11.1c",
"product_id": "CSAFPID-264096"
}
}
],
"category": "product_version",
"name": "16.11"
},
{
"branches": [
{
"category": "service_pack",
"name": "16.12.1",
"product": {
"name": "16.12.1",
"product_id": "CSAFPID-227920"
}
},
{
"category": "service_pack",
"name": "16.12.1s",
"product": {
"name": "16.12.1s",
"product_id": "CSAFPID-265735"
}
},
{
"category": "service_pack",
"name": "16.12.1a",
"product": {
"name": "16.12.1a",
"product_id": "CSAFPID-265841"
}
},
{
"category": "service_pack",
"name": "16.12.1c",
"product": {
"name": "16.12.1c",
"product_id": "CSAFPID-267110"
}
},
{
"category": "service_pack",
"name": "16.12.1w",
"product": {
"name": "16.12.1w",
"product_id": "CSAFPID-267240"
}
},
{
"category": "service_pack",
"name": "16.12.2",
"product": {
"name": "16.12.2",
"product_id": "CSAFPID-267605"
}
},
{
"category": "service_pack",
"name": "16.12.1y",
"product": {
"name": "16.12.1y",
"product_id": "CSAFPID-271938"
}
},
{
"category": "service_pack",
"name": "16.12.2a",
"product": {
"name": "16.12.2a",
"product_id": "CSAFPID-272047"
}
},
{
"category": "service_pack",
"name": "16.12.3",
"product": {
"name": "16.12.3",
"product_id": "CSAFPID-273445"
}
},
{
"category": "service_pack",
"name": "16.12.2s",
"product": {
"name": "16.12.2s",
"product_id": "CSAFPID-273509"
}
},
{
"category": "service_pack",
"name": "16.12.1x",
"product": {
"name": "16.12.1x",
"product_id": "CSAFPID-273649"
}
},
{
"category": "service_pack",
"name": "16.12.1t",
"product": {
"name": "16.12.1t",
"product_id": "CSAFPID-274832"
}
},
{
"category": "service_pack",
"name": "16.12.2t",
"product": {
"name": "16.12.2t",
"product_id": "CSAFPID-275538"
}
},
{
"category": "service_pack",
"name": "16.12.3s",
"product": {
"name": "16.12.3s",
"product_id": "CSAFPID-277255"
}
},
{
"category": "service_pack",
"name": "16.12.1z",
"product": {
"name": "16.12.1z",
"product_id": "CSAFPID-277256"
}
},
{
"category": "service_pack",
"name": "16.12.3a",
"product": {
"name": "16.12.3a",
"product_id": "CSAFPID-277321"
}
},
{
"category": "service_pack",
"name": "16.12.1z1",
"product": {
"name": "16.12.1z1",
"product_id": "CSAFPID-281320"
}
},
{
"category": "service_pack",
"name": "16.12.1z2",
"product": {
"name": "16.12.1z2",
"product_id": "CSAFPID-283831"
}
}
],
"category": "product_version",
"name": "16.12"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.1.1a",
"product": {
"name": "17.1.1a",
"product_id": "CSAFPID-272932"
}
},
{
"category": "service_pack",
"name": "17.1.1s",
"product": {
"name": "17.1.1s",
"product_id": "CSAFPID-274818"
}
},
{
"category": "service_pack",
"name": "17.1.2",
"product": {
"name": "17.1.2",
"product_id": "CSAFPID-277338"
}
},
{
"category": "service_pack",
"name": "17.1.1t",
"product": {
"name": "17.1.1t",
"product_id": "CSAFPID-277348"
}
},
{
"category": "service_pack",
"name": "17.1.3",
"product": {
"name": "17.1.3",
"product_id": "CSAFPID-280652"
}
}
],
"category": "product_version",
"name": "17.1"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.4.1c",
"product": {
"name": "17.4.1c",
"product_id": "CSAFPID-282116"
}
}
],
"category": "product_version",
"name": "17.4"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.5.1c",
"product": {
"name": "17.5.1c",
"product_id": "CSAFPID-292698"
}
}
],
"category": "product_version",
"name": "17.5"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.6.1y",
"product": {
"name": "17.6.1y",
"product_id": "CSAFPID-286477"
}
}
],
"category": "product_version",
"name": "17.6"
},
{
"branches": [
{
"category": "service_pack",
"name": "17.12.6a",
"product": {
"name": "17.12.6a",
"product_id": "CSAFPID-306611"
}
}
],
"category": "product_version",
"name": "17.12"
}
],
"category": "product_family",
"name": "Cisco IOS XE Software"
}
],
"category": "vendor",
"name": "Cisco"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-1746",
"ids": [
{
"system_name": "Cisco Bug ID",
"text": "CSCvj25124"
},
{
"system_name": "Cisco Bug ID",
"text": "CSCvj25068"
}
],
"notes": [
{
"category": "other",
"text": "Complete.",
"title": "Affected Product Comprehensiveness"
}
],
"product_status": {
"known_affected": [
"CSAFPID-103473",
"CSAFPID-103492",
"CSAFPID-103499",
"CSAFPID-103559",
"CSAFPID-103567",
"CSAFPID-103646",
"CSAFPID-103648",
"CSAFPID-103649",
"CSAFPID-103678",
"CSAFPID-103684",
"CSAFPID-103736",
"CSAFPID-103763",
"CSAFPID-103766",
"CSAFPID-103774",
"CSAFPID-103775",
"CSAFPID-103801",
"CSAFPID-103832",
"CSAFPID-103840",
"CSAFPID-103855",
"CSAFPID-103921",
"CSAFPID-103930",
"CSAFPID-103955",
"CSAFPID-104041",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104091",
"CSAFPID-104100",
"CSAFPID-104101",
"CSAFPID-104153",
"CSAFPID-104158",
"CSAFPID-104191",
"CSAFPID-104254",
"CSAFPID-104255",
"CSAFPID-104305",
"CSAFPID-104313",
"CSAFPID-104342",
"CSAFPID-104355",
"CSAFPID-104376",
"CSAFPID-104427",
"CSAFPID-104467",
"CSAFPID-104494",
"CSAFPID-104578",
"CSAFPID-104591",
"CSAFPID-104599",
"CSAFPID-104630",
"CSAFPID-104642",
"CSAFPID-104662",
"CSAFPID-104696",
"CSAFPID-104706",
"CSAFPID-104719",
"CSAFPID-104743",
"CSAFPID-104746",
"CSAFPID-104806",
"CSAFPID-104815",
"CSAFPID-104833",
"CSAFPID-104850",
"CSAFPID-104855",
"CSAFPID-104896",
"CSAFPID-104903",
"CSAFPID-104970",
"CSAFPID-104972",
"CSAFPID-105043",
"CSAFPID-105058",
"CSAFPID-105111",
"CSAFPID-105158",
"CSAFPID-105183",
"CSAFPID-105185",
"CSAFPID-105186",
"CSAFPID-105216",
"CSAFPID-105236",
"CSAFPID-105253",
"CSAFPID-105285",
"CSAFPID-105290",
"CSAFPID-105299",
"CSAFPID-105302",
"CSAFPID-105328",
"CSAFPID-105392",
"CSAFPID-105394",
"CSAFPID-105430",
"CSAFPID-105444",
"CSAFPID-105466",
"CSAFPID-105485",
"CSAFPID-105492",
"CSAFPID-105513",
"CSAFPID-105539",
"CSAFPID-105572",
"CSAFPID-105660",
"CSAFPID-105689",
"CSAFPID-105702",
"CSAFPID-105704",
"CSAFPID-105741",
"CSAFPID-105760",
"CSAFPID-105765",
"CSAFPID-105780",
"CSAFPID-105824",
"CSAFPID-105881",
"CSAFPID-105923",
"CSAFPID-105965",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-105999",
"CSAFPID-106016",
"CSAFPID-106029",
"CSAFPID-106059",
"CSAFPID-106071",
"CSAFPID-106072",
"CSAFPID-106089",
"CSAFPID-106145",
"CSAFPID-106156",
"CSAFPID-106163",
"CSAFPID-106203",
"CSAFPID-106232",
"CSAFPID-106247",
"CSAFPID-106291",
"CSAFPID-106323",
"CSAFPID-106401",
"CSAFPID-106449",
"CSAFPID-106466",
"CSAFPID-106496",
"CSAFPID-106526",
"CSAFPID-106528",
"CSAFPID-106540",
"CSAFPID-106564",
"CSAFPID-106570",
"CSAFPID-106606",
"CSAFPID-106674",
"CSAFPID-106684",
"CSAFPID-106686",
"CSAFPID-106718",
"CSAFPID-106733",
"CSAFPID-106746",
"CSAFPID-106886",
"CSAFPID-106930",
"CSAFPID-106971",
"CSAFPID-106982",
"CSAFPID-106997",
"CSAFPID-107002",
"CSAFPID-107073",
"CSAFPID-107077",
"CSAFPID-107094",
"CSAFPID-107108",
"CSAFPID-107112",
"CSAFPID-107135",
"CSAFPID-107142",
"CSAFPID-107209",
"CSAFPID-107283",
"CSAFPID-107289",
"CSAFPID-107301",
"CSAFPID-107304",
"CSAFPID-107308",
"CSAFPID-107325",
"CSAFPID-107476",
"CSAFPID-107495",
"CSAFPID-107544",
"CSAFPID-107591",
"CSAFPID-107630",
"CSAFPID-107645",
"CSAFPID-107650",
"CSAFPID-107664",
"CSAFPID-107688",
"CSAFPID-107692",
"CSAFPID-107832",
"CSAFPID-107852",
"CSAFPID-108062",
"CSAFPID-108172",
"CSAFPID-108306",
"CSAFPID-109098",
"CSAFPID-109242",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109760",
"CSAFPID-109808",
"CSAFPID-110186",
"CSAFPID-111005",
"CSAFPID-111010",
"CSAFPID-111019",
"CSAFPID-111045",
"CSAFPID-111384",
"CSAFPID-111674",
"CSAFPID-112131",
"CSAFPID-112141",
"CSAFPID-113948",
"CSAFPID-113961",
"CSAFPID-114093",
"CSAFPID-114665",
"CSAFPID-115477",
"CSAFPID-115688",
"CSAFPID-115832",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117196",
"CSAFPID-117280",
"CSAFPID-117282",
"CSAFPID-117871",
"CSAFPID-183811",
"CSAFPID-184125",
"CSAFPID-184567",
"CSAFPID-185274",
"CSAFPID-185281",
"CSAFPID-187057",
"CSAFPID-187233",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-187958",
"CSAFPID-188035",
"CSAFPID-188816",
"CSAFPID-189064",
"CSAFPID-189115",
"CSAFPID-189187",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-190637",
"CSAFPID-191566",
"CSAFPID-191928",
"CSAFPID-191948",
"CSAFPID-192163",
"CSAFPID-192423",
"CSAFPID-192447",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-193177",
"CSAFPID-193180",
"CSAFPID-193283",
"CSAFPID-194439",
"CSAFPID-194467",
"CSAFPID-194540",
"CSAFPID-194649",
"CSAFPID-194741",
"CSAFPID-194913",
"CSAFPID-195033",
"CSAFPID-195469",
"CSAFPID-195481",
"CSAFPID-195489",
"CSAFPID-195519",
"CSAFPID-195636",
"CSAFPID-195688",
"CSAFPID-195770",
"CSAFPID-195771",
"CSAFPID-195943",
"CSAFPID-196115",
"CSAFPID-196417",
"CSAFPID-196528",
"CSAFPID-197462",
"CSAFPID-197465",
"CSAFPID-197471",
"CSAFPID-197480",
"CSAFPID-197481",
"CSAFPID-197483",
"CSAFPID-197488",
"CSAFPID-198060",
"CSAFPID-198063",
"CSAFPID-198214",
"CSAFPID-198425",
"CSAFPID-198542",
"CSAFPID-200486",
"CSAFPID-200488",
"CSAFPID-200489",
"CSAFPID-200496",
"CSAFPID-200502",
"CSAFPID-201074",
"CSAFPID-201336",
"CSAFPID-201366",
"CSAFPID-201448",
"CSAFPID-201683",
"CSAFPID-202565",
"CSAFPID-202716",
"CSAFPID-204094",
"CSAFPID-204097",
"CSAFPID-204099",
"CSAFPID-204101",
"CSAFPID-204102",
"CSAFPID-204108",
"CSAFPID-204186",
"CSAFPID-204187",
"CSAFPID-204228",
"CSAFPID-204324",
"CSAFPID-204818",
"CSAFPID-204831",
"CSAFPID-205064",
"CSAFPID-205672",
"CSAFPID-205731",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209030",
"CSAFPID-209031",
"CSAFPID-209034",
"CSAFPID-209035",
"CSAFPID-209036",
"CSAFPID-209037",
"CSAFPID-209038",
"CSAFPID-209039",
"CSAFPID-209040",
"CSAFPID-209041",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209060",
"CSAFPID-209061",
"CSAFPID-209096",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209421",
"CSAFPID-209465",
"CSAFPID-209466",
"CSAFPID-209569",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209887",
"CSAFPID-210203",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210958",
"CSAFPID-210990",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-211717",
"CSAFPID-211982",
"CSAFPID-212329",
"CSAFPID-212635",
"CSAFPID-213610",
"CSAFPID-213788",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214556",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-214992",
"CSAFPID-216295",
"CSAFPID-217078",
"CSAFPID-217805",
"CSAFPID-218891",
"CSAFPID-218995",
"CSAFPID-220038",
"CSAFPID-220441",
"CSAFPID-220457",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-221137",
"CSAFPID-222342",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222530",
"CSAFPID-222924",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224553",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225358",
"CSAFPID-225740",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227959",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230966",
"CSAFPID-230967",
"CSAFPID-230968",
"CSAFPID-230969",
"CSAFPID-230970",
"CSAFPID-230971",
"CSAFPID-230973",
"CSAFPID-230974",
"CSAFPID-230976",
"CSAFPID-230977",
"CSAFPID-230982",
"CSAFPID-230983",
"CSAFPID-230992",
"CSAFPID-231245",
"CSAFPID-231471",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-234926",
"CSAFPID-238999",
"CSAFPID-239053",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241916",
"CSAFPID-243144",
"CSAFPID-247572",
"CSAFPID-250628",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280759",
"CSAFPID-282026",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284566",
"CSAFPID-284568",
"CSAFPID-284785",
"CSAFPID-286029",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286844",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289371",
"CSAFPID-290557",
"CSAFPID-290618",
"CSAFPID-35244",
"CSAFPID-59974",
"CSAFPID-60292",
"CSAFPID-60350",
"CSAFPID-60351",
"CSAFPID-60358",
"CSAFPID-60365",
"CSAFPID-60367",
"CSAFPID-60368",
"CSAFPID-60369",
"CSAFPID-60399",
"CSAFPID-62580",
"CSAFPID-62582",
"CSAFPID-62587",
"CSAFPID-62600",
"CSAFPID-62601",
"CSAFPID-62602",
"CSAFPID-63898",
"CSAFPID-63903",
"CSAFPID-63905",
"CSAFPID-63911",
"CSAFPID-63912",
"CSAFPID-63913",
"CSAFPID-63914",
"CSAFPID-63915",
"CSAFPID-63916",
"CSAFPID-63918",
"CSAFPID-63919",
"CSAFPID-63920",
"CSAFPID-63927",
"CSAFPID-63930",
"CSAFPID-63936",
"CSAFPID-63937",
"CSAFPID-69479",
"CSAFPID-69801",
"CSAFPID-78260",
"CSAFPID-95363",
"CSAFPID-112457",
"CSAFPID-112458",
"CSAFPID-188726",
"CSAFPID-196224",
"CSAFPID-196225",
"CSAFPID-196226",
"CSAFPID-196227",
"CSAFPID-196228",
"CSAFPID-196230",
"CSAFPID-196231",
"CSAFPID-196287",
"CSAFPID-196288",
"CSAFPID-197145",
"CSAFPID-206165",
"CSAFPID-206166",
"CSAFPID-206167",
"CSAFPID-206168",
"CSAFPID-206169",
"CSAFPID-206170",
"CSAFPID-206172",
"CSAFPID-206173",
"CSAFPID-206195",
"CSAFPID-206196",
"CSAFPID-206197",
"CSAFPID-206198",
"CSAFPID-206205",
"CSAFPID-206206",
"CSAFPID-206208",
"CSAFPID-206209",
"CSAFPID-206211",
"CSAFPID-210068",
"CSAFPID-210070",
"CSAFPID-210072",
"CSAFPID-210074",
"CSAFPID-210076",
"CSAFPID-210077",
"CSAFPID-212674",
"CSAFPID-213785",
"CSAFPID-213786",
"CSAFPID-213787",
"CSAFPID-213790",
"CSAFPID-213797",
"CSAFPID-213811",
"CSAFPID-213812",
"CSAFPID-217278",
"CSAFPID-217279",
"CSAFPID-217280",
"CSAFPID-217282",
"CSAFPID-217283",
"CSAFPID-220290",
"CSAFPID-220357",
"CSAFPID-220489",
"CSAFPID-220671",
"CSAFPID-221108",
"CSAFPID-221184",
"CSAFPID-221185",
"CSAFPID-222435",
"CSAFPID-222483",
"CSAFPID-222695",
"CSAFPID-224840",
"CSAFPID-225360",
"CSAFPID-226037",
"CSAFPID-226158",
"CSAFPID-226160",
"CSAFPID-226331",
"CSAFPID-227513",
"CSAFPID-227555",
"CSAFPID-227755",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228689",
"CSAFPID-229136",
"CSAFPID-231004",
"CSAFPID-231246",
"CSAFPID-231472",
"CSAFPID-232766",
"CSAFPID-232851",
"CSAFPID-239000",
"CSAFPID-239007",
"CSAFPID-240187",
"CSAFPID-241736",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-254688",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277256",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-281320",
"CSAFPID-282116",
"CSAFPID-283831",
"CSAFPID-283835",
"CSAFPID-286477",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-292698",
"CSAFPID-306611"
]
},
"release_date": "2019-03-27T16:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"details": "Cisco has released software updates that address this vulnerability.",
"product_ids": [
"CSAFPID-103473",
"CSAFPID-103492",
"CSAFPID-103499",
"CSAFPID-103559",
"CSAFPID-103567",
"CSAFPID-103646",
"CSAFPID-103648",
"CSAFPID-103649",
"CSAFPID-103678",
"CSAFPID-103684",
"CSAFPID-103736",
"CSAFPID-103763",
"CSAFPID-103766",
"CSAFPID-103774",
"CSAFPID-103775",
"CSAFPID-103801",
"CSAFPID-103832",
"CSAFPID-103840",
"CSAFPID-103855",
"CSAFPID-103921",
"CSAFPID-103930",
"CSAFPID-103955",
"CSAFPID-104041",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104091",
"CSAFPID-104100",
"CSAFPID-104101",
"CSAFPID-104153",
"CSAFPID-104158",
"CSAFPID-104191",
"CSAFPID-104254",
"CSAFPID-104255",
"CSAFPID-104305",
"CSAFPID-104313",
"CSAFPID-104342",
"CSAFPID-104355",
"CSAFPID-104376",
"CSAFPID-104427",
"CSAFPID-104467",
"CSAFPID-104494",
"CSAFPID-104578",
"CSAFPID-104591",
"CSAFPID-104599",
"CSAFPID-104630",
"CSAFPID-104642",
"CSAFPID-104662",
"CSAFPID-104696",
"CSAFPID-104706",
"CSAFPID-104719",
"CSAFPID-104743",
"CSAFPID-104746",
"CSAFPID-104806",
"CSAFPID-104815",
"CSAFPID-104833",
"CSAFPID-104850",
"CSAFPID-104855",
"CSAFPID-104896",
"CSAFPID-104903",
"CSAFPID-104970",
"CSAFPID-104972",
"CSAFPID-105043",
"CSAFPID-105058",
"CSAFPID-105111",
"CSAFPID-105158",
"CSAFPID-105183",
"CSAFPID-105185",
"CSAFPID-105186",
"CSAFPID-105216",
"CSAFPID-105236",
"CSAFPID-105253",
"CSAFPID-105285",
"CSAFPID-105290",
"CSAFPID-105299",
"CSAFPID-105302",
"CSAFPID-105328",
"CSAFPID-105392",
"CSAFPID-105394",
"CSAFPID-105430",
"CSAFPID-105444",
"CSAFPID-105466",
"CSAFPID-105485",
"CSAFPID-105492",
"CSAFPID-105513",
"CSAFPID-105539",
"CSAFPID-105572",
"CSAFPID-105660",
"CSAFPID-105689",
"CSAFPID-105702",
"CSAFPID-105704",
"CSAFPID-105741",
"CSAFPID-105760",
"CSAFPID-105765",
"CSAFPID-105780",
"CSAFPID-105824",
"CSAFPID-105881",
"CSAFPID-105923",
"CSAFPID-105965",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-105999",
"CSAFPID-106016",
"CSAFPID-106029",
"CSAFPID-106059",
"CSAFPID-106071",
"CSAFPID-106072",
"CSAFPID-106089",
"CSAFPID-106145",
"CSAFPID-106156",
"CSAFPID-106163",
"CSAFPID-106203",
"CSAFPID-106232",
"CSAFPID-106247",
"CSAFPID-106291",
"CSAFPID-106323",
"CSAFPID-106401",
"CSAFPID-106449",
"CSAFPID-106466",
"CSAFPID-106496",
"CSAFPID-106526",
"CSAFPID-106528",
"CSAFPID-106540",
"CSAFPID-106564",
"CSAFPID-106570",
"CSAFPID-106606",
"CSAFPID-106674",
"CSAFPID-106684",
"CSAFPID-106686",
"CSAFPID-106718",
"CSAFPID-106733",
"CSAFPID-106746",
"CSAFPID-106886",
"CSAFPID-106930",
"CSAFPID-106971",
"CSAFPID-106982",
"CSAFPID-106997",
"CSAFPID-107002",
"CSAFPID-107073",
"CSAFPID-107077",
"CSAFPID-107094",
"CSAFPID-107108",
"CSAFPID-107112",
"CSAFPID-107135",
"CSAFPID-107142",
"CSAFPID-107209",
"CSAFPID-107283",
"CSAFPID-107289",
"CSAFPID-107301",
"CSAFPID-107304",
"CSAFPID-107308",
"CSAFPID-107325",
"CSAFPID-107476",
"CSAFPID-107495",
"CSAFPID-107544",
"CSAFPID-107591",
"CSAFPID-107630",
"CSAFPID-107645",
"CSAFPID-107650",
"CSAFPID-107664",
"CSAFPID-107688",
"CSAFPID-107692",
"CSAFPID-107832",
"CSAFPID-107852",
"CSAFPID-108062",
"CSAFPID-108172",
"CSAFPID-108306",
"CSAFPID-109098",
"CSAFPID-109242",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109760",
"CSAFPID-109808",
"CSAFPID-110186",
"CSAFPID-111005",
"CSAFPID-111010",
"CSAFPID-111019",
"CSAFPID-111045",
"CSAFPID-111384",
"CSAFPID-111674",
"CSAFPID-112131",
"CSAFPID-112141",
"CSAFPID-113948",
"CSAFPID-113961",
"CSAFPID-114093",
"CSAFPID-114665",
"CSAFPID-115477",
"CSAFPID-115688",
"CSAFPID-115832",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117196",
"CSAFPID-117280",
"CSAFPID-117282",
"CSAFPID-117871",
"CSAFPID-183811",
"CSAFPID-184125",
"CSAFPID-184567",
"CSAFPID-185274",
"CSAFPID-185281",
"CSAFPID-187057",
"CSAFPID-187233",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-187958",
"CSAFPID-188035",
"CSAFPID-188816",
"CSAFPID-189064",
"CSAFPID-189115",
"CSAFPID-189187",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-190637",
"CSAFPID-191566",
"CSAFPID-191928",
"CSAFPID-191948",
"CSAFPID-192163",
"CSAFPID-192423",
"CSAFPID-192447",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-193177",
"CSAFPID-193180",
"CSAFPID-193283",
"CSAFPID-194439",
"CSAFPID-194467",
"CSAFPID-194540",
"CSAFPID-194649",
"CSAFPID-194741",
"CSAFPID-194913",
"CSAFPID-195033",
"CSAFPID-195469",
"CSAFPID-195481",
"CSAFPID-195489",
"CSAFPID-195519",
"CSAFPID-195636",
"CSAFPID-195688",
"CSAFPID-195770",
"CSAFPID-195771",
"CSAFPID-195943",
"CSAFPID-196115",
"CSAFPID-196417",
"CSAFPID-196528",
"CSAFPID-197462",
"CSAFPID-197465",
"CSAFPID-197471",
"CSAFPID-197480",
"CSAFPID-197481",
"CSAFPID-197483",
"CSAFPID-197488",
"CSAFPID-198060",
"CSAFPID-198063",
"CSAFPID-198214",
"CSAFPID-198425",
"CSAFPID-198542",
"CSAFPID-200486",
"CSAFPID-200488",
"CSAFPID-200489",
"CSAFPID-200496",
"CSAFPID-200502",
"CSAFPID-201074",
"CSAFPID-201336",
"CSAFPID-201366",
"CSAFPID-201448",
"CSAFPID-201683",
"CSAFPID-202565",
"CSAFPID-202716",
"CSAFPID-204094",
"CSAFPID-204097",
"CSAFPID-204099",
"CSAFPID-204101",
"CSAFPID-204102",
"CSAFPID-204108",
"CSAFPID-204186",
"CSAFPID-204187",
"CSAFPID-204228",
"CSAFPID-204324",
"CSAFPID-204818",
"CSAFPID-204831",
"CSAFPID-205064",
"CSAFPID-205672",
"CSAFPID-205731",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209030",
"CSAFPID-209031",
"CSAFPID-209034",
"CSAFPID-209035",
"CSAFPID-209036",
"CSAFPID-209037",
"CSAFPID-209038",
"CSAFPID-209039",
"CSAFPID-209040",
"CSAFPID-209041",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209060",
"CSAFPID-209061",
"CSAFPID-209096",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209421",
"CSAFPID-209465",
"CSAFPID-209466",
"CSAFPID-209569",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209887",
"CSAFPID-210203",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210958",
"CSAFPID-210990",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-211717",
"CSAFPID-211982",
"CSAFPID-212329",
"CSAFPID-212635",
"CSAFPID-213610",
"CSAFPID-213788",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214556",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-214992",
"CSAFPID-216295",
"CSAFPID-217078",
"CSAFPID-217805",
"CSAFPID-218891",
"CSAFPID-218995",
"CSAFPID-220038",
"CSAFPID-220441",
"CSAFPID-220457",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-221137",
"CSAFPID-222342",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222530",
"CSAFPID-222924",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224553",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225358",
"CSAFPID-225740",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227959",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230966",
"CSAFPID-230967",
"CSAFPID-230968",
"CSAFPID-230969",
"CSAFPID-230970",
"CSAFPID-230971",
"CSAFPID-230973",
"CSAFPID-230974",
"CSAFPID-230976",
"CSAFPID-230977",
"CSAFPID-230982",
"CSAFPID-230983",
"CSAFPID-230992",
"CSAFPID-231245",
"CSAFPID-231471",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-234926",
"CSAFPID-238999",
"CSAFPID-239053",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241916",
"CSAFPID-243144",
"CSAFPID-247572",
"CSAFPID-250628",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280759",
"CSAFPID-282026",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284566",
"CSAFPID-284568",
"CSAFPID-284785",
"CSAFPID-286029",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286844",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289371",
"CSAFPID-290557",
"CSAFPID-290618",
"CSAFPID-35244",
"CSAFPID-59974",
"CSAFPID-60292",
"CSAFPID-60350",
"CSAFPID-60351",
"CSAFPID-60358",
"CSAFPID-60365",
"CSAFPID-60367",
"CSAFPID-60368",
"CSAFPID-60369",
"CSAFPID-60399",
"CSAFPID-62580",
"CSAFPID-62582",
"CSAFPID-62587",
"CSAFPID-62600",
"CSAFPID-62601",
"CSAFPID-62602",
"CSAFPID-63898",
"CSAFPID-63903",
"CSAFPID-63905",
"CSAFPID-63911",
"CSAFPID-63912",
"CSAFPID-63913",
"CSAFPID-63914",
"CSAFPID-63915",
"CSAFPID-63916",
"CSAFPID-63918",
"CSAFPID-63919",
"CSAFPID-63920",
"CSAFPID-63927",
"CSAFPID-63930",
"CSAFPID-63936",
"CSAFPID-63937",
"CSAFPID-69479",
"CSAFPID-69801",
"CSAFPID-78260",
"CSAFPID-95363",
"CSAFPID-112457",
"CSAFPID-112458",
"CSAFPID-188726",
"CSAFPID-196224",
"CSAFPID-196225",
"CSAFPID-196226",
"CSAFPID-196227",
"CSAFPID-196228",
"CSAFPID-196230",
"CSAFPID-196231",
"CSAFPID-196287",
"CSAFPID-196288",
"CSAFPID-197145",
"CSAFPID-206165",
"CSAFPID-206166",
"CSAFPID-206167",
"CSAFPID-206168",
"CSAFPID-206169",
"CSAFPID-206170",
"CSAFPID-206172",
"CSAFPID-206173",
"CSAFPID-206195",
"CSAFPID-206196",
"CSAFPID-206197",
"CSAFPID-206198",
"CSAFPID-206205",
"CSAFPID-206206",
"CSAFPID-206208",
"CSAFPID-206209",
"CSAFPID-206211",
"CSAFPID-210068",
"CSAFPID-210070",
"CSAFPID-210072",
"CSAFPID-210074",
"CSAFPID-210076",
"CSAFPID-210077",
"CSAFPID-212674",
"CSAFPID-213785",
"CSAFPID-213786",
"CSAFPID-213787",
"CSAFPID-213790",
"CSAFPID-213797",
"CSAFPID-213811",
"CSAFPID-213812",
"CSAFPID-217278",
"CSAFPID-217279",
"CSAFPID-217280",
"CSAFPID-217282",
"CSAFPID-217283",
"CSAFPID-220290",
"CSAFPID-220357",
"CSAFPID-220489",
"CSAFPID-220671",
"CSAFPID-221108",
"CSAFPID-221184",
"CSAFPID-221185",
"CSAFPID-222435",
"CSAFPID-222483",
"CSAFPID-222695",
"CSAFPID-224840",
"CSAFPID-225360",
"CSAFPID-226037",
"CSAFPID-226158",
"CSAFPID-226160",
"CSAFPID-226331",
"CSAFPID-227513",
"CSAFPID-227555",
"CSAFPID-227755",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228689",
"CSAFPID-229136",
"CSAFPID-231004",
"CSAFPID-231246",
"CSAFPID-231472",
"CSAFPID-232766",
"CSAFPID-232851",
"CSAFPID-239000",
"CSAFPID-239007",
"CSAFPID-240187",
"CSAFPID-241736",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-254688",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277256",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-281320",
"CSAFPID-282116",
"CSAFPID-283831",
"CSAFPID-283835",
"CSAFPID-286477",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-292698",
"CSAFPID-306611"
],
"url": "https://software.cisco.com"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-103473",
"CSAFPID-103492",
"CSAFPID-103499",
"CSAFPID-103559",
"CSAFPID-103567",
"CSAFPID-103646",
"CSAFPID-103648",
"CSAFPID-103649",
"CSAFPID-103678",
"CSAFPID-103684",
"CSAFPID-103736",
"CSAFPID-103763",
"CSAFPID-103766",
"CSAFPID-103774",
"CSAFPID-103775",
"CSAFPID-103801",
"CSAFPID-103832",
"CSAFPID-103840",
"CSAFPID-103855",
"CSAFPID-103921",
"CSAFPID-103930",
"CSAFPID-103955",
"CSAFPID-104041",
"CSAFPID-104061",
"CSAFPID-104089",
"CSAFPID-104091",
"CSAFPID-104100",
"CSAFPID-104101",
"CSAFPID-104153",
"CSAFPID-104158",
"CSAFPID-104191",
"CSAFPID-104254",
"CSAFPID-104255",
"CSAFPID-104305",
"CSAFPID-104313",
"CSAFPID-104342",
"CSAFPID-104355",
"CSAFPID-104376",
"CSAFPID-104427",
"CSAFPID-104467",
"CSAFPID-104494",
"CSAFPID-104578",
"CSAFPID-104591",
"CSAFPID-104599",
"CSAFPID-104630",
"CSAFPID-104642",
"CSAFPID-104662",
"CSAFPID-104696",
"CSAFPID-104706",
"CSAFPID-104719",
"CSAFPID-104743",
"CSAFPID-104746",
"CSAFPID-104806",
"CSAFPID-104815",
"CSAFPID-104833",
"CSAFPID-104850",
"CSAFPID-104855",
"CSAFPID-104896",
"CSAFPID-104903",
"CSAFPID-104970",
"CSAFPID-104972",
"CSAFPID-105043",
"CSAFPID-105058",
"CSAFPID-105111",
"CSAFPID-105158",
"CSAFPID-105183",
"CSAFPID-105185",
"CSAFPID-105186",
"CSAFPID-105216",
"CSAFPID-105236",
"CSAFPID-105253",
"CSAFPID-105285",
"CSAFPID-105290",
"CSAFPID-105299",
"CSAFPID-105302",
"CSAFPID-105328",
"CSAFPID-105392",
"CSAFPID-105394",
"CSAFPID-105430",
"CSAFPID-105444",
"CSAFPID-105466",
"CSAFPID-105485",
"CSAFPID-105492",
"CSAFPID-105513",
"CSAFPID-105539",
"CSAFPID-105572",
"CSAFPID-105660",
"CSAFPID-105689",
"CSAFPID-105702",
"CSAFPID-105704",
"CSAFPID-105741",
"CSAFPID-105760",
"CSAFPID-105765",
"CSAFPID-105780",
"CSAFPID-105824",
"CSAFPID-105881",
"CSAFPID-105923",
"CSAFPID-105965",
"CSAFPID-105973",
"CSAFPID-105987",
"CSAFPID-105999",
"CSAFPID-106016",
"CSAFPID-106029",
"CSAFPID-106059",
"CSAFPID-106071",
"CSAFPID-106072",
"CSAFPID-106089",
"CSAFPID-106145",
"CSAFPID-106156",
"CSAFPID-106163",
"CSAFPID-106203",
"CSAFPID-106232",
"CSAFPID-106247",
"CSAFPID-106291",
"CSAFPID-106323",
"CSAFPID-106401",
"CSAFPID-106449",
"CSAFPID-106466",
"CSAFPID-106496",
"CSAFPID-106526",
"CSAFPID-106528",
"CSAFPID-106540",
"CSAFPID-106564",
"CSAFPID-106570",
"CSAFPID-106606",
"CSAFPID-106674",
"CSAFPID-106684",
"CSAFPID-106686",
"CSAFPID-106718",
"CSAFPID-106733",
"CSAFPID-106746",
"CSAFPID-106886",
"CSAFPID-106930",
"CSAFPID-106971",
"CSAFPID-106982",
"CSAFPID-106997",
"CSAFPID-107002",
"CSAFPID-107073",
"CSAFPID-107077",
"CSAFPID-107094",
"CSAFPID-107108",
"CSAFPID-107112",
"CSAFPID-107135",
"CSAFPID-107142",
"CSAFPID-107209",
"CSAFPID-107283",
"CSAFPID-107289",
"CSAFPID-107301",
"CSAFPID-107304",
"CSAFPID-107308",
"CSAFPID-107325",
"CSAFPID-107476",
"CSAFPID-107495",
"CSAFPID-107544",
"CSAFPID-107591",
"CSAFPID-107630",
"CSAFPID-107645",
"CSAFPID-107650",
"CSAFPID-107664",
"CSAFPID-107688",
"CSAFPID-107692",
"CSAFPID-107832",
"CSAFPID-107852",
"CSAFPID-108062",
"CSAFPID-108172",
"CSAFPID-108306",
"CSAFPID-109098",
"CSAFPID-109242",
"CSAFPID-109439",
"CSAFPID-109442",
"CSAFPID-109760",
"CSAFPID-109808",
"CSAFPID-110186",
"CSAFPID-111005",
"CSAFPID-111010",
"CSAFPID-111019",
"CSAFPID-111045",
"CSAFPID-111384",
"CSAFPID-111674",
"CSAFPID-112131",
"CSAFPID-112141",
"CSAFPID-113948",
"CSAFPID-113961",
"CSAFPID-114093",
"CSAFPID-114665",
"CSAFPID-115477",
"CSAFPID-115688",
"CSAFPID-115832",
"CSAFPID-115939",
"CSAFPID-115969",
"CSAFPID-116083",
"CSAFPID-117196",
"CSAFPID-117280",
"CSAFPID-117282",
"CSAFPID-117871",
"CSAFPID-183811",
"CSAFPID-184125",
"CSAFPID-184567",
"CSAFPID-185274",
"CSAFPID-185281",
"CSAFPID-187057",
"CSAFPID-187233",
"CSAFPID-187269",
"CSAFPID-187932",
"CSAFPID-187958",
"CSAFPID-188035",
"CSAFPID-188816",
"CSAFPID-189064",
"CSAFPID-189115",
"CSAFPID-189187",
"CSAFPID-189455",
"CSAFPID-190250",
"CSAFPID-190635",
"CSAFPID-190637",
"CSAFPID-191566",
"CSAFPID-191928",
"CSAFPID-191948",
"CSAFPID-192163",
"CSAFPID-192423",
"CSAFPID-192447",
"CSAFPID-192706",
"CSAFPID-192831",
"CSAFPID-192910",
"CSAFPID-192911",
"CSAFPID-193033",
"CSAFPID-193177",
"CSAFPID-193180",
"CSAFPID-193283",
"CSAFPID-194439",
"CSAFPID-194467",
"CSAFPID-194540",
"CSAFPID-194649",
"CSAFPID-194741",
"CSAFPID-194913",
"CSAFPID-195033",
"CSAFPID-195469",
"CSAFPID-195481",
"CSAFPID-195489",
"CSAFPID-195519",
"CSAFPID-195636",
"CSAFPID-195688",
"CSAFPID-195770",
"CSAFPID-195771",
"CSAFPID-195943",
"CSAFPID-196115",
"CSAFPID-196417",
"CSAFPID-196528",
"CSAFPID-197462",
"CSAFPID-197465",
"CSAFPID-197471",
"CSAFPID-197480",
"CSAFPID-197481",
"CSAFPID-197483",
"CSAFPID-197488",
"CSAFPID-198060",
"CSAFPID-198063",
"CSAFPID-198214",
"CSAFPID-198425",
"CSAFPID-198542",
"CSAFPID-200486",
"CSAFPID-200488",
"CSAFPID-200489",
"CSAFPID-200496",
"CSAFPID-200502",
"CSAFPID-201074",
"CSAFPID-201336",
"CSAFPID-201366",
"CSAFPID-201448",
"CSAFPID-201683",
"CSAFPID-202565",
"CSAFPID-202716",
"CSAFPID-204094",
"CSAFPID-204097",
"CSAFPID-204099",
"CSAFPID-204101",
"CSAFPID-204102",
"CSAFPID-204108",
"CSAFPID-204186",
"CSAFPID-204187",
"CSAFPID-204228",
"CSAFPID-204324",
"CSAFPID-204818",
"CSAFPID-204831",
"CSAFPID-205064",
"CSAFPID-205672",
"CSAFPID-205731",
"CSAFPID-209028",
"CSAFPID-209029",
"CSAFPID-209030",
"CSAFPID-209031",
"CSAFPID-209034",
"CSAFPID-209035",
"CSAFPID-209036",
"CSAFPID-209037",
"CSAFPID-209038",
"CSAFPID-209039",
"CSAFPID-209040",
"CSAFPID-209041",
"CSAFPID-209045",
"CSAFPID-209046",
"CSAFPID-209047",
"CSAFPID-209049",
"CSAFPID-209050",
"CSAFPID-209051",
"CSAFPID-209060",
"CSAFPID-209061",
"CSAFPID-209096",
"CSAFPID-209358",
"CSAFPID-209359",
"CSAFPID-209421",
"CSAFPID-209465",
"CSAFPID-209466",
"CSAFPID-209569",
"CSAFPID-209628",
"CSAFPID-209839",
"CSAFPID-209887",
"CSAFPID-210203",
"CSAFPID-210732",
"CSAFPID-210766",
"CSAFPID-210958",
"CSAFPID-210990",
"CSAFPID-211290",
"CSAFPID-211296",
"CSAFPID-211570",
"CSAFPID-211717",
"CSAFPID-211982",
"CSAFPID-212329",
"CSAFPID-212635",
"CSAFPID-213610",
"CSAFPID-213788",
"CSAFPID-214072",
"CSAFPID-214078",
"CSAFPID-214217",
"CSAFPID-214218",
"CSAFPID-214556",
"CSAFPID-214797",
"CSAFPID-214965",
"CSAFPID-214992",
"CSAFPID-216295",
"CSAFPID-217078",
"CSAFPID-217805",
"CSAFPID-218891",
"CSAFPID-218995",
"CSAFPID-220038",
"CSAFPID-220441",
"CSAFPID-220457",
"CSAFPID-220460",
"CSAFPID-220461",
"CSAFPID-220466",
"CSAFPID-220507",
"CSAFPID-220664",
"CSAFPID-220670",
"CSAFPID-220689",
"CSAFPID-221033",
"CSAFPID-221137",
"CSAFPID-222342",
"CSAFPID-222419",
"CSAFPID-222436",
"CSAFPID-222500",
"CSAFPID-222530",
"CSAFPID-222924",
"CSAFPID-223086",
"CSAFPID-223143",
"CSAFPID-224553",
"CSAFPID-224868",
"CSAFPID-225160",
"CSAFPID-225358",
"CSAFPID-225740",
"CSAFPID-226038",
"CSAFPID-226077",
"CSAFPID-227364",
"CSAFPID-227598",
"CSAFPID-227959",
"CSAFPID-228057",
"CSAFPID-228075",
"CSAFPID-228151",
"CSAFPID-230587",
"CSAFPID-230588",
"CSAFPID-230589",
"CSAFPID-230590",
"CSAFPID-230591",
"CSAFPID-230592",
"CSAFPID-230594",
"CSAFPID-230962",
"CSAFPID-230965",
"CSAFPID-230966",
"CSAFPID-230967",
"CSAFPID-230968",
"CSAFPID-230969",
"CSAFPID-230970",
"CSAFPID-230971",
"CSAFPID-230973",
"CSAFPID-230974",
"CSAFPID-230976",
"CSAFPID-230977",
"CSAFPID-230982",
"CSAFPID-230983",
"CSAFPID-230992",
"CSAFPID-231245",
"CSAFPID-231471",
"CSAFPID-232765",
"CSAFPID-232850",
"CSAFPID-234926",
"CSAFPID-238999",
"CSAFPID-239053",
"CSAFPID-240186",
"CSAFPID-241614",
"CSAFPID-241916",
"CSAFPID-243144",
"CSAFPID-247572",
"CSAFPID-250628",
"CSAFPID-262335",
"CSAFPID-262536",
"CSAFPID-277230",
"CSAFPID-277232",
"CSAFPID-277253",
"CSAFPID-279335",
"CSAFPID-279337",
"CSAFPID-280759",
"CSAFPID-282026",
"CSAFPID-283833",
"CSAFPID-284291",
"CSAFPID-284341",
"CSAFPID-284566",
"CSAFPID-284568",
"CSAFPID-284785",
"CSAFPID-286029",
"CSAFPID-286399",
"CSAFPID-286400",
"CSAFPID-286451",
"CSAFPID-286844",
"CSAFPID-286927",
"CSAFPID-286940",
"CSAFPID-289270",
"CSAFPID-289301",
"CSAFPID-289371",
"CSAFPID-290557",
"CSAFPID-290618",
"CSAFPID-35244",
"CSAFPID-59974",
"CSAFPID-60292",
"CSAFPID-60350",
"CSAFPID-60351",
"CSAFPID-60358",
"CSAFPID-60365",
"CSAFPID-60367",
"CSAFPID-60368",
"CSAFPID-60369",
"CSAFPID-60399",
"CSAFPID-62580",
"CSAFPID-62582",
"CSAFPID-62587",
"CSAFPID-62600",
"CSAFPID-62601",
"CSAFPID-62602",
"CSAFPID-63898",
"CSAFPID-63903",
"CSAFPID-63905",
"CSAFPID-63911",
"CSAFPID-63912",
"CSAFPID-63913",
"CSAFPID-63914",
"CSAFPID-63915",
"CSAFPID-63916",
"CSAFPID-63918",
"CSAFPID-63919",
"CSAFPID-63920",
"CSAFPID-63927",
"CSAFPID-63930",
"CSAFPID-63936",
"CSAFPID-63937",
"CSAFPID-69479",
"CSAFPID-69801",
"CSAFPID-78260",
"CSAFPID-95363",
"CSAFPID-112457",
"CSAFPID-112458",
"CSAFPID-188726",
"CSAFPID-196224",
"CSAFPID-196225",
"CSAFPID-196226",
"CSAFPID-196227",
"CSAFPID-196228",
"CSAFPID-196230",
"CSAFPID-196231",
"CSAFPID-196287",
"CSAFPID-196288",
"CSAFPID-197145",
"CSAFPID-206165",
"CSAFPID-206166",
"CSAFPID-206167",
"CSAFPID-206168",
"CSAFPID-206169",
"CSAFPID-206170",
"CSAFPID-206172",
"CSAFPID-206173",
"CSAFPID-206195",
"CSAFPID-206196",
"CSAFPID-206197",
"CSAFPID-206198",
"CSAFPID-206205",
"CSAFPID-206206",
"CSAFPID-206208",
"CSAFPID-206209",
"CSAFPID-206211",
"CSAFPID-210068",
"CSAFPID-210070",
"CSAFPID-210072",
"CSAFPID-210074",
"CSAFPID-210076",
"CSAFPID-210077",
"CSAFPID-212674",
"CSAFPID-213785",
"CSAFPID-213786",
"CSAFPID-213787",
"CSAFPID-213790",
"CSAFPID-213797",
"CSAFPID-213811",
"CSAFPID-213812",
"CSAFPID-217278",
"CSAFPID-217279",
"CSAFPID-217280",
"CSAFPID-217282",
"CSAFPID-217283",
"CSAFPID-220290",
"CSAFPID-220357",
"CSAFPID-220489",
"CSAFPID-220671",
"CSAFPID-221108",
"CSAFPID-221184",
"CSAFPID-221185",
"CSAFPID-222435",
"CSAFPID-222483",
"CSAFPID-222695",
"CSAFPID-224840",
"CSAFPID-225360",
"CSAFPID-226037",
"CSAFPID-226158",
"CSAFPID-226160",
"CSAFPID-226331",
"CSAFPID-227513",
"CSAFPID-227555",
"CSAFPID-227755",
"CSAFPID-227918",
"CSAFPID-227920",
"CSAFPID-228689",
"CSAFPID-229136",
"CSAFPID-231004",
"CSAFPID-231246",
"CSAFPID-231472",
"CSAFPID-232766",
"CSAFPID-232851",
"CSAFPID-239000",
"CSAFPID-239007",
"CSAFPID-240187",
"CSAFPID-241736",
"CSAFPID-250629",
"CSAFPID-251075",
"CSAFPID-252045",
"CSAFPID-252235",
"CSAFPID-252271",
"CSAFPID-252272",
"CSAFPID-252913",
"CSAFPID-254688",
"CSAFPID-257955",
"CSAFPID-257984",
"CSAFPID-258170",
"CSAFPID-258229",
"CSAFPID-258388",
"CSAFPID-258900",
"CSAFPID-260741",
"CSAFPID-260917",
"CSAFPID-261240",
"CSAFPID-261241",
"CSAFPID-261465",
"CSAFPID-262390",
"CSAFPID-262549",
"CSAFPID-262595",
"CSAFPID-263804",
"CSAFPID-264096",
"CSAFPID-265735",
"CSAFPID-265841",
"CSAFPID-266259",
"CSAFPID-267110",
"CSAFPID-267240",
"CSAFPID-267605",
"CSAFPID-268921",
"CSAFPID-270097",
"CSAFPID-271938",
"CSAFPID-272047",
"CSAFPID-272932",
"CSAFPID-273445",
"CSAFPID-273509",
"CSAFPID-273649",
"CSAFPID-274818",
"CSAFPID-274832",
"CSAFPID-275538",
"CSAFPID-276837",
"CSAFPID-277148",
"CSAFPID-277255",
"CSAFPID-277256",
"CSAFPID-277321",
"CSAFPID-277338",
"CSAFPID-277348",
"CSAFPID-277945",
"CSAFPID-280651",
"CSAFPID-280652",
"CSAFPID-280801",
"CSAFPID-280938",
"CSAFPID-281320",
"CSAFPID-282116",
"CSAFPID-283831",
"CSAFPID-283835",
"CSAFPID-286477",
"CSAFPID-290562",
"CSAFPID-290669",
"CSAFPID-292698",
"CSAFPID-306611"
]
}
],
"title": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability"
}
]
}
CNVD-2019-14439
Vulnerability from cnvd - Published: 2019-05-16厂商已发布漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos
| Name | ['Cisco IOS XE', 'Cisco IOS'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "107612"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2019-1746"
}
},
"description": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nCisco IOS\u548cIOS XE\u4e2d\u7684Cluster Management Protocol (CMP)\u5904\u7406\u4ee3\u7801\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6076\u610f\u7684CMP\u7ba1\u7406\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u4ea4\u6362\u673a\u5d29\u6e83\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"discovererName": "Cisco",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-14439",
"openTime": "2019-05-16",
"patchDescription": "Cisco IOS\u548cIOS XE\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e3a\u5176\u7f51\u7edc\u8bbe\u5907\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco IOS\u548cIOS XE\u4e2d\u7684Cluster Management Protocol (CMP)\u5904\u7406\u4ee3\u7801\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u6076\u610f\u7684CMP\u7ba1\u7406\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u4ea4\u6362\u673a\u5d29\u6e83\uff0c\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco IOS\u548cIOS XE CMP\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco IOS XE",
"Cisco IOS"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-1746",
"serverity": "\u4e2d",
"submitTime": "2019-03-28",
"title": "Cisco IOS\u548cIOS XE CMP\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
FKIE_CVE-2019-1746
Vulnerability from fkie_nvd - Published: 2019-03-28 00:29 - Updated: 2024-11-21 04:376.5 (Medium) - CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://www.securityfocus.com/bid/107612 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/107612 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios | 12.1\(6\)ea1 | |
| cisco | ios | 12.1\(6\)ea1a | |
| cisco | ios | 12.1\(6\)ea2 | |
| cisco | ios | 12.1\(6\)ea2a | |
| cisco | ios | 12.1\(6\)ea2b | |
| cisco | ios | 12.1\(6\)ea2c | |
| cisco | ios | 12.1\(8\)ea1b | |
| cisco | ios | 12.1\(8\)ea1c | |
| cisco | ios | 12.1\(9\)ea1 | |
| cisco | ios | 12.1\(9\)ea1a | |
| cisco | ios | 12.1\(9\)ea1c | |
| cisco | ios | 12.1\(9\)ea1d | |
| cisco | ios | 12.1\(9\)ex | |
| cisco | ios | 12.1\(11\)ea1 | |
| cisco | ios | 12.1\(11\)ea1a | |
| cisco | ios | 12.1\(12c\)ea1 | |
| cisco | ios | 12.1\(12c\)ea1a | |
| cisco | ios | 12.1\(13\)ea1 | |
| cisco | ios | 12.1\(13\)ea1a | |
| cisco | ios | 12.1\(13\)ea1b | |
| cisco | ios | 12.1\(13\)ea1c | |
| cisco | ios | 12.1\(14\)az | |
| cisco | ios | 12.1\(14\)ea1 | |
| cisco | ios | 12.1\(14\)ea1a | |
| cisco | ios | 12.1\(14\)ea1b | |
| cisco | ios | 12.1\(19\)ea1 | |
| cisco | ios | 12.1\(19\)ea1a | |
| cisco | ios | 12.1\(19\)ea1b | |
| cisco | ios | 12.1\(19\)ea1c | |
| cisco | ios | 12.1\(19\)ea1d | |
| cisco | ios | 12.1\(20\)ea1 | |
| cisco | ios | 12.1\(20\)ea1a | |
| cisco | ios | 12.1\(20\)ea1b | |
| cisco | ios | 12.1\(20\)ea2 | |
| cisco | ios | 12.1\(22\)ea1 | |
| cisco | ios | 12.1\(22\)ea1a | |
| cisco | ios | 12.1\(22\)ea1b | |
| cisco | ios | 12.1\(22\)ea2 | |
| cisco | ios | 12.1\(22\)ea3 | |
| cisco | ios | 12.1\(22\)ea4 | |
| cisco | ios | 12.1\(22\)ea4a | |
| cisco | ios | 12.1\(22\)ea5 | |
| cisco | ios | 12.1\(22\)ea5a | |
| cisco | ios | 12.1\(22\)ea6 | |
| cisco | ios | 12.1\(22\)ea6a | |
| cisco | ios | 12.1\(22\)ea7 | |
| cisco | ios | 12.1\(22\)ea8 | |
| cisco | ios | 12.1\(22\)ea8a | |
| cisco | ios | 12.1\(22\)ea9 | |
| cisco | ios | 12.1\(22\)ea10 | |
| cisco | ios | 12.1\(22\)ea10a | |
| cisco | ios | 12.1\(22\)ea10b | |
| cisco | ios | 12.1\(22\)ea11 | |
| cisco | ios | 12.1\(22\)ea12 | |
| cisco | ios | 12.1\(22\)ea13 | |
| cisco | ios | 12.1\(22\)ea14 | |
| cisco | ios | 12.2\(6\)i1 | |
| cisco | ios | 12.2\(14\)sz | |
| cisco | ios | 12.2\(14\)sz1 | |
| cisco | ios | 12.2\(14\)sz2 | |
| cisco | ios | 12.2\(14\)sz3 | |
| cisco | ios | 12.2\(14\)sz4 | |
| cisco | ios | 12.2\(14\)sz5 | |
| cisco | ios | 12.2\(14\)sz6 | |
| cisco | ios | 12.2\(18\)s | |
| cisco | ios | 12.2\(18\)s1 | |
| cisco | ios | 12.2\(18\)s2 | |
| cisco | ios | 12.2\(18\)s3 | |
| cisco | ios | 12.2\(18\)s4 | |
| cisco | ios | 12.2\(18\)se | |
| cisco | ios | 12.2\(18\)se1 | |
| cisco | ios | 12.2\(20\)eu | |
| cisco | ios | 12.2\(20\)eu1 | |
| cisco | ios | 12.2\(20\)eu2 | |
| cisco | ios | 12.2\(20\)ewa | |
| cisco | ios | 12.2\(20\)ewa1 | |
| cisco | ios | 12.2\(20\)ewa2 | |
| cisco | ios | 12.2\(20\)ewa3 | |
| cisco | ios | 12.2\(20\)ewa4 | |
| cisco | ios | 12.2\(20\)ex | |
| cisco | ios | 12.2\(20\)s | |
| cisco | ios | 12.2\(20\)s1 | |
| cisco | ios | 12.2\(20\)s2 | |
| cisco | ios | 12.2\(20\)s2a | |
| cisco | ios | 12.2\(20\)s3 | |
| cisco | ios | 12.2\(20\)s4 | |
| cisco | ios | 12.2\(20\)s4a | |
| cisco | ios | 12.2\(20\)s5 | |
| cisco | ios | 12.2\(20\)s6 | |
| cisco | ios | 12.2\(20\)se | |
| cisco | ios | 12.2\(20\)se1 | |
| cisco | ios | 12.2\(20\)se2 | |
| cisco | ios | 12.2\(20\)se3 | |
| cisco | ios | 12.2\(20\)se4 | |
| cisco | ios | 12.2\(22\)s | |
| cisco | ios | 12.2\(25\)ew | |
| cisco | ios | 12.2\(25\)ewa | |
| cisco | ios | 12.2\(25\)ewa1 | |
| cisco | ios | 12.2\(25\)ewa2 | |
| cisco | ios | 12.2\(25\)ewa3 | |
| cisco | ios | 12.2\(25\)ewa4 | |
| cisco | ios | 12.2\(25\)ewa5 | |
| cisco | ios | 12.2\(25\)ewa6 | |
| cisco | ios | 12.2\(25\)ewa7 | |
| cisco | ios | 12.2\(25\)ewa8 | |
| cisco | ios | 12.2\(25\)ewa9 | |
| cisco | ios | 12.2\(25\)ewa10 | |
| cisco | ios | 12.2\(25\)ewa11 | |
| cisco | ios | 12.2\(25\)ewa12 | |
| cisco | ios | 12.2\(25\)ewa13 | |
| cisco | ios | 12.2\(25\)ewa14 | |
| cisco | ios | 12.2\(25\)ey | |
| cisco | ios | 12.2\(25\)ey1 | |
| cisco | ios | 12.2\(25\)ey2 | |
| cisco | ios | 12.2\(25\)ey3 | |
| cisco | ios | 12.2\(25\)ey4 | |
| cisco | ios | 12.2\(25\)ez | |
| cisco | ios | 12.2\(25\)ez1 | |
| cisco | ios | 12.2\(25\)fx | |
| cisco | ios | 12.2\(25\)fy | |
| cisco | ios | 12.2\(25\)fz | |
| cisco | ios | 12.2\(25\)s | |
| cisco | ios | 12.2\(25\)s1 | |
| cisco | ios | 12.2\(25\)s2 | |
| cisco | ios | 12.2\(25\)se | |
| cisco | ios | 12.2\(25\)se2 | |
| cisco | ios | 12.2\(25\)se3 | |
| cisco | ios | 12.2\(25\)sea | |
| cisco | ios | 12.2\(25\)seb | |
| cisco | ios | 12.2\(25\)seb1 | |
| cisco | ios | 12.2\(25\)seb2 | |
| cisco | ios | 12.2\(25\)seb3 | |
| cisco | ios | 12.2\(25\)seb4 | |
| cisco | ios | 12.2\(25\)sec | |
| cisco | ios | 12.2\(25\)sec1 | |
| cisco | ios | 12.2\(25\)sec2 | |
| cisco | ios | 12.2\(25\)sed | |
| cisco | ios | 12.2\(25\)sed1 | |
| cisco | ios | 12.2\(25\)see | |
| cisco | ios | 12.2\(25\)see1 | |
| cisco | ios | 12.2\(25\)see2 | |
| cisco | ios | 12.2\(25\)see3 | |
| cisco | ios | 12.2\(25\)see4 | |
| cisco | ios | 12.2\(25\)sef | |
| cisco | ios | 12.2\(25\)sef1 | |
| cisco | ios | 12.2\(25\)sef2 | |
| cisco | ios | 12.2\(25\)sef3 | |
| cisco | ios | 12.2\(25\)seg | |
| cisco | ios | 12.2\(25\)seg1 | |
| cisco | ios | 12.2\(25\)seg3 | |
| cisco | ios | 12.2\(25\)sg | |
| cisco | ios | 12.2\(25\)sg1 | |
| cisco | ios | 12.2\(25\)sg2 | |
| cisco | ios | 12.2\(25\)sg3 | |
| cisco | ios | 12.2\(25\)sg4 | |
| cisco | ios | 12.2\(27\)sbk9 | |
| cisco | ios | 12.2\(31\)sg | |
| cisco | ios | 12.2\(31\)sg1 | |
| cisco | ios | 12.2\(31\)sg2 | |
| cisco | ios | 12.2\(31\)sg3 | |
| cisco | ios | 12.2\(31\)sga | |
| cisco | ios | 12.2\(31\)sga1 | |
| cisco | ios | 12.2\(31\)sga2 | |
| cisco | ios | 12.2\(31\)sga3 | |
| cisco | ios | 12.2\(31\)sga4 | |
| cisco | ios | 12.2\(31\)sga5 | |
| cisco | ios | 12.2\(31\)sga6 | |
| cisco | ios | 12.2\(31\)sga7 | |
| cisco | ios | 12.2\(31\)sga8 | |
| cisco | ios | 12.2\(31\)sga9 | |
| cisco | ios | 12.2\(31\)sga10 | |
| cisco | ios | 12.2\(31\)sga11 | |
| cisco | ios | 12.2\(35\)se | |
| cisco | ios | 12.2\(35\)se1 | |
| cisco | ios | 12.2\(35\)se2 | |
| cisco | ios | 12.2\(35\)se3 | |
| cisco | ios | 12.2\(35\)se5 | |
| cisco | ios | 12.2\(37\)ey | |
| cisco | ios | 12.2\(37\)se | |
| cisco | ios | 12.2\(37\)se1 | |
| cisco | ios | 12.2\(37\)sg | |
| cisco | ios | 12.2\(37\)sg1 | |
| cisco | ios | 12.2\(40\)ex | |
| cisco | ios | 12.2\(40\)ex1 | |
| cisco | ios | 12.2\(40\)ex2 | |
| cisco | ios | 12.2\(40\)ex3 | |
| cisco | ios | 12.2\(40\)se | |
| cisco | ios | 12.2\(40\)se1 | |
| cisco | ios | 12.2\(40\)se2 | |
| cisco | ios | 12.2\(40\)sg | |
| cisco | ios | 12.2\(40\)xo | |
| cisco | ios | 12.2\(44\)ex | |
| cisco | ios | 12.2\(44\)ex1 | |
| cisco | ios | 12.2\(44\)se | |
| cisco | ios | 12.2\(44\)se1 | |
| cisco | ios | 12.2\(44\)se2 | |
| cisco | ios | 12.2\(44\)se3 | |
| cisco | ios | 12.2\(44\)se4 | |
| cisco | ios | 12.2\(44\)se5 | |
| cisco | ios | 12.2\(44\)se6 | |
| cisco | ios | 12.2\(44\)sg | |
| cisco | ios | 12.2\(44\)sg1 | |
| cisco | ios | 12.2\(44\)sq | |
| cisco | ios | 12.2\(44\)sq2 | |
| cisco | ios | 12.2\(46\)ex | |
| cisco | ios | 12.2\(46\)ey | |
| cisco | ios | 12.2\(46\)se | |
| cisco | ios | 12.2\(46\)se1 | |
| cisco | ios | 12.2\(46\)se2 | |
| cisco | ios | 12.2\(46\)sg | |
| cisco | ios | 12.2\(46\)sg1 | |
| cisco | ios | 12.2\(50\)se | |
| cisco | ios | 12.2\(50\)se1 | |
| cisco | ios | 12.2\(50\)se2 | |
| cisco | ios | 12.2\(50\)se3 | |
| cisco | ios | 12.2\(50\)se4 | |
| cisco | ios | 12.2\(50\)se5 | |
| cisco | ios | 12.2\(50\)sg | |
| cisco | ios | 12.2\(50\)sg1 | |
| cisco | ios | 12.2\(50\)sg2 | |
| cisco | ios | 12.2\(50\)sg3 | |
| cisco | ios | 12.2\(50\)sg4 | |
| cisco | ios | 12.2\(50\)sg5 | |
| cisco | ios | 12.2\(50\)sg6 | |
| cisco | ios | 12.2\(50\)sg7 | |
| cisco | ios | 12.2\(50\)sg8 | |
| cisco | ios | 12.2\(50\)sq | |
| cisco | ios | 12.2\(50\)sq1 | |
| cisco | ios | 12.2\(50\)sq2 | |
| cisco | ios | 12.2\(50\)sq3 | |
| cisco | ios | 12.2\(50\)sq4 | |
| cisco | ios | 12.2\(50\)sq5 | |
| cisco | ios | 12.2\(50\)sq6 | |
| cisco | ios | 12.2\(50\)sq7 | |
| cisco | ios | 12.2\(52\)ex | |
| cisco | ios | 12.2\(52\)ex1 | |
| cisco | ios | 12.2\(52\)se | |
| cisco | ios | 12.2\(52\)se1 | |
| cisco | ios | 12.2\(52\)sg | |
| cisco | ios | 12.2\(52\)xo | |
| cisco | ios | 12.2\(53\)ey | |
| cisco | ios | 12.2\(53\)ez | |
| cisco | ios | 12.2\(53\)se | |
| cisco | ios | 12.2\(53\)se1 | |
| cisco | ios | 12.2\(53\)se2 | |
| cisco | ios | 12.2\(53\)sg1 | |
| cisco | ios | 12.2\(53\)sg2 | |
| cisco | ios | 12.2\(53\)sg3 | |
| cisco | ios | 12.2\(53\)sg4 | |
| cisco | ios | 12.2\(53\)sg5 | |
| cisco | ios | 12.2\(53\)sg6 | |
| cisco | ios | 12.2\(53\)sg7 | |
| cisco | ios | 12.2\(53\)sg8 | |
| cisco | ios | 12.2\(53\)sg9 | |
| cisco | ios | 12.2\(53\)sg10 | |
| cisco | ios | 12.2\(53\)sg11 | |
| cisco | ios | 12.2\(54\)se | |
| cisco | ios | 12.2\(54\)sg | |
| cisco | ios | 12.2\(54\)sg1 | |
| cisco | ios | 12.2\(54\)wo | |
| cisco | ios | 12.2\(54\)xo | |
| cisco | ios | 12.2\(55\)ex | |
| cisco | ios | 12.2\(55\)ex1 | |
| cisco | ios | 12.2\(55\)ex2 | |
| cisco | ios | 12.2\(55\)ex3 | |
| cisco | ios | 12.2\(55\)ey | |
| cisco | ios | 12.2\(55\)ez | |
| cisco | ios | 12.2\(55\)se | |
| cisco | ios | 12.2\(55\)se1 | |
| cisco | ios | 12.2\(55\)se2 | |
| cisco | ios | 12.2\(55\)se3 | |
| cisco | ios | 12.2\(55\)se4 | |
| cisco | ios | 12.2\(55\)se5 | |
| cisco | ios | 12.2\(55\)se6 | |
| cisco | ios | 12.2\(55\)se7 | |
| cisco | ios | 12.2\(55\)se8 | |
| cisco | ios | 12.2\(55\)se9 | |
| cisco | ios | 12.2\(55\)se10 | |
| cisco | ios | 12.2\(55\)se11 | |
| cisco | ios | 12.2\(55\)se12 | |
| cisco | ios | 12.2\(55\)se13 | |
| cisco | ios | 12.2\(58\)ex | |
| cisco | ios | 12.2\(58\)ez | |
| cisco | ios | 12.2\(58\)se | |
| cisco | ios | 12.2\(58\)se1 | |
| cisco | ios | 12.2\(58\)se2 | |
| cisco | ios | 12.2\(60\)ez4 | |
| cisco | ios | 12.2\(60\)ez5 | |
| cisco | ios | 12.4\(25e\)jaz1 | |
| cisco | ios | 15.0\(1\)ey | |
| cisco | ios | 15.0\(1\)ey1 | |
| cisco | ios | 15.0\(1\)ey2 | |
| cisco | ios | 15.0\(1\)se | |
| cisco | ios | 15.0\(1\)se1 | |
| cisco | ios | 15.0\(1\)se2 | |
| cisco | ios | 15.0\(1\)se3 | |
| cisco | ios | 15.0\(1\)xo | |
| cisco | ios | 15.0\(1\)xo1 | |
| cisco | ios | 15.0\(2\)ej | |
| cisco | ios | 15.0\(2\)ej1 | |
| cisco | ios | 15.0\(2\)ex | |
| cisco | ios | 15.0\(2\)ex1 | |
| cisco | ios | 15.0\(2\)ex2 | |
| cisco | ios | 15.0\(2\)ex3 | |
| cisco | ios | 15.0\(2\)ex4 | |
| cisco | ios | 15.0\(2\)ex5 | |
| cisco | ios | 15.0\(2\)ex6 | |
| cisco | ios | 15.0\(2\)ex7 | |
| cisco | ios | 15.0\(2\)ex8 | |
| cisco | ios | 15.0\(2\)ex10 | |
| cisco | ios | 15.0\(2\)ex11 | |
| cisco | ios | 15.0\(2\)ex12 | |
| cisco | ios | 15.0\(2\)ex13 | |
| cisco | ios | 15.0\(2\)ey | |
| cisco | ios | 15.0\(2\)ey1 | |
| cisco | ios | 15.0\(2\)ey2 | |
| cisco | ios | 15.0\(2\)ey3 | |
| cisco | ios | 15.0\(2\)ez | |
| cisco | ios | 15.0\(2\)se | |
| cisco | ios | 15.0\(2\)se1 | |
| cisco | ios | 15.0\(2\)se2 | |
| cisco | ios | 15.0\(2\)se3 | |
| cisco | ios | 15.0\(2\)se4 | |
| cisco | ios | 15.0\(2\)se5 | |
| cisco | ios | 15.0\(2\)se6 | |
| cisco | ios | 15.0\(2\)se7 | |
| cisco | ios | 15.0\(2\)se8 | |
| cisco | ios | 15.0\(2\)se9 | |
| cisco | ios | 15.0\(2\)se10 | |
| cisco | ios | 15.0\(2\)se10a | |
| cisco | ios | 15.0\(2\)se11 | |
| cisco | ios | 15.0\(2\)se12 | |
| cisco | ios | 15.0\(2\)se13 | |
| cisco | ios | 15.0\(2\)sg | |
| cisco | ios | 15.0\(2\)sg1 | |
| cisco | ios | 15.0\(2\)sg2 | |
| cisco | ios | 15.0\(2\)sg3 | |
| cisco | ios | 15.0\(2\)sg4 | |
| cisco | ios | 15.0\(2\)sg5 | |
| cisco | ios | 15.0\(2\)sg6 | |
| cisco | ios | 15.0\(2\)sg7 | |
| cisco | ios | 15.0\(2\)sg8 | |
| cisco | ios | 15.0\(2\)sg9 | |
| cisco | ios | 15.0\(2\)sg10 | |
| cisco | ios | 15.0\(2\)sg11 | |
| cisco | ios | 15.0\(2\)sqd | |
| cisco | ios | 15.0\(2\)sqd1 | |
| cisco | ios | 15.0\(2\)sqd2 | |
| cisco | ios | 15.0\(2\)sqd3 | |
| cisco | ios | 15.0\(2\)sqd4 | |
| cisco | ios | 15.0\(2\)sqd5 | |
| cisco | ios | 15.0\(2\)sqd6 | |
| cisco | ios | 15.0\(2\)sqd7 | |
| cisco | ios | 15.0\(2\)sqd8 | |
| cisco | ios | 15.0\(2\)xo | |
| cisco | ios | 15.0\(2a\)ex5 | |
| cisco | ios | 15.0\(2a\)se9 | |
| cisco | ios | 15.1\(1\)sg | |
| cisco | ios | 15.1\(1\)sg1 | |
| cisco | ios | 15.1\(1\)sg2 | |
| cisco | ios | 15.1\(2\)sg | |
| cisco | ios | 15.1\(2\)sg1 | |
| cisco | ios | 15.1\(2\)sg2 | |
| cisco | ios | 15.1\(2\)sg3 | |
| cisco | ios | 15.1\(2\)sg4 | |
| cisco | ios | 15.1\(2\)sg5 | |
| cisco | ios | 15.1\(2\)sg6 | |
| cisco | ios | 15.1\(2\)sg7 | |
| cisco | ios | 15.1\(2\)sg8 | |
| cisco | ios | 15.1\(2\)sg8a | |
| cisco | ios | 15.1\(2\)sy15 | |
| cisco | ios | 15.1\(3\)mra3 | |
| cisco | ios | 15.1\(3\)svk4b | |
| cisco | ios | 15.1\(3\)svk4c | |
| cisco | ios | 15.1\(3\)svo2 | |
| cisco | ios | 15.1\(3\)svp1 | |
| cisco | ios | 15.2\(1\)e | |
| cisco | ios | 15.2\(1\)e1 | |
| cisco | ios | 15.2\(1\)e2 | |
| cisco | ios | 15.2\(1\)e3 | |
| cisco | ios | 15.2\(1\)ey | |
| cisco | ios | 15.2\(2\)e | |
| cisco | ios | 15.2\(2\)e1 | |
| cisco | ios | 15.2\(2\)e2 | |
| cisco | ios | 15.2\(2\)e3 | |
| cisco | ios | 15.2\(2\)e4 | |
| cisco | ios | 15.2\(2\)e5 | |
| cisco | ios | 15.2\(2\)e5a | |
| cisco | ios | 15.2\(2\)e5b | |
| cisco | ios | 15.2\(2\)e6 | |
| cisco | ios | 15.2\(2\)e7 | |
| cisco | ios | 15.2\(2\)e7b | |
| cisco | ios | 15.2\(2\)e8 | |
| cisco | ios | 15.2\(2\)e9 | |
| cisco | ios | 15.2\(2\)e9a | |
| cisco | ios | 15.2\(2\)e10 | |
| cisco | ios | 15.2\(2\)ea | |
| cisco | ios | 15.2\(2\)ea1 | |
| cisco | ios | 15.2\(2\)ea2 | |
| cisco | ios | 15.2\(2\)ea3 | |
| cisco | ios | 15.2\(2\)eb | |
| cisco | ios | 15.2\(2\)eb1 | |
| cisco | ios | 15.2\(2\)eb2 | |
| cisco | ios | 15.2\(2\)sc1 | |
| cisco | ios | 15.2\(2\)sc3 | |
| cisco | ios | 15.2\(2\)sc4 | |
| cisco | ios | 15.2\(2a\)e1 | |
| cisco | ios | 15.2\(2a\)e2 | |
| cisco | ios | 15.2\(2b\)e | |
| cisco | ios | 15.2\(3\)e | |
| cisco | ios | 15.2\(3\)e1 | |
| cisco | ios | 15.2\(3\)e2 | |
| cisco | ios | 15.2\(3\)e3 | |
| cisco | ios | 15.2\(3\)e4 | |
| cisco | ios | 15.2\(3\)e5 | |
| cisco | ios | 15.2\(3\)ea | |
| cisco | ios | 15.2\(3\)ea1 | |
| cisco | ios | 15.2\(3a\)e | |
| cisco | ios | 15.2\(3m\)e2 | |
| cisco | ios | 15.2\(3m\)e7 | |
| cisco | ios | 15.2\(3m\)e8 | |
| cisco | ios | 15.2\(4\)e | |
| cisco | ios | 15.2\(4\)e1 | |
| cisco | ios | 15.2\(4\)e2 | |
| cisco | ios | 15.2\(4\)e3 | |
| cisco | ios | 15.2\(4\)e4 | |
| cisco | ios | 15.2\(4\)e5 | |
| cisco | ios | 15.2\(4\)e5a | |
| cisco | ios | 15.2\(4\)e6 | |
| cisco | ios | 15.2\(4\)e7 | |
| cisco | ios | 15.2\(4\)ea | |
| cisco | ios | 15.2\(4\)ea1 | |
| cisco | ios | 15.2\(4\)ea2 | |
| cisco | ios | 15.2\(4\)ea3 | |
| cisco | ios | 15.2\(4\)ea4 | |
| cisco | ios | 15.2\(4\)ea5 | |
| cisco | ios | 15.2\(4\)ea6 | |
| cisco | ios | 15.2\(4\)ea7 | |
| cisco | ios | 15.2\(4\)ea8 | |
| cisco | ios | 15.2\(4\)ea9 | |
| cisco | ios | 15.2\(4\)ec1 | |
| cisco | ios | 15.2\(4\)ec2 | |
| cisco | ios | 15.2\(4\)jaz1 | |
| cisco | ios | 15.2\(4\)jn1 | |
| cisco | ios | 15.2\(4a\)ea5 | |
| cisco | ios | 15.2\(4m\)e1 | |
| cisco | ios | 15.2\(4m\)e2 | |
| cisco | ios | 15.2\(4m\)e3 | |
| cisco | ios | 15.2\(4n\)e2 | |
| cisco | ios | 15.2\(4o\)e2 | |
| cisco | ios | 15.2\(4o\)e3 | |
| cisco | ios | 15.2\(4p\)e1 | |
| cisco | ios | 15.2\(4q\)e1 | |
| cisco | ios | 15.2\(4s\)e1 | |
| cisco | ios | 15.2\(4s\)e2 | |
| cisco | ios | 15.2\(5\)e | |
| cisco | ios | 15.2\(5\)e1 | |
| cisco | ios | 15.2\(5\)e2 | |
| cisco | ios | 15.2\(5\)e2b | |
| cisco | ios | 15.2\(5\)e2c | |
| cisco | ios | 15.2\(5\)ea | |
| cisco | ios | 15.2\(5\)ex | |
| cisco | ios | 15.2\(5a\)e | |
| cisco | ios | 15.2\(5a\)e1 | |
| cisco | ios | 15.2\(5b\)e | |
| cisco | ios | 15.2\(5c\)e | |
| cisco | ios | 15.2\(6\)e | |
| cisco | ios | 15.2\(6\)e0a | |
| cisco | ios | 15.2\(6\)e0c | |
| cisco | ios | 15.2\(6\)e1 | |
| cisco | ios | 15.2\(6\)e1a | |
| cisco | ios | 15.2\(6\)e1s | |
| cisco | ios | 15.5\(1\)sy4 | |
| cisco | ios | 15.5\(3\)s10 | |
| cisco | ios_xe | 3.2.0sg | |
| cisco | ios_xe | 3.2.1sg | |
| cisco | ios_xe | 3.2.2sg | |
| cisco | ios_xe | 3.2.3sg | |
| cisco | ios_xe | 3.2.4sg | |
| cisco | ios_xe | 3.2.5sg | |
| cisco | ios_xe | 3.2.6sg | |
| cisco | ios_xe | 3.2.7sg | |
| cisco | ios_xe | 3.2.8sg | |
| cisco | ios_xe | 3.2.9sg | |
| cisco | ios_xe | 3.2.10sg | |
| cisco | ios_xe | 3.2.11sg | |
| cisco | ios_xe | 3.3.0sg | |
| cisco | ios_xe | 3.3.0sq | |
| cisco | ios_xe | 3.3.0xo | |
| cisco | ios_xe | 3.3.1sg | |
| cisco | ios_xe | 3.3.1sq | |
| cisco | ios_xe | 3.3.1xo | |
| cisco | ios_xe | 3.3.2sg | |
| cisco | ios_xe | 3.3.2xo | |
| cisco | ios_xe | 3.4.0sg | |
| cisco | ios_xe | 3.4.0sq | |
| cisco | ios_xe | 3.4.1sg | |
| cisco | ios_xe | 3.4.1sq | |
| cisco | ios_xe | 3.4.2sg | |
| cisco | ios_xe | 3.4.3sg | |
| cisco | ios_xe | 3.4.4sg | |
| cisco | ios_xe | 3.4.5sg | |
| cisco | ios_xe | 3.4.6sg | |
| cisco | ios_xe | 3.4.7sg | |
| cisco | ios_xe | 3.4.8sg | |
| cisco | ios_xe | 3.5.0e | |
| cisco | ios_xe | 3.5.0sq | |
| cisco | ios_xe | 3.5.1e | |
| cisco | ios_xe | 3.5.1sq | |
| cisco | ios_xe | 3.5.2e | |
| cisco | ios_xe | 3.5.2sq | |
| cisco | ios_xe | 3.5.3e | |
| cisco | ios_xe | 3.5.3sq | |
| cisco | ios_xe | 3.5.4sq | |
| cisco | ios_xe | 3.5.5sq | |
| cisco | ios_xe | 3.5.6sq | |
| cisco | ios_xe | 3.5.7sq | |
| cisco | ios_xe | 3.5.8sq | |
| cisco | ios_xe | 3.6.0ae | |
| cisco | ios_xe | 3.6.0be | |
| cisco | ios_xe | 3.6.0e | |
| cisco | ios_xe | 3.6.1e | |
| cisco | ios_xe | 3.6.2ae | |
| cisco | ios_xe | 3.6.2e | |
| cisco | ios_xe | 3.6.3e | |
| cisco | ios_xe | 3.6.4e | |
| cisco | ios_xe | 3.6.5ae | |
| cisco | ios_xe | 3.6.5be | |
| cisco | ios_xe | 3.6.5e | |
| cisco | ios_xe | 3.6.6e | |
| cisco | ios_xe | 3.6.7ae | |
| cisco | ios_xe | 3.6.7be | |
| cisco | ios_xe | 3.6.7e | |
| cisco | ios_xe | 3.6.8e | |
| cisco | ios_xe | 3.6.9e | |
| cisco | ios_xe | 3.6.10e | |
| cisco | ios_xe | 3.7.0e | |
| cisco | ios_xe | 3.7.1e | |
| cisco | ios_xe | 3.7.2e | |
| cisco | ios_xe | 3.7.3e | |
| cisco | ios_xe | 3.7.4e | |
| cisco | ios_xe | 3.7.5e | |
| cisco | ios_xe | 3.8.0e | |
| cisco | ios_xe | 3.8.1e | |
| cisco | ios_xe | 3.8.2e | |
| cisco | ios_xe | 3.8.3e | |
| cisco | ios_xe | 3.8.4e | |
| cisco | ios_xe | 3.8.5ae | |
| cisco | ios_xe | 3.8.5e | |
| cisco | ios_xe | 3.8.6e | |
| cisco | ios_xe | 3.8.7e | |
| cisco | ios_xe | 3.9.0e | |
| cisco | ios_xe | 3.9.1e | |
| cisco | ios_xe | 3.9.2be | |
| cisco | ios_xe | 3.9.2e | |
| cisco | ios_xe | 3.10.0ce | |
| cisco | ios_xe | 3.10.0e | |
| cisco | ios_xe | 3.10.1ae | |
| cisco | ios_xe | 3.10.1e | |
| cisco | ios_xe | 3.10.1se | |
| cisco | ios_xe | 3.10.4s | |
| cisco | ios_xe | 3.12.0as | |
| cisco | ios_xe | 3.16.0bs | |
| cisco | ios_xe | 3.16.1s | |
| cisco | ios_xe | 3.16.10s | |
| cisco | ios_xe | 16.9.2h | |
| cisco | ios_xe | 16.12.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1168DD8-4DF7-4A2B-B080-D267BF815F40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "CCEF5EBB-226A-4E8F-A78D-9C1754F1FBC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "3316587B-3BCE-4F4A-8835-BDC12A7F12F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*",
"matchCriteriaId": "148C0902-66C4-4952-8319-40B8B145A901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*",
"matchCriteriaId": "1037D61F-BDE2-4956-9B27-25FD5408F1A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*",
"matchCriteriaId": "3CC077AA-909C-4344-B5A9-F71FBCC34B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "09C8E9BF-1C07-47FE-8F98-ED5960D302FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "F299684D-4676-4810-9BC3-1E28DF75E776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "EDCAFA73-B3F1-4527-8D7B-9B1B8263B50C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "E7201D2F-08A9-4E13-A294-5987D6B8775D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "94824D7A-6CCE-4ACC-A48B-D8AA7E6518C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1d:*:*:*:*:*:*:*",
"matchCriteriaId": "BF711F3A-63A1-470F-927C-7EE5176B3F36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "2465A016-415C-4EE9-9DEC-B71C3EDC0BC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "91195861-AC53-4468-B1BB-3144A6F3CB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "C0690F55-8755-40F4-A2C1-34335ACDEBAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "1C20A694-A84E-47F4-ACCA-BF6AC9C2BF8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "9944C77A-16EF-4908-930A-5B6C47BA897D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC069569-859C-41DB-93FE-57E8B3F2EBCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D1B7978F-4C1F-4F96-AF73-D5A1AC94F2FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "B39BBB71-C9BF-4566-8CCB-E613DE4AB06D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "17B63153-D51A-40AE-887B-CC9362263602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)az:*:*:*:*:*:*:*",
"matchCriteriaId": "67B8FCAC-27A3-4AA4-9A28-9FE526EE52E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "F1229A52-54B6-478F-A419-8D0340336BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "548C1020-E629-4F47-B8D2-AFBF77EC01DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "0688FE12-857D-4654-A778-CB836402DFC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "9CC3D006-6C20-43B9-9100-E427895AA3F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "D670129B-4D75-4E55-91B3-126BD8A53722",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "41768F22-7164-458E-8753-9B89BEDBAFBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1c:*:*:*:*:*:*:*",
"matchCriteriaId": "1CFDD737-B7D0-45A0-A6D6-3494FE8B777B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1d:*:*:*:*:*:*:*",
"matchCriteriaId": "0B0CE611-2E4D-454D-A247-18744A6E74E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "E4041EB0-F402-4C01-9337-212E3E461AF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "00388B56-F514-4A9F-95FE-1D8239BE1EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "F846F7FF-3ECE-4390-B0F2-50B5AFCD568F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "60A56097-E614-4FE2-AA09-3FC5EDDB0170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "26B2BF3F-8B92-41BC-946F-E0BBEC874257",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1a:*:*:*:*:*:*:*",
"matchCriteriaId": "A640A1B7-8A59-43A6-8675-7E95FACF7A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1b:*:*:*:*:*:*:*",
"matchCriteriaId": "76B7F08A-15D1-4194-B476-E528B6AF8198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "B46F396D-2A00-4DB3-9BDE-F2291E7782BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB440BC6-9FC8-4EFD-B05E-3F5A5A68F8EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF4A473-C851-4D2F-A22E-66A267A1BDB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD4687F-D78C-41C8-B2B8-D140813A8619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5:*:*:*:*:*:*:*",
"matchCriteriaId": "052CBE3E-F871-4AFC-8DBB-E6783A5D7B17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*",
"matchCriteriaId": "FB8C33CF-9FD2-4DC5-B69C-0C8E0C6A987F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*",
"matchCriteriaId": "1DFF09A6-DE59-4CBF-AF02-DF2862C05D1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6a:*:*:*:*:*:*:*",
"matchCriteriaId": "EA39450E-25BE-40CA-B419-D939C3D39832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea7:*:*:*:*:*:*:*",
"matchCriteriaId": "BA069FDD-BC7C-4C61-955F-F6F2179091ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8:*:*:*:*:*:*:*",
"matchCriteriaId": "0E74792B-0E3E-45E1-B86E-34233330EB23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8a:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE3D38F-5DD5-44C5-BB38-571F81B1BC82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea9:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA5D0F6-810F-40E0-8CAE-3B01C13CC857",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10:*:*:*:*:*:*:*",
"matchCriteriaId": "AB63B163-E48F-4D40-BD9F-518F24B27C01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10a:*:*:*:*:*:*:*",
"matchCriteriaId": "2EDFB452-63BA-44AD-9972-7CCF43D0F730",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10b:*:*:*:*:*:*:*",
"matchCriteriaId": "C72D3246-8E14-4A27-8A9B-2A1572849966",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea11:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB7FAC8-DD25-4C24-8AF1-F2B97ACB722C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea12:*:*:*:*:*:*:*",
"matchCriteriaId": "6761711F-AD6C-4844-9DCD-D2827FA0CDF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea13:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EC151E-DA5A-4695-A0EB-1C46C4F42FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea14:*:*:*:*:*:*:*",
"matchCriteriaId": "E457AF5B-637A-45B1-92FA-FC4096B8C912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEAFD220-48D7-46EE-8537-A69C5F8D0F2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D9BA55-F193-4BCA-ACC2-BBC892E9D7E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*",
"matchCriteriaId": "46974023-379B-4475-A59F-BD340043CFAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*",
"matchCriteriaId": "D71C21E1-BC04-4537-B64D-76492F282B76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz3:*:*:*:*:*:*:*",
"matchCriteriaId": "AF5C9424-067B-4604-A197-478D4BFE72F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz4:*:*:*:*:*:*:*",
"matchCriteriaId": "01CC34CD-3004-4EA3-9DD1-E9CA0E2336E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F228FB3-0015-456A-A49C-7B1284F641B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz6:*:*:*:*:*:*:*",
"matchCriteriaId": "A99F0772-C2C0-4356-896C-30ED62B7887E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0E67EE-AF42-4B53-B70A-45562CE164D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "B086B50F-03C8-4C5C-8D4D-37EA33C6D7C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "A5783901-D472-4DA3-B836-45704F3A6A20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "E39ABB80-0A2C-4B9F-BD62-59863BC2E451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A77C844-EAF8-497E-820F-EF2A87451319",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "9E319ADC-C636-4933-BD50-B613677AD4C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A5E052D7-9811-416F-A5AA-7DB2DC8B9F71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*",
"matchCriteriaId": "522425D5-1EFE-4F07-88FE-9EE4376D7171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*",
"matchCriteriaId": "145A21CA-3E35-4F73-9451-72EF1265ECA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*",
"matchCriteriaId": "47186E81-9EAD-4AD6-B888-F1F94C2EA128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*",
"matchCriteriaId": "E0F08381-956E-4E97-8226-6EDC66C281D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa1:*:*:*:*:*:*:*",
"matchCriteriaId": "A211E02C-BF5F-4587-8416-7A3F15E1920B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*",
"matchCriteriaId": "54CCAA24-53BB-4998-B986-358701A8A8F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*",
"matchCriteriaId": "7B2560DA-E091-4344-A7D0-9BEEB6998AC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa4:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A526C3-8B1F-44BB-BCEE-C3D8140CDF3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "D12B5F13-392E-4BE0-AFC0-BAB2E989A08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "10151339-0261-4F5D-9601-F048C0B70908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "2498113D-65B7-4144-AD1C-9FCB6534B7BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "84685E46-066D-42B4-8800-7D529AFC4FAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2a:*:*:*:*:*:*:*",
"matchCriteriaId": "C712A3E4-388E-4B58-B079-D67E4FA0D729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s3:*:*:*:*:*:*:*",
"matchCriteriaId": "C96B72B0-0F9E-44AC-870E-84DC484173E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*",
"matchCriteriaId": "99299759-15D1-4BEB-95D3-8D53C27674A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4a:*:*:*:*:*:*:*",
"matchCriteriaId": "A525BF43-E098-47DC-A32C-1A43B0F810D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s5:*:*:*:*:*:*:*",
"matchCriteriaId": "4C74A6F1-1A75-4D57-BDAA-68110CE604B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s6:*:*:*:*:*:*:*",
"matchCriteriaId": "D3290C7D-BB60-4095-BBFF-0484C1FEA071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA74FF4-FD5B-4EE9-969F-93EAC73D89B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D273495-EA24-4D04-BA90-710B22B4C003",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "C6742F7A-F4AC-49AB-954B-1595F7ECBD1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA90AE6-0BC8-442E-81F3-49E6C8D71F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "692B182F-4E9A-41C0-B254-0B0362A7B726",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "2B20E6F8-5E33-4F24-BB8B-8B61E39C01E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ew:*:*:*:*:*:*:*",
"matchCriteriaId": "77CF347D-F8D5-4D3D-AF23-E89A8C77AC46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*",
"matchCriteriaId": "878773DC-1360-4608-AB17-0081B33B11F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C2B085A-57AF-4A84-A354-166E61B5CAF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa2:*:*:*:*:*:*:*",
"matchCriteriaId": "C181E469-32B1-48AD-86F2-63AA790C5EEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*",
"matchCriteriaId": "A35979BE-B33F-4709-8B36-FB8297E321FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*",
"matchCriteriaId": "66130668-1107-42B3-BFAF-5640D3AC7595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0333A54-6370-4327-BF38-B873F3AC6615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa6:*:*:*:*:*:*:*",
"matchCriteriaId": "27CF87CF-3EC9-46C0-A98C-25F6055A3E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa7:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A93F44-8924-4787-AF35-4D6937B87086",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa8:*:*:*:*:*:*:*",
"matchCriteriaId": "ABADA146-ACE1-4CE0-8CD3-A3F25EEAA3E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa9:*:*:*:*:*:*:*",
"matchCriteriaId": "216D7B37-0925-4A83-980D-2145B00793BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa10:*:*:*:*:*:*:*",
"matchCriteriaId": "856842DE-6995-4CB5-A500-6D851BBF3DC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa11:*:*:*:*:*:*:*",
"matchCriteriaId": "862661A6-07AC-4FD3-B84C-977F66EDE29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa12:*:*:*:*:*:*:*",
"matchCriteriaId": "E30806B3-C98C-4D4B-AF11-0743EBB5B50B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa13:*:*:*:*:*:*:*",
"matchCriteriaId": "5CF3B7A3-F63F-472D-87D8-5EB767E0DE4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa14:*:*:*:*:*:*:*",
"matchCriteriaId": "18937501-09CF-48AC-A4FD-7ADE162BEF99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "C22E4042-3628-4A7E-BD93-1F3F282F9E14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "99EC3F33-4A8D-46CE-A5FC-913E03F6DEBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "A84C2CA8-1BA4-4899-9AFF-443FBC5003D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5E50CF-9084-459B-AFE5-5E0C63E17AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey4:*:*:*:*:*:*:*",
"matchCriteriaId": "A7F9FC27-5954-4374-BE61-E0E563A0DD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC9A8EF-FE37-42CB-A33F-4B6AF29A8827",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C9F1F1-EA5E-4921-A862-06304CE55C4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*",
"matchCriteriaId": "8508A0FF-D18D-430C-9A26-6B5BBFD7DF70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*",
"matchCriteriaId": "393A274B-BAA4-46F3-BC35-BE697B96A684",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fz:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD274CE-D174-471A-8423-02F33F63B574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*",
"matchCriteriaId": "DA143186-1E3B-4B5F-A5FD-AE90A2664AFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*",
"matchCriteriaId": "A4912CA3-2311-4D0F-8767-6815F43BE645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC91248E-CE91-4BAA-B52B-4AB77AAF77B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "36953AD6-CE36-480E-8679-DE5EEBCC5A26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "F26D07A7-41E4-4768-AE14-8E0604BAF0C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "5C1685F6-181F-41AA-8C6A-9038388C9963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sea:*:*:*:*:*:*:*",
"matchCriteriaId": "2F83F949-8F27-4FF7-A586-BDCDAA52B2EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*",
"matchCriteriaId": "F571ECA8-0AB1-4BC0-A6AE-06BAE1FD2375",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6F402D2-7DCE-4D22-BA71-ADB3622058D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E67F0D3-5722-49F3-80FA-8BA7292C085D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*",
"matchCriteriaId": "DA79BC8E-753F-4245-9885-A7A2733E4013",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*",
"matchCriteriaId": "6B820873-78DF-401B-8A99-EB1F115FED35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec:*:*:*:*:*:*:*",
"matchCriteriaId": "FA4A5F6D-CEEC-4BBF-9E4A-2D3B1D148371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*",
"matchCriteriaId": "86F88317-18BE-4484-A027-D69500937799",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*",
"matchCriteriaId": "DF6CCDEE-0D38-4C6B-82D8-CDE5067CC704",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*",
"matchCriteriaId": "0C342FEA-F2AC-4E0C-946E-1F7DB2994D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed1:*:*:*:*:*:*:*",
"matchCriteriaId": "82284ED7-CA08-447E-8EA7-FCD33D500BBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see:*:*:*:*:*:*:*",
"matchCriteriaId": "A0C112D4-820D-4BFD-AD59-4957E7D5FDF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1EAF282-5537-4836-BC54-BB7EA023BF35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see2:*:*:*:*:*:*:*",
"matchCriteriaId": "AF228683-2C83-477B-904E-54E1446928A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see3:*:*:*:*:*:*:*",
"matchCriteriaId": "74DDE240-25BC-40F0-B8F4-D2D94389C08F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see4:*:*:*:*:*:*:*",
"matchCriteriaId": "359E5A44-2CE6-463A-B9A4-C8BE21491D15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef:*:*:*:*:*:*:*",
"matchCriteriaId": "91100DDF-D654-479A-A773-2F31AF0F2516",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef1:*:*:*:*:*:*:*",
"matchCriteriaId": "BA38F4E3-5D3B-46B1-A6E8-8E0B02B0F52A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef2:*:*:*:*:*:*:*",
"matchCriteriaId": "845B3CC7-E49B-45B0-BE89-05135A97A39D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef3:*:*:*:*:*:*:*",
"matchCriteriaId": "E729850A-5D31-4332-AC37-C9442B7CB795",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg:*:*:*:*:*:*:*",
"matchCriteriaId": "2B69AF0E-CF4D-417F-9E5A-B8540FAB2EA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg1:*:*:*:*:*:*:*",
"matchCriteriaId": "768A5932-EEF1-4A39-A054-CA54DE4CAC94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg3:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E87B20-EF04-476D-829A-6F1433DD9854",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "3B142BAA-613A-40F8-9FD2-EB081867B3F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A632D64-8E99-496A-8DE7-4A2458D1D7E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "48263C15-99F4-424D-AE45-F3A17E291F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "0048C46A-BC09-4958-B4FB-EA69B25E4EAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "EA202662-DD3B-44BD-A6A0-F31056A85759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbk9:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE7AFD4-966B-4F15-9C57-C3B2D0CF3781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "B752C842-B50D-4BE9-93E6-CAD0560B679E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "CD4ECB0B-62BD-4429-BF35-9ECBDAC952E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "8A46E63C-D7D4-47ED-8C83-E7EBA5B17A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "616C69BF-7431-4D40-BD31-929D4CE8C7EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga:*:*:*:*:*:*:*",
"matchCriteriaId": "940F55CA-49E2-4353-9714-BA6A86D9DD66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga1:*:*:*:*:*:*:*",
"matchCriteriaId": "703C31A0-4E23-4D3E-9764-4A43A55AEDF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6B1A28-415B-4AA9-8CAF-2552B64D79C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE45B81D-7F63-41ED-A163-0103A702023C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga4:*:*:*:*:*:*:*",
"matchCriteriaId": "CEB656D5-1D86-4D3C-9A1B-92E6CE404E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga5:*:*:*:*:*:*:*",
"matchCriteriaId": "EE955775-49ED-4495-A70A-2C1315E95D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga6:*:*:*:*:*:*:*",
"matchCriteriaId": "1C88AF23-D873-4723-908D-E2898E9ED3E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga7:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A57EC0-6DE8-4552-BAC6-EB173D84AFCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga8:*:*:*:*:*:*:*",
"matchCriteriaId": "5F81076A-6583-4184-B8FE-1544792BCA74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga9:*:*:*:*:*:*:*",
"matchCriteriaId": "329678E4-D593-4E96-A33B-E8DBF87730E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga10:*:*:*:*:*:*:*",
"matchCriteriaId": "052091E6-A3E9-4E90-BBD5-1E0ED25998E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga11:*:*:*:*:*:*:*",
"matchCriteriaId": "B0AD7780-0194-47E9-980C-35215DFFD198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "BF116D8B-2C19-402A-9733-540CF79D80A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2A4B06-3E30-4633-9D9F-07AD91ED4281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "A35F3267-6978-4816-8DBC-2C7E2CFEE35A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF7FB11-5610-4EDC-8F08-4FF5EF0182E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3B4F88-99E5-4C1F-A160-821B3A99F0B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "68AA7812-D193-4AE1-82F2-BDAD51929D63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "9545967F-C55D-48A4-B70A-3E9B2D7E1617",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "98DBB5F7-D105-4F8E-B144-C392D3FC6AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "D97AB797-74DB-4414-B895-8D3403CF0334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "3A503C16-2719-435C-9CCE-B9743A42E9A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "77A73E2A-287A-48A0-90F2-9AA2DCC8595D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "C93174C2-4F87-42DF-856C-E9938DBC4DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A199EA0-3C40-4AB4-B67B-B4E0DA3E2512",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "F10924FB-9326-4EE2-B6FD-37011A2C2E9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DB20CD-004C-478C-B19C-48D7C0B6FE3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "F3E6E66F-D0F2-4CF7-AB96-D6DB38746972",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "64D15762-83B5-40AB-8832-F8B5EE1D789D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "25BCC700-7375-477C-9585-16DF7AC3852A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(40\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "FA49B682-E7ED-44CE-906C-9DD9D183583C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "E632468F-4B62-4937-8CA6-5B8023451F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "C853E612-2C4B-4595-AD6F-22E34B68C69A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "CC3E6D9B-BCC6-452A-8420-87E601B74949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA609E08-3369-4359-B126-19A54D537C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "15085505-6E63-40B7-9F71-7BF6F965FBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "71ADE6DE-5C2A-4D34-BE8B-A6ADEC61246E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "43710D33-1685-4EA9-948F-2B79122C4A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "4DE43284-9902-4701-916A-FF10AE966842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "859A0347-C043-41F4-B2CC-EC54E36A81A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "FA011033-D263-4D47-8F33-844DB9C0B6B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "14FBF27D-7288-4251-9846-064AAD6E6AB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq:*:*:*:*:*:*:*",
"matchCriteriaId": "7988103E-FEC8-4F3D-AB7C-645C0D5070EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq2:*:*:*:*:*:*:*",
"matchCriteriaId": "D0888AE6-9FC0-4927-B74F-65711EDB4DE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "EAA8E712-36F0-43EF-AED9-BDE4EA6CD6FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA61004-EC61-4E03-A2FC-DAEBD5E10F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "D9E61C16-55F9-4054-8CC2-38D5197A1FDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6DA25F2-2404-4DFA-9FB7-CE9DEA57ABBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "49E8D759-07E9-49DB-B8EB-A9C06A8D8031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "3C923698-3017-49B8-9DAF-98584CE0402C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "ADBCA495-DD1B-473F-B1FD-D8EA414497EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "D7EF0685-7BEF-4F84-902C-DFE533CD2F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F114FD7-F62C-4A24-9CE6-C9A7136465F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "892F72BE-B65F-4271-9042-3B459DFBB43C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "7715D0D0-E8B2-444A-A590-7B5B0BFA713F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "1B526DE1-EEA7-47E4-B291-09C02F018A16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "5ECDE91B-EA0E-4938-BC64-6A2A7DAF2A2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A00F4FE4-769F-4268-A623-DD56F12D7F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "D97983D5-B4D4-4A69-8573-A978EF9F8859",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CFC6E74-0AAA-4CB4-B119-30ED3DB95749",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "80B33EF2-3157-457D-BB77-CE99C9F02A17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "2477EEC8-93F2-45D2-AFF6-8D83AE5195B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "F2570C01-A377-421E-B2A1-EC05A87DC684",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B7D11D-1C92-4369-A446-2CC58AEC70D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "3BF19E91-370E-4F3E-A6ED-778A0493912F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "072FFEF0-72C9-4C19-8A3B-9633DDCA24E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq:*:*:*:*:*:*:*",
"matchCriteriaId": "46AE17A1-7FC7-4197-825C-92B32AC64D82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq1:*:*:*:*:*:*:*",
"matchCriteriaId": "00328248-72C7-4646-9312-5EAA7FE0D41E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq2:*:*:*:*:*:*:*",
"matchCriteriaId": "5535D673-8DF3-4737-A531-E7B28C419235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D97E83-3091-4E46-818C-503D7D1F9D1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq4:*:*:*:*:*:*:*",
"matchCriteriaId": "EE109462-C870-4C66-A7AE-B1ADED3B8DDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq5:*:*:*:*:*:*:*",
"matchCriteriaId": "14D0156C-3153-4A64-8491-A6A1B60FE5CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq6:*:*:*:*:*:*:*",
"matchCriteriaId": "C075F42D-27C1-46A2-893A-5C0D9BE13861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq7:*:*:*:*:*:*:*",
"matchCriteriaId": "4AF11222-0EA2-4E6B-B6DC-D16FCFEDE807",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "AE0BE6E0-3D82-4B2A-9B4B-C50021F0687A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD063290-8E11-43E3-B55E-411551074C60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "5898745E-C1D3-4D0E-8476-2EEAA4327B5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "887C5632-F3F7-4EDB-A065-D81F64A9B15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "AD397982-87E8-46CF-95A5-61435849D02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(52\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "B648C2EF-489B-4F62-B898-110A09794810",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "41DADD4F-B761-406B-8BF1-A7AF0C6896D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "9600F1FE-17F6-4F6D-886A-ED95FEA9A3D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "17356A3C-0C05-46A7-89EF-A2C48DDEC4A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5C5C5D-B40A-4DD6-A10C-C8713CCF2E12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "AE68EAC3-05F4-46C5-8A48-4ECFF1844BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D896F9-9E25-464F-B6C5-55A2DD38CC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF566A3-331A-4A8A-9EEF-D1FBF71BF4C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "0623C531-CFF1-4C45-B8A7-BCF2C4678222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "794B72BB-52D0-4307-8A61-73AA2477885A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "34E66D10-84F4-486D-BFAF-B7D4AE2E5583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "C364500B-B7B0-47CC-9277-8D43BAB6E6D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "B0B797B2-6AB2-4946-88C0-12D71258CCE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "F12B9DA7-28C4-4584-A548-6B06874F9C00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg9:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0C66F2-D158-497D-8683-2264F58A33B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE361F3-BA5B-453C-A58C-6E8CB84BC101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg11:*:*:*:*:*:*:*",
"matchCriteriaId": "8C55E31F-B291-4FE9-81FB-A91E95323863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "83184158-7C5F-4294-895E-7CF5B76A0F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A081B105-AD3F-4529-B3E7-D8B0851C83B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "B3142DA6-0FA9-4CEC-95FC-938AFD944BAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
"matchCriteriaId": "1644E8D2-E3F2-4ACB-A0D0-F374B565D121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(54\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC24BF9-DCD1-4974-A2C7-654E9B469C1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6F8F86-8C63-4A29-A384-62A849848EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "19D89B24-5DE1-4E15-B539-EC3FF6BA0658",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "87760068-4255-4D18-A62D-FDC156F7A654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "D8AF551C-1482-489C-AC4B-DF3E9BBB0F73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "904C4D5C-F603-42CE-9CAD-28B01223452B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "06D0BBED-E68E-43B7-93F5-FC5DEE7BEB41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4F2951-FF09-45FC-81BD-7C8C6C7CD1D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "63C5C43F-67A3-4000-845E-FDA620AD1B90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "565F3777-89E2-4159-9D8E-629EB7A56837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD7C3DF8-2B59-41EB-A151-15E46348DF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "700DDE2E-922C-426F-8751-BADD15055AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6CA171-4BE2-4204-BDAB-EA19BCD4842A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "84766AF1-DC74-4D64-A4E1-56B377D6CE48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "5D4A0517-EF86-4655-B4B4-246ED3A84803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0E3912E-11F7-421B-A5C4-35568A6E386B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "360F3E49-D75A-4ACE-B775-14055272C861",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "5362C676-5002-4ABC-9C60-97D4B65A399D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "0D14EB41-CD6A-483A-8F68-9072E436807D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
"matchCriteriaId": "DC201905-7DBF-4E2B-B732-62641F51C170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
"matchCriteriaId": "377669B9-952D-4527-9C24-E6713E749C1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "AABCE40E-04D5-4248-A374-EAB938575C2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "7ABC42E8-E304-4D00-8C6C-604F3EE13DF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "F9D38633-31AE-42E9-8FFA-77C8EFA9AABB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "A6D6D9CC-70F0-475C-8AB0-48980596BE47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "BEECEF97-EC6A-43C8-A7AB-5C48948183FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"matchCriteriaId": "8D593974-6D7B-4AF8-85B2-A77D8BE5CD6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"matchCriteriaId": "C7B4BFC4-F2C9-4D5E-AD22-3AAF36CFB12A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jaz1:*:*:*:*:*:*:*",
"matchCriteriaId": "81CA75FF-8C2E-4D9C-BE57-34EF801C28D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "971AAF00-63AA-4B3F-8E0F-B8FBD011C071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "551A0087-5926-46AF-B1DA-3AA18FAB87E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "E19A2402-F662-4900-8137-B14EB2537173",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "5757C194-AF18-434C-9F19-2FC775720556",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"matchCriteriaId": "4C5D50E8-99DB-4B15-B0F2-84674A9346A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A101303-CFB2-4EF9-AD68-AF6D8E1E8148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex6:*:*:*:*:*:*:*",
"matchCriteriaId": "796E5094-9A88-42E2-949B-D6D59651F04B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8EBCA86-C027-4514-A2A9-613899FD9A01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
"matchCriteriaId": "7D00EB0E-92D3-4C5B-B107-730B47BD6E01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7F6A52-9AA9-4441-A137-7EE3470C155C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
"matchCriteriaId": "92CEEA13-0B40-4203-8BAE-09374C9B1FE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "A8AC1EA3-AD9C-4AE1-91B6-4EBD22B77D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"matchCriteriaId": "F6CA27BF-13BC-4C13-A049-FA50247ACE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"matchCriteriaId": "82C8B101-CB42-43CF-98CE-44EE5FBC9BF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"matchCriteriaId": "054583DC-AAF8-4BF0-AC13-5A488476C161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"matchCriteriaId": "8422A740-0029-4C05-A7FE-12F12CD73B0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"matchCriteriaId": "85A9B13E-8CF7-4879-8C33-8E690291335F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"matchCriteriaId": "0A634C47-2FD6-4106-86B6-DD465A5394E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"matchCriteriaId": "05DDA3F8-7207-4FC9-B491-F49418975D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"matchCriteriaId": "91E64DDB-BF0A-4CCF-A01A-B45A9D566C0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"matchCriteriaId": "1E28EAD6-BD32-4DD7-9558-6E7F5264DCA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"matchCriteriaId": "D09AEBD6-56E7-4D22-B300-C904464FE75F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"matchCriteriaId": "8AD98F15-F847-4968-8A9E-D4D5D2ED4FE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"matchCriteriaId": "97525468-9E3E-4E34-8319-B4DFB51BC4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "F414ABC6-B95C-48ED-BC15-817356248776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"matchCriteriaId": "137D26AB-CA68-4CBC-91E8-8C0901D5BF19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"matchCriteriaId": "343F5C35-A0C0-4747-95BA-D4044C64508B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"matchCriteriaId": "713C55A8-F24D-45FE-88AA-1D1EFEC88339",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"matchCriteriaId": "11F7D280-D099-495F-B860-D96F485BAF81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
"matchCriteriaId": "B62A7038-EBCF-4996-8795-3BF95CBDE6B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "815EAC82-48B1-47A2-80D7-8CEE806E4B9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "F68B4687-CC90-45D8-989D-8DF38940C8A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F755B9BE-3DF6-49AE-847E-F74B696A49A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "AAF429A0-4A54-48FA-B69B-D34898E987EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A867AA1-E46F-4027-A41B-6AE1A27EB2F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD0EAC6-8B70-40C7-80D0-9BDD09AF5523",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "4EF4082D-8F3E-4274-83DD-431E99C395B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "230ACE85-877C-45D7-A2A9-0085C421292A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "D37BA5F4-9D5C-4D92-A6D3-055B79049719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED6E6E2-AB47-442C-93B9-DEBA9D124B31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
"matchCriteriaId": "F3CC7F08-343B-40CC-9D03-81EE4924D6C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
"matchCriteriaId": "31444A2D-BBF0-4D6A-A898-5EC4E782CC43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
"matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
"matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
"matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
"matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
"matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
"matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
"matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC9108D-B313-4C07-A9E3-5C2591304919",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "B8A89C06-8384-4B23-8D3A-293C9035FC73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "94836415-1A1D-4DC2-BDAF-BE5B06EA5C18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "00B7F513-E991-47A4-A96B-2EB90B15D197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E5F22B-2CD3-4A14-AB2B-E039CF001140",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"matchCriteriaId": "15102BA5-E96F-468C-8F8E-4F8F9E947533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"matchCriteriaId": "F1F481FC-D16B-461C-BCBB-D58B58D1647D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"matchCriteriaId": "42D47483-F300-4224-86B2-6FBEFA35EE63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC9E74C5-4BF5-4F29-938F-3E71784F08AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"matchCriteriaId": "2963A4BD-1414-40CA-A949-9CE61B3C61C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"matchCriteriaId": "DE0C7B38-F1D2-4D6F-A986-BDE58F6B7E40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"matchCriteriaId": "2A6C5B60-9524-4A5A-A8CA-3C18730E18F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"matchCriteriaId": "E0B09C15-62E9-4278-806C-03D47B75E336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8a:*:*:*:*:*:*:*",
"matchCriteriaId": "FFFA4F2A-4BE5-4FD5-A3D4-2B28D6A25A53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*",
"matchCriteriaId": "ACE1712A-1A44-4BD1-B114-318D4EC4977A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*",
"matchCriteriaId": "C71593C6-B365-47D2-958D-A99FFB64101A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4b:*:*:*:*:*:*:*",
"matchCriteriaId": "2C5BF4FA-139A-4789-A9C1-84B6DEFFD300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4c:*:*:*:*:*:*:*",
"matchCriteriaId": "009E4B3F-4384-4DBD-9D88-0A191BB92C6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svo2:*:*:*:*:*:*:*",
"matchCriteriaId": "B853917E-D8E2-4CBD-BB4F-CB447BE052F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svp1:*:*:*:*:*:*:*",
"matchCriteriaId": "82784B3A-A4EA-4BBE-9ACE-BAE4895372CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "07B725B7-AFBB-4F0D-87BA-38477E250374",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F05531B-A6A2-437A-B7CE-1A2DD33EC8DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "7CBD931B-9D7F-452A-A567-60ED7EA1D2B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4B3624-1DA1-4A63-B2F1-F8E06CB61E82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"matchCriteriaId": "2D601E90-6F2A-4C66-97A2-152031C88DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"matchCriteriaId": "E2C787A4-4AF4-49F1-AA10-F5CF51AE17AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*",
"matchCriteriaId": "F98E150B-C806-4CF6-83EC-0C16A44F3EFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "50CB7858-C857-41E2-9E5D-9368EEC2825E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "10438F4B-281D-4C2F-B4C3-DC3D47B0033A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "681E360E-2287-4BE7-8228-77C235DFA901",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "81800178-449A-4B61-9611-5FB2FC4DBC75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"matchCriteriaId": "F7316ED4-FABD-49E0-AA21-394D327435F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"matchCriteriaId": "24A56EF3-4E88-4220-846A-A9BE1E496311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA77FEC-51CE-4D0B-9D1F-7BF1A28D30A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc1:*:*:*:*:*:*:*",
"matchCriteriaId": "4B29CAEE-A01B-4156-A871-43F3CC90ECB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc3:*:*:*:*:*:*:*",
"matchCriteriaId": "6879F438-0A0E-460C-A52F-3EE2F0EC2C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc4:*:*:*:*:*:*:*",
"matchCriteriaId": "A925CDF2-3A2E-499C-B38F-1D086534F11E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "0687FD87-BAED-4776-9B94-3C9EA7CCE79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "7582DA8C-2360-4E8C-90F8-6194F269CD1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "A9D6FBCE-F1F0-437B-A9B0-57F717C974F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "94FD5120-C385-4F16-AB3F-979D851DF8D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "BA06788C-E529-4024-9565-EAF5D90D68C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "96274788-A5AC-4740-A915-C381593203C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*",
"matchCriteriaId": "6FD15D65-9471-4755-9EDB-04ECF34DFD8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
"matchCriteriaId": "B5BDAB63-EA0E-486D-B146-7E0060F70066",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "BBF92BEC-AA46-46DF-8C1E-956F3E506E69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"matchCriteriaId": "8C226FE9-61A0-4873-B277-1B8ADB397B32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
"matchCriteriaId": "2D9C3A73-E4E1-4C0F-86D4-B796069E4EE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5BD905-75C3-47AE-8D19-6225BD808B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"matchCriteriaId": "56DE452A-6852-4879-9187-8A152E6E260E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"matchCriteriaId": "9A6367C8-C9D7-4965-BD9C-1DD4A2FCE2D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3047E4-BCC3-41A7-9DCD-15C25D14EC44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"matchCriteriaId": "65589A68-58A4-4BD4-8A26-C629AE610953",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A64C8F-6380-47CA-8116-E3438B953F84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*",
"matchCriteriaId": "6D4358B9-F3DB-46AC-A3A8-114E25F676DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jn1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B171170-4BBD-4E09-BF5A-6DA3F110C7D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4a\\)ea5:*:*:*:*:*:*:*",
"matchCriteriaId": "734AA8D5-5BB9-4E1D-B8CB-0A14BADA9EF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "F65F813B-C080-4028-8E1E-A81827917DD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "6ABBCE48-B9D1-4EFB-BF64-CF30F5294EB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "9D54D10E-D94E-4731-9988-4EC1786FF4E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DC02AA6-E046-4EC9-9FFB-8B2C76FBE027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "4A2BB34B-D902-4064-BADC-56B5379E92CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*",
"matchCriteriaId": "55D0A0A2-DB62-4C92-9877-CF8CA01B1A10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "2316E962-6C56-4F45-9575-274506B9D4C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "42D3DFE3-7576-4D56-ABD2-425C28B56960",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "A39AFD5E-8FCA-4EC6-9472-FD208CB2A555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D249815-5A8A-40E4-A943-6AB1A2250CDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"matchCriteriaId": "45B80CBC-961F-4EE8-A998-C0A827151EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"matchCriteriaId": "E7131776-5DEB-4B96-8483-B81B538E24FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"matchCriteriaId": "BE991877-18E0-4374-A441-C2316085CCA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
"matchCriteriaId": "7A472B96-0DDE-49DD-A7E3-A82DD6AEB3DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "3A2EB46D-16E0-4C31-8634-C33D70B5381A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "757EB1A1-4764-4108-9AB1-F33CF9CEE574",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "7803B445-FE22-4D4B-9F3A-68EFE528195E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"matchCriteriaId": "7551128E-9E23-4C42-A681-6BE64D284C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"matchCriteriaId": "0EB7BFE1-06ED-4B45-8B4F-2B309B8D6342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
"matchCriteriaId": "31605A68-9398-4239-A137-DD0516BD2660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
"matchCriteriaId": "EFEF03FA-FBF2-477F-A5E2-67F47610897A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "86C0900A-1354-4A20-B5ED-8C005BCE4D74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "9F5B811A-AAAD-49C0-8FC2-5C79078BA6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "3104D911-5FFC-4605-B234-6FD40A206DC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "EC787C70-6540-4AF7-9F05-8FD86284091E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "FC716D3D-5C37-4E36-8F6B-53801DC7225E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "D5E289B7-7692-448B-B15E-224AF4F01D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E42A8A6F-A732-4441-A94F-FCDFA960EB9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "EE9EC5B2-CAE1-4C8F-8F96-FE006049FF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "895D2447-BD8A-473C-B26E-06897080DD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*",
"matchCriteriaId": "F8169591-4C3D-4C32-A24F-EACDBC62B77F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*",
"matchCriteriaId": "D5944EA5-29A2-438A-AA5E-ABC45E298419",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*",
"matchCriteriaId": "CD6584D8-AE44-40D0-990C-94C377DBF275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A52C1850-27F7-40C8-BA26-660D160AD163",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0sq:*:*:*:*:*:*:*",
"matchCriteriaId": "5E519217-3180-4C49-863F-0D10E47F1A82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"matchCriteriaId": "930678B3-1527-4967-9D8F-27FC0DA060AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "1AAC822D-E886-46A9-80E8-06DD753A458E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "E312CE6B-F3F5-40B3-8862-3BB1314376E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"matchCriteriaId": "58A34268-7618-48D2-8872-27B5B624543B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6893B368-D3C1-416D-A4E8-6484AF91C7CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"matchCriteriaId": "C2017A75-CC29-4161-85CB-7A531E5ABB3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"matchCriteriaId": "4C809C7E-738B-461F-9155-BC19AAC8B661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.0sq:*:*:*:*:*:*:*",
"matchCriteriaId": "1D918A4A-7E60-4C8B-86D8-82BCA99B0844",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"matchCriteriaId": "E6CDB780-F259-4A2D-B32C-0401601715FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "596A43FC-0DDA-4AF6-A4A4-A488B5740D5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"matchCriteriaId": "A8DBFACA-112F-48F6-BF0C-37FC6D133EC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"matchCriteriaId": "95384E18-A319-4BFA-912F-7AC7C664A80A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"matchCriteriaId": "6B3C5A2B-85A8-4B75-A067-335D1DFE8C1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"matchCriteriaId": "85512107-7E38-4C00-96D0-01D9EE7DD903",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"matchCriteriaId": "7707BC4D-6090-44CF-B304-A54A46FAD32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"matchCriteriaId": "53D28F4F-5E14-48C1-8353-4D6A8C657FB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC7331C-F9D5-4E3C-B39A-11E1ED9240DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "C14EB390-BA15-45C9-B971-D66CD98B0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*",
"matchCriteriaId": "3BCF5A7C-202D-44F8-97D3-694F876050D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "748C5458-8F16-4DA4-8BDE-D00BF42DC8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EA559D-5184-4E19-8A32-ECA41C930AE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "2B82207E-7E19-4E0A-93E6-C631897793D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*",
"matchCriteriaId": "716D8805-D461-4066-9BFD-1EA895E4B997",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "B4A02F04-6717-403D-8A6B-B365F74DEE00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*",
"matchCriteriaId": "7150819E-EFB5-4224-975C-84EDBBB2881D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*",
"matchCriteriaId": "E81F4068-35A1-4712-9B88-F6E574B2DE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*",
"matchCriteriaId": "28DDB45D-1B19-4FAB-B985-F8E5D38A3ED6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*",
"matchCriteriaId": "29794A8C-B1CC-492F-9A68-02EEE994743B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*",
"matchCriteriaId": "4CBBDA12-AF2E-400B-979D-3657F1F2C15B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7F55DC-38F5-4B19-A699-90E1D302A04B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*",
"matchCriteriaId": "CC32DB11-4E23-492E-A00E-E0DBF9131C64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2306E8-ABFD-4C37-A911-7B35A654147C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "455DAAB8-83B4-44B9-B2F7-2DC9EA796898",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F462360-3597-420B-ACB8-44A6F622C8B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"matchCriteriaId": "39DED4C1-E7AF-48E0-8B1A-839A87E52992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "96CA4E70-28BE-434C-811A-C16474CFD87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*",
"matchCriteriaId": "7207B1F1-AF21-4C02-A163-4289503A026C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "A56AE607-0AD0-487A-A266-C15EAF40F2CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8B8DBC-F273-4ADE-97F4-584DE23F1CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "705971E9-7FB4-43EA-A1AE-C91865EADE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
"matchCriteriaId": "895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
"matchCriteriaId": "A98F2654-46F3-4C63-A2C2-48B372C655B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
"matchCriteriaId": "17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
"matchCriteriaId": "3598539F-0EEB-45D6-8BA5-A2A3F69D556C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"matchCriteriaId": "60C5FC5B-BE2E-4BAC-AC23-58666BDEB553",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
"matchCriteriaId": "3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2h:*:*:*:*:*:*:*",
"matchCriteriaId": "0E275E7D-C89D-42DE-9301-C19A54FEE964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el c\u00f3digo de procesamiento CMP (Cluster Management Protocol) del software Cisco IOS y Cisco IOS XE podr\u00eda permitir que un atacante adyacente no autenticado desencadene una denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente al procesar paquetes de gesti\u00f3n CMP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes de gesti\u00f3n CMP maliciosos a un dispositivo afectado. Si se explota con \u00e9xito, podr\u00eda permitir que el switch se reinicie, provocando una denegaci\u00f3n de servicio (DoS). El switch se recargar\u00e1 autom\u00e1ticamente."
}
],
"id": "CVE-2019-1746",
"lastModified": "2024-11-21T04:37:15.843",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-03-28T00:29:00.590",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107612"
},
{
"source": "psirt@cisco.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107612"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-MMWF-5332-H99W
Vulnerability from github – Published: 2022-05-13 01:31 – Updated: 2022-05-13 01:31A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.
{
"affected": [],
"aliases": [
"CVE-2019-1746"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-03-28T00:29:00Z",
"severity": "MODERATE"
},
"details": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.",
"id": "GHSA-mmwf-5332-h99w",
"modified": "2022-05-13T01:31:25Z",
"published": "2022-05-13T01:31:25Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1746"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/107612"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2019-1746
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-1746",
"description": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.",
"id": "GSD-2019-1746"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-1746"
],
"details": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically.",
"id": "GSD-2019-1746",
"modified": "2023-12-13T01:23:52.313807Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2019-03-27T16:00:00-0700",
"ID": "CVE-2019-1746",
"STATE": "PUBLIC",
"TITLE": "Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS and IOS XE Software",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "3.2.0SG"
},
{
"version_affected": "=",
"version_value": "3.2.1SG"
},
{
"version_affected": "=",
"version_value": "3.2.2SG"
},
{
"version_affected": "=",
"version_value": "3.2.3SG"
},
{
"version_affected": "=",
"version_value": "3.2.4SG"
},
{
"version_affected": "=",
"version_value": "3.2.5SG"
},
{
"version_affected": "=",
"version_value": "3.2.6SG"
},
{
"version_affected": "=",
"version_value": "3.2.7SG"
},
{
"version_affected": "=",
"version_value": "3.2.8SG"
},
{
"version_affected": "=",
"version_value": "3.2.9SG"
},
{
"version_affected": "=",
"version_value": "3.2.10SG"
},
{
"version_affected": "=",
"version_value": "3.2.11SG"
},
{
"version_affected": "=",
"version_value": "3.3.0SG"
},
{
"version_affected": "=",
"version_value": "3.3.2SG"
},
{
"version_affected": "=",
"version_value": "3.3.1SG"
},
{
"version_affected": "=",
"version_value": "3.3.0XO"
},
{
"version_affected": "=",
"version_value": "3.3.1XO"
},
{
"version_affected": "=",
"version_value": "3.3.2XO"
},
{
"version_affected": "=",
"version_value": "3.4.0SG"
},
{
"version_affected": "=",
"version_value": "3.4.2SG"
},
{
"version_affected": "=",
"version_value": "3.4.1SG"
},
{
"version_affected": "=",
"version_value": "3.4.3SG"
},
{
"version_affected": "=",
"version_value": "3.4.4SG"
},
{
"version_affected": "=",
"version_value": "3.4.5SG"
},
{
"version_affected": "=",
"version_value": "3.4.6SG"
},
{
"version_affected": "=",
"version_value": "3.4.7SG"
},
{
"version_affected": "=",
"version_value": "3.4.8SG"
},
{
"version_affected": "=",
"version_value": "3.5.0E"
},
{
"version_affected": "=",
"version_value": "3.5.1E"
},
{
"version_affected": "=",
"version_value": "3.5.2E"
},
{
"version_affected": "=",
"version_value": "3.5.3E"
},
{
"version_affected": "=",
"version_value": "3.10.4S"
},
{
"version_affected": "=",
"version_value": "3.12.0aS"
},
{
"version_affected": "=",
"version_value": "3.6.0E"
},
{
"version_affected": "=",
"version_value": "3.6.1E"
},
{
"version_affected": "=",
"version_value": "3.6.0aE"
},
{
"version_affected": "=",
"version_value": "3.6.0bE"
},
{
"version_affected": "=",
"version_value": "3.6.2aE"
},
{
"version_affected": "=",
"version_value": "3.6.2E"
},
{
"version_affected": "=",
"version_value": "3.6.3E"
},
{
"version_affected": "=",
"version_value": "3.6.4E"
},
{
"version_affected": "=",
"version_value": "3.6.5E"
},
{
"version_affected": "=",
"version_value": "3.6.6E"
},
{
"version_affected": "=",
"version_value": "3.6.5aE"
},
{
"version_affected": "=",
"version_value": "3.6.5bE"
},
{
"version_affected": "=",
"version_value": "3.6.7E"
},
{
"version_affected": "=",
"version_value": "3.6.8E"
},
{
"version_affected": "=",
"version_value": "3.6.7aE"
},
{
"version_affected": "=",
"version_value": "3.6.7bE"
},
{
"version_affected": "=",
"version_value": "3.6.9E"
},
{
"version_affected": "=",
"version_value": "3.6.10E"
},
{
"version_affected": "=",
"version_value": "3.3.0SQ"
},
{
"version_affected": "=",
"version_value": "3.3.1SQ"
},
{
"version_affected": "=",
"version_value": "3.4.0SQ"
},
{
"version_affected": "=",
"version_value": "3.4.1SQ"
},
{
"version_affected": "=",
"version_value": "3.7.0E"
},
{
"version_affected": "=",
"version_value": "3.7.1E"
},
{
"version_affected": "=",
"version_value": "3.7.2E"
},
{
"version_affected": "=",
"version_value": "3.7.3E"
},
{
"version_affected": "=",
"version_value": "3.7.4E"
},
{
"version_affected": "=",
"version_value": "3.7.5E"
},
{
"version_affected": "=",
"version_value": "3.5.0SQ"
},
{
"version_affected": "=",
"version_value": "3.5.1SQ"
},
{
"version_affected": "=",
"version_value": "3.5.2SQ"
},
{
"version_affected": "=",
"version_value": "3.5.3SQ"
},
{
"version_affected": "=",
"version_value": "3.5.4SQ"
},
{
"version_affected": "=",
"version_value": "3.5.5SQ"
},
{
"version_affected": "=",
"version_value": "3.5.6SQ"
},
{
"version_affected": "=",
"version_value": "3.5.7SQ"
},
{
"version_affected": "=",
"version_value": "3.5.8SQ"
},
{
"version_affected": "=",
"version_value": "3.16.1S"
},
{
"version_affected": "=",
"version_value": "3.16.0bS"
},
{
"version_affected": "=",
"version_value": "3.16.10S"
},
{
"version_affected": "=",
"version_value": "3.8.0E"
},
{
"version_affected": "=",
"version_value": "3.8.1E"
},
{
"version_affected": "=",
"version_value": "3.8.2E"
},
{
"version_affected": "=",
"version_value": "3.8.3E"
},
{
"version_affected": "=",
"version_value": "3.8.4E"
},
{
"version_affected": "=",
"version_value": "3.8.5E"
},
{
"version_affected": "=",
"version_value": "3.8.5aE"
},
{
"version_affected": "=",
"version_value": "3.8.6E"
},
{
"version_affected": "=",
"version_value": "3.8.7E"
},
{
"version_affected": "=",
"version_value": "3.9.0E"
},
{
"version_affected": "=",
"version_value": "3.9.1E"
},
{
"version_affected": "=",
"version_value": "3.9.2E"
},
{
"version_affected": "=",
"version_value": "3.9.2bE"
},
{
"version_affected": "=",
"version_value": "16.9.2h"
},
{
"version_affected": "=",
"version_value": "3.10.0E"
},
{
"version_affected": "=",
"version_value": "3.10.1E"
},
{
"version_affected": "=",
"version_value": "3.10.0cE"
},
{
"version_affected": "=",
"version_value": "3.10.1aE"
},
{
"version_affected": "=",
"version_value": "3.10.1sE"
},
{
"version_affected": "=",
"version_value": "16.12.1"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "7.4",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/107612"
}
]
},
"source": {
"advisory": "cisco-sa-20190327-cmp-dos",
"defect": [
[
"CSCvj25068",
"CSCvj25124"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svo2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.2h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fz:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ew:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbk9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)az:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4a\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jaz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jn1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svp1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2019-1746"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20190327 Cisco IOS and IOS XE Software Cluster Management Protocol Denial of Service Vulnerability",
"refsource": "CISCO",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-cmp-dos"
},
{
"name": "107612",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/107612"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-10-09T23:47Z",
"publishedDate": "2019-03-28T00:29Z"
}
}
}
VAR-201903-0595
Vulnerability from variot - Updated: 2023-12-18 12:28A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically. Cisco IOS and IOS XE are prone to a remote denial-of-service vulnerability. Successful exploits may allow attackers to cause a reload of the affected devices, denying service to legitimate users. This issue is being tracked by Cisco Bug IDs CSCvj25068, CSCvj25124
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201903-0595",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(1\\)sg2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.5be"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(1\\)e3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2a\\)ex5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)ea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(18\\)s1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5c\\)e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.1xo"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)ex2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)see1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)eu1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(6\\)ea2b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.16.0bs"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sg2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.7e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)eu2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sz2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea8a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)see3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(27\\)sbk9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)sc3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e2b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sz3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sef1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ew"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.2e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sq2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(19\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)ex1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.0xo"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(37\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(1\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(54\\)xo"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.5e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)seg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(60\\)ez4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(8\\)ea1b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(1\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(52\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e6"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.0sq"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.2ae"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sed"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4m\\)e3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.0sq"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.1e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.9.0e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(9\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4n\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(18\\)s3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.11sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.5sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sef3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ey1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.0sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sg1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.6sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.9.2e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2a\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)seb2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4m\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sg1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.3e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.6sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(9\\)ea1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(58\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(3\\)svo2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e5b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.6e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)s2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(58\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.1sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)fy"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)ey1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.4e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa14"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(1\\)e2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.8sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(3\\)svp1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3m\\)e8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(14\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)ea2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)se"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.4sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(9\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)ea3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.0ae"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(6\\)ea2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)eu"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga10"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.3e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11\\)ea1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)ex1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.4sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(52\\)xo"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sz5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(19\\)ea1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(11\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4o\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.2xo"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.9.1e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.5sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)eb2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.9.2be"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.10.0ce"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sg3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.16.1s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4s\\)e2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.7ae"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.3e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.10.1ae"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sq6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(19\\)ea1b"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.0e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(20\\)ea1b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)ez"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ey"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.3sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4m\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(13\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea6a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.3sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ec2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(13\\)ea1c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)see2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.7.5e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se10a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(1\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sq4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.1sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.12.0as"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)se4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)ea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ej1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)jaz1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ey1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sq1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)ez"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.4\\(25e\\)jaz1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.8sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.10.0e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)ey2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sg4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)se4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.4e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(52\\)ex1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea4a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.5\\(3\\)s10"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.4sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.10e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e5a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)see"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.3sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea8"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.0sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ey3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.1sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5a\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sy15"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sq"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.2sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sec"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.0e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2a\\)se9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(35\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(58\\)ez"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(58\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)seg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(52\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4a\\)ea5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)sc4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.5\\(1\\)sy4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)se"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.10sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(9\\)ea1d"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(13\\)ea1b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4p\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ez"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)ex1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(20\\)ea1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.7.3e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.10.1se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)ex3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea5a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.6sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)sq2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3m\\)e7"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.5ae"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(14\\)ea1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ez1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.2e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2b\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(13\\)ea1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)xo"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.7sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3m\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg6"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.2e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(3\\)svk4b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)xo"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.7be"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(14\\)az"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sec1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(22\\)s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(1\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)ex"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.12.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se10"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(6\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s4a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.5e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea10b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)fz"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(52\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(18\\)s2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sz6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)s1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.10.4s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)eb1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e9a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)ewa"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(6\\)ea2c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(1\\)sg1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.1e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ey2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e1s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sz1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea14"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sg3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(54\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sq5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(3\\)svk4c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(19\\)ea1d"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(54\\)sg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)seg3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4o\\)e3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(37\\)sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.1sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)ewa3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.7.4e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(18\\)s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(37\\)sg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sq3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.0sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e7b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sg2"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.1e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.16.10s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(18\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sz"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(58\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(18\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.7.1e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.5sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea1b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s2a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(12c\\)ea1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se13"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3a\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)sg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.0sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.7.2e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg11"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(35\\)se5"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.2sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5a\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se8"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)se5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e2c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)fx"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(35\\)se"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.7sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)ea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4s\\)e1"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.8.7e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ec1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e4"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.8e"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.1sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)seb3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)sg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se10"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.0be"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)xo"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4q\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2a\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(37\\)ey"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se11"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.3.1sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(3\\)mra3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e0c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)jn1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)seb1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg8a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(35\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sec2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(20\\)ea1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)eb"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(3\\)e1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5b\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(19\\)ea1c"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.9e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)ewa4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)ex"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)sc1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(8\\)ea1c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)s"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(14\\)sz4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sed1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(52\\)sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.2.9sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)see4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(2\\)e3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e5a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.7.0e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)ea"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(40\\)ex2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea10a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e0a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.2sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)ex3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(31\\)sga4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sef2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(9\\)ea1c"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ey4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(6\\)i1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(54\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex10"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.4.2sg"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.7sq"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)ewa2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)ewa1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ey2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(4\\)e3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)s3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(54\\)wo"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.8sq"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.5ae"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "16.9.2h"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(6\\)e1a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(6\\)ea2a"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(20\\)ea2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sq7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(35\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se9"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(46\\)se"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(6\\)ea1a"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.6.6e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(37\\)se1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(1\\)xo1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ey3"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.10.1e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)se2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se12"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(18\\)s4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sqd2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(60\\)ez5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.1\\(2\\)sg3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(50\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(53\\)sg7"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(12c\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ez"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)seb"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(20\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)seb4"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(44\\)se6"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(55\\)se3"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(14\\)ea1b"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)ewa9"
},
{
"model": "ios xe",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "3.5.0e"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.1\\(22\\)ea1"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "12.2\\(25\\)sef"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ej"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)sg"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)ex5"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.2\\(5\\)e2"
},
{
"model": "ios",
"scope": "eq",
"trust": 1.0,
"vendor": "cisco",
"version": "15.0\\(2\\)se"
},
{
"model": "ios",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "ios xe",
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": "ios 15.0 se",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "catalyst switches",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
}
],
"sources": [
{
"db": "BID",
"id": "107612"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"db": "NVD",
"id": "CVE-2019-1746"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.4sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svo2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.4sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.6sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.11sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sed:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.9.2h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.3sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4q\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.5sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.4sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.7sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2b\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.6sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fz:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.9sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sq2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.3sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ew:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(1\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea6a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.5sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.6sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ez1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3m\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbk9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.8sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4p\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(19\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4m\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea5a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ewa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)az:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.5sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.12.0as:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.7sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(11\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4a\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.10sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4n\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jaz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(14\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(1\\)sy4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(6\\)i1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(52\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svk4b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.2ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)se4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea2c:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(22\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.4s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)sc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.8sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sef1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)eb2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.1sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(35\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(12c\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.7sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.1sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1d:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jaz1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(5\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(18\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)ez:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)se3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(9\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4s\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)jn1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(3\\)svp1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.2xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)see:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(44\\)se5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)fy:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(46\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)se1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.2sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(40\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ej:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.3.0sq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.4.8sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)ey:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seg3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(20\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(20\\)ex:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(37\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(13\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.5\\(3\\)s10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(8\\)ea1b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(22\\)ea10a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.1\\(6\\)ea1a:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.2.2sg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.2\\(58\\)se:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:3.5.2e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:15.2\\(4o\\)e3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-1746"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco ?? ??,Cisco",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
],
"trust": 0.6
},
"cve": "CVE-2019-1746",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Adjacent Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 6.1,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-1746",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 6.5,
"id": "VHN-149708",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"author": "ykramarz@cisco.com",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.8,
"impactScore": 4.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Adjacent Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.5,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2019-1746",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2019-1746",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "ykramarz@cisco.com",
"id": "CVE-2019-1746",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201903-1083",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-149708",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-149708"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"db": "NVD",
"id": "CVE-2019-1746"
},
{
"db": "NVD",
"id": "CVE-2019-1746"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A vulnerability in the Cluster Management Protocol (CMP) processing code in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation when processing CMP management packets. An attacker could exploit this vulnerability by sending malicious CMP management packets to an affected device. A successful exploit could cause the switch to crash, resulting in a DoS condition. The switch will reload automatically. Cisco IOS and IOS XE are prone to a remote denial-of-service vulnerability. \nSuccessful exploits may allow attackers to cause a reload of the affected devices, denying service to legitimate users. \nThis issue is being tracked by Cisco Bug IDs CSCvj25068, CSCvj25124",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-1746"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"db": "BID",
"id": "107612"
},
{
"db": "VULHUB",
"id": "VHN-149708"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-1746",
"trust": 2.8
},
{
"db": "BID",
"id": "107612",
"trust": 2.0
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003036",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201903-1083",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "43606",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-149708",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-149708"
},
{
"db": "BID",
"id": "107612"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"db": "NVD",
"id": "CVE-2019-1746"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
]
},
"id": "VAR-201903-0595",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-149708"
}
],
"trust": 0.7666666999999999
},
"last_update_date": "2023-12-18T12:28:26.471000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20190327-cmp-dos",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190327-cmp-dos"
},
{
"title": "Cisco IOS and IOS XE Enter the fix for the verification vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=90500"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-149708"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"db": "NVD",
"id": "CVE-2019-1746"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/107612"
},
{
"trust": 2.0,
"url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190327-cmp-dos"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-1746"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1746"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/43606"
},
{
"trust": 0.6,
"url": "https://vigilance.fr/vulnerability/cisco-ios-ios-xe-multiple-vulnerabilities-28888"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-149708"
},
{
"db": "BID",
"id": "107612"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"db": "NVD",
"id": "CVE-2019-1746"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-149708"
},
{
"db": "BID",
"id": "107612"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"db": "NVD",
"id": "CVE-2019-1746"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-03-28T00:00:00",
"db": "VULHUB",
"id": "VHN-149708"
},
{
"date": "2019-03-27T00:00:00",
"db": "BID",
"id": "107612"
},
{
"date": "2019-05-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"date": "2019-03-28T00:29:00.590000",
"db": "NVD",
"id": "CVE-2019-1746"
},
{
"date": "2019-03-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-149708"
},
{
"date": "2019-03-27T00:00:00",
"db": "BID",
"id": "107612"
},
{
"date": "2019-05-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-003036"
},
{
"date": "2019-10-09T23:47:54.673000",
"db": "NVD",
"id": "CVE-2019-1746"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote or local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco IOS and IOS XE Software input validation vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-003036"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input Validation Error",
"sources": [
{
"db": "BID",
"id": "107612"
},
{
"db": "CNNVD",
"id": "CNNVD-201903-1083"
}
],
"trust": 0.9
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.