Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2017-3881
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco IOS and IOS XE Software |
Version: Cisco IOS and IOS XE Software |
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2022-03-25
Due date: 2022-04-15
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-3881
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:41.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "41872", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41872/" }, { "name": "41874", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/41874/" }, { "name": "97391", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97391" }, { "name": "96960", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96960" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "name": "1038059", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038059" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-3881", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T16:05:33.301931Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-25", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-3881" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:00:24.703Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE Software", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE Software" } ] } ], "datePublic": "2017-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-15T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "41872", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41872/" }, { "name": "41874", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/41874/" }, { "name": "97391", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97391" }, { "name": "96960", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96960" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "name": "1038059", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038059" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-3881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE Software", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE Software" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "41872", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41872/" }, { "name": "41874", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41874/" }, { "name": "97391", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97391" }, { "name": "96960", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96960" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "name": "1038059", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038059" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-3881", "datePublished": "2017-03-17T22:00:00", "dateReserved": "2016-12-21T00:00:00", "dateUpdated": "2024-11-15T18:00:24.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "cisa_known_exploited": { "cveID": "CVE-2017-3881", "cwes": "[\"CWE-20\"]", "dateAdded": "2022-03-25", "dueDate": "2022-04-15", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-3881", "product": "IOS and IOS XE", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.", "vendorProject": "Cisco", "vulnerabilityName": "Cisco IOS and IOS XE Remote Code Execution Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-3881\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2017-03-17T22:59:00.640\",\"lastModified\":\"2025-01-27T21:04:25.853\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el c\u00f3digo de procesamiento de Cisco Cluster Management Protocol (CMP) en Cisco IOS y Cisco IOS XE Software podr\u00eda permitir a un atacante remoto no autenticado provocar una recarga de un dispositivo afectado o ejecutar c\u00f3digo remotamente con privilegios elevados. El Cluster Management Protocol utiliza internamente Telnet como un protocolo de se\u00f1alizaci\u00f3n y comando entre los miembros del cl\u00faster. La vulnerabilidad se debe a la combinaci\u00f3n de dos factores: (1) la imposibilidad de restringir el uso de las opciones Telnet espec\u00edficas de CMP s\u00f3lo a las comunicaciones locales internas entre los miembros del cl\u00faster y, en cambio, aceptar y procesar dichas opciones a trav\u00e9s de cualquier conexi\u00f3n Telnet con un dispositivo afectado; y (2) el procesamiento incorrecto de las opciones malformadas de Telnet espec\u00edficas de CMP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando opciones malformadas de Telnet espec\u00edficas de CMP mientras establec\u00eda una sesi\u00f3n Telnet con un dispositivo Cisco afectado configurado para aceptar conexiones Telnet. Un exploit podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario y obtener el control total del dispositivo o provocar una recarga del dispositivo afectado. Esto afecta a los conmutadores Catalyst, los conmutadores Embedded Service 2020, el m\u00f3dulo de servicio Enhanced Layer 2 EtherSwitch, el m\u00f3dulo de servicio Enhanced Layer 2/3 EtherSwitch, el conmutador Gigabit Ethernet (CGESM) para HP, los conmutadores IE Industrial Ethernet, el conmutador ME 4924-10GE, la pasarela RF 10 , y m\u00f3dulo de servicio EtherSwitch de capa 2/3 SM-X. ID de errores de Cisco: CSCvd48893.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-03-25\",\"cisaActionDue\":\"2022-04-15\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Cisco IOS and IOS XE Remote Code Execution Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.2s\",\"versionEndIncluding\":\"15.1\\\\(3\\\\)svs\",\"matchCriteriaId\":\"9F6546FC-F719-4FC2-ACB1-E558687769EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.2sg\",\"versionEndIncluding\":\"3.9e\",\"matchCriteriaId\":\"3588833B-3B46-4968-8710-C244AB2C7BB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7301CDF-48BB-4E4B-862A-28B2A742D67B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"409044EC-4B25-4C7F-B20F-26CD79EEE49F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4533989C-CCDC-464A-AB68-29A752FA0759\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"487A1994-9FF2-4F15-9F38-C5B5218221DE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DD8AF-D938-4E20-89FE-E34F54EFF2F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A546FA79-654C-4CE9-9F6B-8F49255500F8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14E8F619-55BA-45E4-B75E-A64E9452F7AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CE5551-B4ED-4554-9012-09A7CF7A5D88\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69384D20-0270-4CD5-95D0-7EA93CBDE78E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07F566D-BCAC-44EC-AB37-6FA870D4AEDA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63946130-E5AB-476A-98AB-3BB49B7EBD1A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A9D08FF-DD21-4AAE-ABB5-561CD80D52AF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C594EB3-FECD-4E88-8945-B9CD5EF6CA66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11E79AB1-9C7D-4E72-8038-60B62D3F771B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EF30F-54A7-46D8-B9E5-8CA2883563DD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E6061A1-706D-4129-B99B-318EACB7AB3D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C3FFD5C-1AC5-4D1D-9A66-9167F72E4C6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8E6604-7F57-4147-A4D9-7A37B415D794\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28218B4-23E0-4319-BE93-F09FB552F7D7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"042A0AA5-FC1B-451E-92A4-1E3C309B0C00\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8D63435-4DC4-4597-AADE-89BCF470B109\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66D51A01-A213-4BB1-84C5-7D29D28A81CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D562C004-24DE-4B9D-A323-C3D2EA32A173\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D86BAF5-681F-4867-A657-D4724F748707\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"890B8C3F-2E83-4D8C-BF9B-34B50E228822\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE86BD73-E951-44EB-A056-6D7E015B9088\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC12299-2A7B-493C-9585-560E9A110D15\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D6DC2-D8C6-4183-B95D-28CDEC1612FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1421F9C5-4A7C-476F-91FF-8108718B6E66\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8ACDC1F-60E7-4CA7-B242-25D3F975BECF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED6EA2F-3479-4145-82CF-B65FF24D8F36\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5720E0D-2B0E-4C44-AE80-9DBE88F57A93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"948A3F12-1761-4309-BC97-41F5068AA082\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F8FB3BE-77D7-44C7-B41A-4CB4A8766856\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA3F2B4A-5488-4AF1-A67F-BC137312ED93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D0055E-6FC5-42C2-BD7C-C13C54060A35\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83EDAEA8-7FAA-4D59-A5B9-62B260E5616D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5B6046-6377-471B-9639-D7F635B08190\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFCF1E00-1C43-486E-A64E-14F5BEF82362\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD8E261-E81F-4E09-8006-3D878EF61E0F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CAF5C54-CCFB-48E4-9384-A01867948BA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F0CC74-2523-4F85-B54C-C46455613064\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923B1623-2A33-497B-9238-3F4699E8E4AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"762B1BA4-69FC-4977-A0A8-9323660674A2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F249629F-1A5C-4C12-B956-552A2526A836\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C9AF097-09D6-4388-85EA-5954BD40D6B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"949533D3-6500-49BA-BE55-42E1506D3DD6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E5B561-02A2-4F79-8E28-E6A2B5C4F09D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBE7411-BD02-47A8-99BC-6B701B60A61B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96195B6B-C869-4DEF-AB5D-704B3D2FC76E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960pd-8tt-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD9CB655-99FB-42F3-A2BB-2A297B02EC2B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EECCA51-9F60-4FAC-9291-57411441B090\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"261D5183-1A3C-41ED-B196-BB0992FC5BF9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F114380-0BB6-414C-9854-77DCEBB6C9BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90C5B9D3-BF37-4146-A12E-193EA90C9BE6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D4845C2-9710-4CE8-81C3-D81037B7E66B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"379B1CA9-E800-41BD-B50B-5A4A6924E70F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C95186-A63C-40F6-8FAF-F7907BF04907\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F490DCE9-400E-4079-8409-71A17A2F50CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA7C5852-9BF9-47E5-A524-CC13894DF470\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CADA2DD-29BD-499E-9E25-C514ABD1AADC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B25DAE-4E68-404B-9E31-6EAE7C3DC105\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E83F7F5E-FDDD-4B8F-9814-149B076ABBE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92FB9DEA-7A55-411D-9702-CCD8FDB0C35D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D76048CE-58D5-4F67-8679-9C863D41F15E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7DC221-0BA1-4051-8643-1180C9EA682A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00CEE576-6C55-4BD4-B9F2-33E40483437B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"548B1FAF-946A-446B-8248-10BC194496B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3531645A-C4FB-4F6D-BBD2-D2852AA13509\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46984315-BF1E-4146-9960-328AEFA73D54\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"927762E0-6EE5-48C9-A7EE-8824BEBED08A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34F1CA06-D540-4CDB-BACB-5D528C830753\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F53A6E90-DA02-420A-B4A7-BC6D73C4B95A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B48837AB-F3DB-4246-90E2-6D8CD8BCF658\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8B888C8-9E13-4353-A8D8-96900726AE77\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA35A21E-9FB8-4694-B46D-E9381CB3D0C6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5F1600-30A5-4B31-A518-7B84BFE16883\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E03D0B73-B854-4385-9AD2-EAC7B041558D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"868B074C-2A14-4242-829A-202095A2CFF1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C990D9F-42F4-4722-AF6E-2933E5872C17\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C76EA7-969F-4A5F-B045-995C9445B415\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"567757A5-74CB-4FB6-9BDA-FA4F51A02998\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7794B87E-C70E-4DA3-9FC8-0170A0898557\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BEB1267-B23F-4001-B6E2-49894CF6EC38\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"845DDB35-3BB6-41CB-8304-340F444B6FE9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DAC629E-531F-4B99-9A07-15E113169FCA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A63DC2E4-83AB-487E-80D5-036723D930F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F543085-A2E2-4D7E-96EC-E9C6B964AED2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B64C85B3-D227-4BE7-BE7B-B05F86FE0583\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A153EAF3-C3DC-49C5-BBBA-7459850B1F57\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2000D5-E0C0-4488-8213-DC3079301050\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63AF0F69-A0E0-4AAC-B96B-1C1B59D76669\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179F9893-1C6B-468E-84F3-1CAAAE0A7671\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2970g-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"909A8DAE-5397-4B9B-8CDA-9B00712D6D6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2970g-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5193F631-B2A8-48D2-8DC7-AE2365FA2DEF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_2975:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B842CBE4-C180-4C72-AC61-E8FD522C902F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_12g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0BB74CE-1822-48B4-BB5B-131794A2BC14\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_12t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"351FBA8D-0CA3-49A9-B703-4CDF1E8DFAE3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_24_dc_smi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A19A8A62-4FCF-43D4-B266-CB00A8217449\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_24_emi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06DC2757-2107-477A-B4D1-C6D2419DFBD3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_24_fx_smi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D79CF40-2070-48E3-8135-F9893226D400\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_24_pwr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0E7A2E1-D356-470F-9D04-C743BE70B6E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_24_smi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5237B60-ACF2-473F-B822-27792A07CBC6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_48_emi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06C4C143-1CF6-4429-8BA0-7BE782032D30\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3550_48_smi:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA8BBAA-E651-4626-B31D-39EA4F04D6BF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560-12pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACEA494-E9DC-4F74-A252-259CC93E2741\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560-24ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB7E87CD-D6B7-4C7C-8627-BADB993A6D72\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"299DC29B-A5DC-4137-A95A-DCC85E9C59B2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560-48ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F482285C-D0C6-4BA3-8ACF-8461B91FDF82\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560-48ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E02CA96-ED16-410B-B51A-AA29B6E5667E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560-8pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61467987-235B-4D06-83D2-5DF5A51E4DE0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CCFC05-FE79-4804-AEED-00975FA49EE0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83DF239-FEFB-4573-8E41-498A5FC5EB16\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"333FA8D5-CEA5-4380-9D7C-1D72B4C98464\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E1CECF-0621-4004-9F6D-A2690BD18273\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D867770-2404-4F51-B120-F170927F65BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABDF97F-B703-40A0-B510-D73859139E87\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6637D9D4-14CE-48D2-90D4-19EF761F4193\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37BE430A-2446-4F29-88D8-D452D1022B02\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DF34EC-7BC3-44DC-B7B1-94162245CBBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06EEDB4F-BD1E-4914-AF79-64D42643683D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54BFFB02-7C84-4569-8129-74B84A5E7310\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F12A3197-0CE2-44F4-B310-DE8D4A72B00D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-12d-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0E46E6-C885-4184-8EA9-C7323A482A19\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-12d-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C7EA43F-8B3A-4636-B2BF-010E141C5710\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-12sd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D8ACB8-850C-4967-9D42-B8F162259FF3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-12sd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6E14120-1B3E-4A70-B875-4EE5B979711B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-24pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"188AE176-297C-4EB6-B048-B2743864A454\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-24pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74A09201-D66C-482D-950C-8B13B6BE69A3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-24td-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A9CFC23-8C33-43F9-B5DE-1FA4D7CB2A0B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-24td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DED5868-C623-48B7-8D04-BA5442B772BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-48pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB2C33A-A76D-4600-9A7E-F5E5C93FB71E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-48pd-ef:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCF53A7E-9933-4AE8-B5A5-7A4657DF17A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-48pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207E453A-F004-486A-A36A-4B120647E3F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-48pd-sf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5403BF-948F-493C-AB10-4C5239DDA975\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-48td-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF0EBD95-F0EB-4AE5-8C11-987C3DA5F6AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560e-48td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE73686A-5BDB-407B-99DB-2FC7107EA2ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560g-24ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15EFDB4-AB6B-4194-A8DA-47EFC5435A9E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560g-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A11434F-D3CD-4F88-888B-82262837B752\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560g-48ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABFA401A-8C8C-4DD8-9795-5F38977D2D90\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560g-48ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F56B4661-3FF4-4610-9DA9-8A2E87C059B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560v2-24dc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71BB343B-D016-46BB-8520-3F29A639C183\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560v2-24ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDEFF5D-40DC-410A-A781-44981DE9A3CF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560v2-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DCABE7A-783A-4E93-A762-520E653E161E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560v2-48ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D69F868-A419-48EA-8F99-A62CDEFA483D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560v2-48ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F070996F-B01C-42F3-9CE7-8ACAB89ACD70\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE1EAFFF-E36A-4BED-99BD-CB16977AF312\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBD36856-FCCB-4FBA-8728-A628CC4F5F2E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"134A9D8A-F8AC-4ACF-B558-91A4BF850425\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38E344D5-195B-4995-8616-A212A9AE1DBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A94A128-3DDD-44FD-A8DC-1ECBCC38C657\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C639B610-F43A-443D-B956-11BE7D34F41D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A74304E-855E-48DF-B8B1-4AB17C772115\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B4D477B-5EB7-4841-90DD-510DD655E288\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63BA8D6-5139-4033-AF52-03E7515A0050\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"721A029A-D747-42D9-B91E-A57D91182AC0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76E9961-7799-4B86-A05E-9BAD9F5E1BC6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBB035A6-64B4-4612-9CF6-2DB5EB85DF13\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3088538-99F0-48EE-95EB-608AAAC4D5C1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67CF3C12-93A6-4539-B3B7-C45B30FC39A3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7622A057-11DD-4BCC-BB3C-E97C5C86C21A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3568327-3C97-4F60-B8CD-BD46A4297D29\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F14E6769-44B6-4258-A8CF-8CDB0FA72F65\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0936B75B-CE98-4D30-8B95-D16569D7CAB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750-24fs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB109071-3FE4-4610-A9FF-2E7FEEF23E0C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750-24ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA1821EB-F2F9-4293-A92C-70C4627623D5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F123F41-1B78-45F2-98EE-3BF74CBD8112\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750-48ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8C6BCE4-6D58-4CA1-810A-4427E4235DB9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750-48ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D922479-A8F4-4419-A450-AE1A97C480DB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750_metro_24-ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0C15A3C-07C0-4385-BC5E-A7FB3D4B7B4D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750_metro_24-dc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6D306E3-6D0A-4B53-BD70-AE3D4CDD6DCC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-24pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27A4BFC9-BA3D-43FF-8E8B-CBA87D9FED4F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-24pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC8425C-509A-43BB-865E-EB5DDE007222\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-24td-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787CB67C-F5C1-4508-9817-CA25A5D12EEC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-24td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93B55075-2EB6-4511-9ADC-70F2314D7C98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-48pd-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"331FED4B-B014-4B2F-B2F4-A82CB18F60B5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-48pd-ef:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"098C6C37-0785-4224-92D5-A8E1AB4A24F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-48pd-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91443C6-40C3-4EB1-93C5-1F25E99C7346\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-48pd-sf:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A018451F-D2C4-40C1-A277-4D7A873F31F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-48td-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A640842-EC2A-4603-BFC0-3F42EF01D3D9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750e-48td-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C71306-AA1F-4CC0-8E36-57F5EE374414\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-12s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5C6319-C780-4C9D-971D-762BE23F3D92\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-12s-sd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9609F0A2-E891-46C8-A293-C4EC5093DA2D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-16td:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEB2A727-4B95-4B2A-9B0F-90259330BFDD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-24ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9601405-1541-4C8F-B388-85C73765D75C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-24t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D063818B-56EE-415B-89EF-C6C707637269\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A7CF840-3C7B-4765-AFBE-84AA11E91956\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-24ts-1u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB69810E-900E-45BC-BD43-B7CA1DE722D3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-48ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA05EEE-9039-430F-92DF-B3E4A52A18F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750g-48ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A3CDFEB-8B08-4912-896A-72F1BAFD47A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750v2-24fs:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AB18A03-6D49-489B-9F27-DF19D3AC0DAB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750v2-24ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A75271-D05C-4C91-A99A-C03BE49C9110\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750v2-24ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45931DC1-552D-44F2-9327-8490A9B45BF9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750v2-48ps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FED46E2B-6398-435C-ABC0-7C6B226FB55D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750v2-48ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA5D6BBD-C589-44DD-9C14-12CBCC716610\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17A2728-7627-4550-80D3-4EC228606A7B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6540A964-656D-48E2-B7D3-3F4D4B38A785\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05BA9762-0C59-4841-820C-4D30EB30E04F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB4DCCA-EEF2-4999-A977-89046D934292\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0859DCB-7572-4E78-A166-766FEF0BDFD6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"072B2446-904F-4614-B4A6-68396644B9AE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E537A35E-F4C1-4A7D-AACF-E80D4E2B3305\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DD7944-66A9-4611-85DE-5F42848ACDB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"944895AA-9E92-45B7-8A31-AA148AF9346B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAEBB446-A86D-4C06-8054-B6C1C0ED7776\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C6551B6-85FB-4945-84CA-0E421FE53C3B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0E27272-07F1-4424-A8B9-5FDAD67DB68A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC60521F-DC3F-46F9-BBC9-4C108D17E7F8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F799EEF-3F87-456D-9152-7D44C08D8938\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD11F079-2F52-4611-B75E-33B2738501E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43534D4E-3115-4128-8214-06A52273B69A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"539BBD1B-3E1E-4CB1-B016-F20C25C46B9F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4947A20-7C21-4071-843B-EB87A77A8DC0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4884D54A-E24C-4382-825C-958FBD56C060\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2A6324C-5812-44E9-AC97-0511349E27B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"266C504F-0C75-428A-8F67-863F3AD31368\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E209DEC3-9A4E-40CF-B19C-B71FF76D29E1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3595C29-C1B0-49D5-AF3A-52DACDD3C725\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E72C5777-7D8D-41E7-BE3A-4DC516BD050B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7FA3259-48DD-41BD-957D-4A98AE99754E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBFCA2CC-2F4A-4489-A3D6-3174350EB879\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_iv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2EEF9CF-19AE-4A21-88D5-06A45B972651\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D817D90-A7BA-4CA8-BA5C-FA82CA31F620\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EF8023F-C8D7-4B98-9472-6EC365A19D48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15B137CB-C12C-47AF-9AF5-05C1B2086351\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAD2F469-8E06-43D3-B458-0437352D5F47\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus-ts:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73E711BA-BBF0-4E1A-B84C-2449E4CB8BA3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_iv:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED3981C-C68B-4697-9AB3-A9BD6249B1E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00A7E1F3-AB1E-452C-9FA4-DD24680F65D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v-10ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CD713C-BF36-4BCA-8BC6-55418E038136\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500_supervisor_ii-plus-10ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C402FF8B-6EA1-406B-9DB7-E2D8939CFFFF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4500e_supervisor_engine_8-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C30EF3-A63D-4022-A032-77C376AD9DA4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A39CB5-8F97-4030-B9CD-D28BF5C811F6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4928_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46C36E5D-F471-4002-854B-93DFFFEF471C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4948:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12B41FC2-D482-4CF7-ADAC-720CCD4C5648\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4948_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40C98C14-96EB-4AF5-9090-842234BB0855\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4948e-f_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E725C592-4ADF-4C06-958D-4BC725A0EA19\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_4948e_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EC2EE0-F838-497D-92FD-1FD830564811\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4EBA036-A69E-40FE-B8A2-6D99C0AB9F35\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3030:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2937EE-0566-465E-9AE7-0BC97D02676E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3032:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0527FC9C-08FB-4AA5-AD59-9EEFBEFF6F53\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3040:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0799AF-3CBB-4749-9314-9DF3A93C7D44\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEDE0913-7E59-4741-B0D9-EC6C90C5E21C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"808DEBC5-0249-491C-9607-9263F781BCDC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_blade_switch_3130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F15AF91D-A937-4F0B-88F9-B0EDEE7CE9EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEB558C8-826C-486A-B7CF-1E0EC0A7A106\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC95D92-296F-4671-9191-29CED1C38070\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_switch_module_3012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B334CAF-50A9-4214-AA09-71617C1235A3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_switch_module_3110:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E65AA2DC-C7FC-48F9-B481-920793CCD004\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_switch_module_3110x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB7D6BCA-376D-40DE-88AF-358A23AEB25C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BC6B538-A151-4C6F-AB66-2592335C9412\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FBF6124-87FE-4062-9774-3D7B314852FC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"172A45CB-9976-4743-B342-460BDF1237E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D354D47-434F-48DB-9415-4B6B650485BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"573BD04B-6601-4F8A-BA6E-3B5769002B6E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"230828B3-36C5-4183-824F-A0D2C8811AF6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF0961D3-060C-415F-8721-6035BD813EC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:enhanced_layer_2\\\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9861A7C6-9AC2-4B84-B86E-56BEA7A84774\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:enhanced_layer_2_etherswitch_service_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1526DA59-4077-44CF-A42C-56EC36EFFA76\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:gigabit_ethernet_switch_module_\\\\(cgesm\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B0E5E0-92ED-4AFF-BF81-A48AA6E9DC51\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0071F74-A0D3-45FE-8F58-F2F4D64AA0A1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"095B70C4-0551-42BB-88B3-602DA9AE7C18\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45EC8751-C17A-4F75-B88A-5778E2496462\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C52B1C4-A42A-42AC-ABB3-F2B289F47B8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19155C80-7068-4E3A-88EA-9F90C1B14ABC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64234EBB-B47D-4B2A-A46D-2AA234E0ECC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4975AA-722F-43AB-A762-88D5A00FC7EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A76C5B3B-03FF-47C0-88B1-A5AB932D02DF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA64B716-2D79-4B4E-8007-C4575AA68E8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"763B3611-7EE1-455F-96C7-0A2E83D22AF1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F2D391F-27DE-48E6-9AA3-36A8C672A6AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DE4E5E0-F7E8-43BC-9AFC-159D6B2B4344\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BBAC7B1-693D-40F8-90BB-6290E3DCD5A2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AF8063-E30D-411B-9CEC-25E336E5E4E4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A359421-6CD3-43E0-94FC-20C76756C7EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0F9DF32-3E0B-47FA-912A-FCE948BA768E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-5000-12s12p-10g_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDCB2A84-541D-44A6-ABDA-67A3A6DFC80F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie-5000-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE187051-5443-44D9-A0F8-2D351D2E4372\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F63F4C5-7784-4B83-B454-E9731210920B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A89AEB2-8690-4389-A896-10430A690243\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D464787-DC79-474F-84CA-2B4AD209C21F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAFC9C43-2BAE-4F4E-B084-F9FB54EEF6D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6EAC97A-E3FC-490F-9D02-8CA8FA87D6DA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B0F4029-9E79-4ADE-A851-72F18635A492\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C224EE6-1436-4F11-94A8-4CC96A5001F5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A4E545-9F74-40CC-8212-11798AF8D611\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D817838-BDA5-4ED8-8EC9-6C5F4C3C9C5B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"842352DA-0E9B-4520-9B32-C766BEA7BF9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66521F18-9C3D-4323-AFC1-5A4ABC476084\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E62F6C8-1B96-4093-8E54-05B0086842A4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5D3398-D9AE-4447-8D21-03853B41594E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27364811-6885-49B9-ADE7-55CD69105EC7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77F72F96-3272-432C-A8B8-781C95D65A5E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036F4AFB-CBAA-4155-AC79-B2DC38E37613\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9725FF2E-25DB-42EB-B504-B169392D6C31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"683C46D6-6DBD-4C99-A577-4CE624DEDD8B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA132B36-55CB-492A-8B85-715201E7712F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_2000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ABD77B1-BF1E-4748-A965-08D19E323D78\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_3000-4tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED7DA136-4146-439B-A27B-013F353382B7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:ie_3000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3374CF70-3F34-448D-ABA0-EEF1C79DC4BA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:me_4924-10ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8D304B8-89EB-45DE-BEA3-564028842BB9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:rf_gateway_10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18233C3F-7F08-4E97-BEC1-30B336E92511\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:sm-x_layer_2\\\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F16053-2839-4A59-B2A7-7E642BD26BE7\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/96960\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/97391\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038059\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41872/\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/41874/\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/bid/96960\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/97391\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038059\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/41872/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/41874/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.exploit-db.com/exploits/41872/\", \"name\": \"41872\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41874/\", \"name\": \"41874\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/97391\", \"name\": \"97391\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/96960\", \"name\": \"96960\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1038059\", \"name\": \"1038059\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T14:39:41.294Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-3881\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-08T16:05:33.301931Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-03-25\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-3881\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-08T16:07:18.170Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Cisco IOS and IOS XE Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"Cisco IOS and IOS XE Software\"}]}], \"datePublic\": \"2017-03-17T00:00:00\", \"references\": [{\"url\": \"https://www.exploit-db.com/exploits/41872/\", \"name\": \"41872\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"https://www.exploit-db.com/exploits/41874/\", \"name\": \"41874\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://www.securityfocus.com/bid/97391\", \"name\": \"97391\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"http://www.securityfocus.com/bid/96960\", \"name\": \"96960\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securitytracker.com/id/1038059\", \"name\": \"1038059\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Remote Code Execution Vulnerability\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2017-08-15T09:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Cisco IOS and IOS XE Software\"}]}, \"product_name\": \"Cisco IOS and IOS XE Software\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.exploit-db.com/exploits/41872/\", \"name\": \"41872\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"https://www.exploit-db.com/exploits/41874/\", \"name\": \"41874\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://www.securityfocus.com/bid/97391\", \"name\": \"97391\", \"refsource\": \"BID\"}, {\"url\": \"http://www.securityfocus.com/bid/96960\", \"name\": \"96960\", \"refsource\": \"BID\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\", \"name\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securitytracker.com/id/1038059\", \"name\": \"1038059\", \"refsource\": \"SECTRACK\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Remote Code Execution Vulnerability\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-3881\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@cisco.com\"}}}}", "cveMetadata": "{\"cveId\": \"CVE-2017-3881\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-15T18:00:24.703Z\", \"dateReserved\": \"2016-12-21T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2017-03-17T22:00:00\", \"assignerShortName\": \"cisco\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
fkie_cve-2017-3881
Vulnerability from fkie_nvd
{ "cisaActionDue": "2022-04-15", "cisaExploitAdd": "2022-03-25", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Cisco IOS and IOS XE Remote Code Execution Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F6546FC-F719-4FC2-ACB1-E558687769EC", "versionEndIncluding": "15.1\\(3\\)svs", "versionStartIncluding": "12.2s", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "3588833B-3B46-4968-8710-C244AB2C7BB6", "versionEndIncluding": "3.9e", "versionStartIncluding": "3.2sg", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7301CDF-48BB-4E4B-862A-28B2A742D67B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*", "matchCriteriaId": "409044EC-4B25-4C7F-B20F-26CD79EEE49F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4533989C-CCDC-464A-AB68-29A752FA0759", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "487A1994-9FF2-4F15-9F38-C5B5218221DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DD8AF-D938-4E20-89FE-E34F54EFF2F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A546FA79-654C-4CE9-9F6B-8F49255500F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "14E8F619-55BA-45E4-B75E-A64E9452F7AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CE5551-B4ED-4554-9012-09A7CF7A5D88", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "69384D20-0270-4CD5-95D0-7EA93CBDE78E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B07F566D-BCAC-44EC-AB37-6FA870D4AEDA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "63946130-E5AB-476A-98AB-3BB49B7EBD1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A9D08FF-DD21-4AAE-ABB5-561CD80D52AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C594EB3-FECD-4E88-8945-B9CD5EF6CA66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "11E79AB1-9C7D-4E72-8038-60B62D3F771B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "784EF30F-54A7-46D8-B9E5-8CA2883563DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E6061A1-706D-4129-B99B-318EACB7AB3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C3FFD5C-1AC5-4D1D-9A66-9167F72E4C6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF8E6604-7F57-4147-A4D9-7A37B415D794", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E28218B4-23E0-4319-BE93-F09FB552F7D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "042A0AA5-FC1B-451E-92A4-1E3C309B0C00", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D63435-4DC4-4597-AADE-89BCF470B109", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "66D51A01-A213-4BB1-84C5-7D29D28A81CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D562C004-24DE-4B9D-A323-C3D2EA32A173", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D86BAF5-681F-4867-A657-D4724F748707", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "890B8C3F-2E83-4D8C-BF9B-34B50E228822", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE86BD73-E951-44EB-A056-6D7E015B9088", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC12299-2A7B-493C-9585-560E9A110D15", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "190D6DC2-D8C6-4183-B95D-28CDEC1612FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "1421F9C5-4A7C-476F-91FF-8108718B6E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8ACDC1F-60E7-4CA7-B242-25D3F975BECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FED6EA2F-3479-4145-82CF-B65FF24D8F36", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5720E0D-2B0E-4C44-AE80-9DBE88F57A93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "948A3F12-1761-4309-BC97-41F5068AA082", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F8FB3BE-77D7-44C7-B41A-4CB4A8766856", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA3F2B4A-5488-4AF1-A67F-BC137312ED93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "57D0055E-6FC5-42C2-BD7C-C13C54060A35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "83EDAEA8-7FAA-4D59-A5B9-62B260E5616D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD8E261-E81F-4E09-8006-3D878EF61E0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CAF5C54-CCFB-48E4-9384-A01867948BA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9F0CC74-2523-4F85-B54C-C46455613064", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "923B1623-2A33-497B-9238-3F4699E8E4AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "762B1BA4-69FC-4977-A0A8-9323660674A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "F249629F-1A5C-4C12-B956-552A2526A836", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C9AF097-09D6-4388-85EA-5954BD40D6B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "949533D3-6500-49BA-BE55-42E1506D3DD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E5B561-02A2-4F79-8E28-E6A2B5C4F09D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EBE7411-BD02-47A8-99BC-6B701B60A61B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "96195B6B-C869-4DEF-AB5D-704B3D2FC76E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960pd-8tt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD9CB655-99FB-42F3-A2BB-2A297B02EC2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EECCA51-9F60-4FAC-9291-57411441B090", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "261D5183-1A3C-41ED-B196-BB0992FC5BF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F114380-0BB6-414C-9854-77DCEBB6C9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "90C5B9D3-BF37-4146-A12E-193EA90C9BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D4845C2-9710-4CE8-81C3-D81037B7E66B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "379B1CA9-E800-41BD-B50B-5A4A6924E70F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C95186-A63C-40F6-8FAF-F7907BF04907", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F490DCE9-400E-4079-8409-71A17A2F50CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7C5852-9BF9-47E5-A524-CC13894DF470", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CADA2DD-29BD-499E-9E25-C514ABD1AADC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "24B25DAE-4E68-404B-9E31-6EAE7C3DC105", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E83F7F5E-FDDD-4B8F-9814-149B076ABBE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "92FB9DEA-7A55-411D-9702-CCD8FDB0C35D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2970g-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "909A8DAE-5397-4B9B-8CDA-9B00712D6D6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2970g-24ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "5193F631-B2A8-48D2-8DC7-AE2365FA2DEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2975:-:*:*:*:*:*:*:*", "matchCriteriaId": "B842CBE4-C180-4C72-AC61-E8FD522C902F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_12g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0BB74CE-1822-48B4-BB5B-131794A2BC14", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_12t:-:*:*:*:*:*:*:*", "matchCriteriaId": "351FBA8D-0CA3-49A9-B703-4CDF1E8DFAE3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_dc_smi:-:*:*:*:*:*:*:*", "matchCriteriaId": "A19A8A62-4FCF-43D4-B266-CB00A8217449", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_emi:-:*:*:*:*:*:*:*", "matchCriteriaId": "06DC2757-2107-477A-B4D1-C6D2419DFBD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_fx_smi:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D79CF40-2070-48E3-8135-F9893226D400", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_pwr:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0E7A2E1-D356-470F-9D04-C743BE70B6E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_smi:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5237B60-ACF2-473F-B822-27792A07CBC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_48_emi:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C4C143-1CF6-4429-8BA0-7BE782032D30", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3550_48_smi:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FA8BBAA-E651-4626-B31D-39EA4F04D6BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-12pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "DACEA494-E9DC-4F74-A252-259CC93E2741", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-24ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7E87CD-D6B7-4C7C-8627-BADB993A6D72", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-24ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "299DC29B-A5DC-4137-A95A-DCC85E9C59B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-48ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "F482285C-D0C6-4BA3-8ACF-8461B91FDF82", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-48ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E02CA96-ED16-410B-B51A-AA29B6E5667E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560-8pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "61467987-235B-4D06-83D2-5DF5A51E4DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CCFC05-FE79-4804-AEED-00975FA49EE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A83DF239-FEFB-4573-8E41-498A5FC5EB16", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "333FA8D5-CEA5-4380-9D7C-1D72B4C98464", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "87E1CECF-0621-4004-9F6D-A2690BD18273", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D867770-2404-4F51-B120-F170927F65BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12d-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A0E46E6-C885-4184-8EA9-C7323A482A19", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C7EA43F-8B3A-4636-B2BF-010E141C5710", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12sd-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "49D8ACB8-850C-4967-9D42-B8F162259FF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12sd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6E14120-1B3E-4A70-B875-4EE5B979711B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24pd-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "188AE176-297C-4EB6-B048-B2743864A454", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24pd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "74A09201-D66C-482D-950C-8B13B6BE69A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24td-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A9CFC23-8C33-43F9-B5DE-1FA4D7CB2A0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24td-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DED5868-C623-48B7-8D04-BA5442B772BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADB2C33A-A76D-4600-9A7E-F5E5C93FB71E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-ef:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCF53A7E-9933-4AE8-B5A5-7A4657DF17A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "207E453A-F004-486A-A36A-4B120647E3F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5403BF-948F-493C-AB10-4C5239DDA975", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48td-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF0EBD95-F0EB-4AE5-8C11-987C3DA5F6AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48td-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE73686A-5BDB-407B-99DB-2FC7107EA2ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560g-24ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "B15EFDB4-AB6B-4194-A8DA-47EFC5435A9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560g-24ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A11434F-D3CD-4F88-888B-82262837B752", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560g-48ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABFA401A-8C8C-4DD8-9795-5F38977D2D90", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560g-48ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "F56B4661-3FF4-4610-9DA9-8A2E87C059B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "71BB343B-D016-46BB-8520-3F29A639C183", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BDEFF5D-40DC-410A-A781-44981DE9A3CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DCABE7A-783A-4E93-A762-520E653E161E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-48ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D69F868-A419-48EA-8F99-A62CDEFA483D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-48ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "F070996F-B01C-42F3-9CE7-8ACAB89ACD70", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE1EAFFF-E36A-4BED-99BD-CB16977AF312", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBD36856-FCCB-4FBA-8728-A628CC4F5F2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "134A9D8A-F8AC-4ACF-B558-91A4BF850425", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "38E344D5-195B-4995-8616-A212A9AE1DBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A94A128-3DDD-44FD-A8DC-1ECBCC38C657", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C639B610-F43A-443D-B956-11BE7D34F41D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A74304E-855E-48DF-B8B1-4AB17C772115", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B4D477B-5EB7-4841-90DD-510DD655E288", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B63BA8D6-5139-4033-AF52-03E7515A0050", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "721A029A-D747-42D9-B91E-A57D91182AC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76E9961-7799-4B86-A05E-9BAD9F5E1BC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBB035A6-64B4-4612-9CF6-2DB5EB85DF13", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3088538-99F0-48EE-95EB-608AAAC4D5C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CF3C12-93A6-4539-B3B7-C45B30FC39A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7622A057-11DD-4BCC-BB3C-E97C5C86C21A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3568327-3C97-4F60-B8CD-BD46A4297D29", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E6769-44B6-4258-A8CF-8CDB0FA72F65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0936B75B-CE98-4D30-8B95-D16569D7CAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-24fs:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB109071-3FE4-4610-A9FF-2E7FEEF23E0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-24ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1821EB-F2F9-4293-A92C-70C4627623D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-24ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F123F41-1B78-45F2-98EE-3BF74CBD8112", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-48ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8C6BCE4-6D58-4CA1-810A-4427E4235DB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750-48ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D922479-A8F4-4419-A450-AE1A97C480DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro_24-ac:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0C15A3C-07C0-4385-BC5E-A7FB3D4B7B4D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro_24-dc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D306E3-6D0A-4B53-BD70-AE3D4CDD6DCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24pd-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "27A4BFC9-BA3D-43FF-8E8B-CBA87D9FED4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24pd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAC8425C-509A-43BB-865E-EB5DDE007222", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24td-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "787CB67C-F5C1-4508-9817-CA25A5D12EEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24td-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B55075-2EB6-4511-9ADC-70F2314D7C98", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "331FED4B-B014-4B2F-B2F4-A82CB18F60B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-ef:-:*:*:*:*:*:*:*", "matchCriteriaId": "098C6C37-0785-4224-92D5-A8E1AB4A24F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B91443C6-40C3-4EB1-93C5-1F25E99C7346", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-sf:-:*:*:*:*:*:*:*", "matchCriteriaId": "A018451F-D2C4-40C1-A277-4D7A873F31F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48td-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A640842-EC2A-4603-BFC0-3F42EF01D3D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48td-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2C71306-AA1F-4CC0-8E36-57F5EE374414", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-12s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F5C6319-C780-4C9D-971D-762BE23F3D92", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-12s-sd:-:*:*:*:*:*:*:*", "matchCriteriaId": "9609F0A2-E891-46C8-A293-C4EC5093DA2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-16td:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB2A727-4B95-4B2A-9B0F-90259330BFDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9601405-1541-4C8F-B388-85C73765D75C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D063818B-56EE-415B-89EF-C6C707637269", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7CF840-3C7B-4765-AFBE-84AA11E91956", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ts-1u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB69810E-900E-45BC-BD43-B7CA1DE722D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-48ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA05EEE-9039-430F-92DF-B3E4A52A18F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750g-48ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A3CDFEB-8B08-4912-896A-72F1BAFD47A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24fs:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AB18A03-6D49-489B-9F27-DF19D3AC0DAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "13A75271-D05C-4C91-A99A-C03BE49C9110", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "45931DC1-552D-44F2-9327-8490A9B45BF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-48ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "FED46E2B-6398-435C-ABC0-7C6B226FB55D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-48ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA5D6BBD-C589-44DD-9C14-12CBCC716610", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F17A2728-7627-4550-80D3-4EC228606A7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6540A964-656D-48E2-B7D3-3F4D4B38A785", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "05BA9762-0C59-4841-820C-4D30EB30E04F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CB4DCCA-EEF2-4999-A977-89046D934292", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0859DCB-7572-4E78-A166-766FEF0BDFD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "072B2446-904F-4614-B4A6-68396644B9AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E537A35E-F4C1-4A7D-AACF-E80D4E2B3305", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2DD7944-66A9-4611-85DE-5F42848ACDB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "944895AA-9E92-45B7-8A31-AA148AF9346B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAEBB446-A86D-4C06-8054-B6C1C0ED7776", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6551B6-85FB-4945-84CA-0E421FE53C3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0E27272-07F1-4424-A8B9-5FDAD67DB68A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC60521F-DC3F-46F9-BBC9-4C108D17E7F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F799EEF-3F87-456D-9152-7D44C08D8938", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD11F079-2F52-4611-B75E-33B2738501E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "43534D4E-3115-4128-8214-06A52273B69A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "539BBD1B-3E1E-4CB1-B016-F20C25C46B9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4947A20-7C21-4071-843B-EB87A77A8DC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4884D54A-E24C-4382-825C-958FBD56C060", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2A6324C-5812-44E9-AC97-0511349E27B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C504F-0C75-428A-8F67-863F3AD31368", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E209DEC3-9A4E-40CF-B19C-B71FF76D29E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3595C29-C1B0-49D5-AF3A-52DACDD3C725", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E72C5777-7D8D-41E7-BE3A-4DC516BD050B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7FA3259-48DD-41BD-957D-4A98AE99754E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_i:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBFCA2CC-2F4A-4489-A3D6-3174350EB879", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_iv:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2EEF9CF-19AE-4A21-88D5-06A45B972651", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_v:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D817D90-A7BA-4CA8-BA5C-FA82CA31F620", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF8023F-C8D7-4B98-9472-6EC365A19D48", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "15B137CB-C12C-47AF-9AF5-05C1B2086351", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAD2F469-8E06-43D3-B458-0437352D5F47", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "73E711BA-BBF0-4E1A-B84C-2449E4CB8BA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_iv:-:*:*:*:*:*:*:*", "matchCriteriaId": "EED3981C-C68B-4697-9AB3-A9BD6249B1E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v:-:*:*:*:*:*:*:*", "matchCriteriaId": "00A7E1F3-AB1E-452C-9FA4-DD24680F65D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v-10ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "24CD713C-BF36-4BCA-8BC6-55418E038136", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_ii-plus-10ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "C402FF8B-6EA1-406B-9DB7-E2D8939CFFFF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500e_supervisor_engine_8-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1C30EF3-A63D-4022-A032-77C376AD9DA4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*", "matchCriteriaId": "21A39CB5-8F97-4030-B9CD-D28BF5C811F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4928_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C36E5D-F471-4002-854B-93DFFFEF471C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948:-:*:*:*:*:*:*:*", "matchCriteriaId": "12B41FC2-D482-4CF7-ADAC-720CCD4C5648", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "40C98C14-96EB-4AF5-9090-842234BB0855", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948e-f_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "E725C592-4ADF-4C06-958D-4BC725A0EA19", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948e_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EC2EE0-F838-497D-92FD-1FD830564811", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4EBA036-A69E-40FE-B8A2-6D99C0AB9F35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3030:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F2937EE-0566-465E-9AE7-0BC97D02676E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3032:-:*:*:*:*:*:*:*", "matchCriteriaId": "0527FC9C-08FB-4AA5-AD59-9EEFBEFF6F53", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3040:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB0799AF-3CBB-4749-9314-9DF3A93C7D44", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEDE0913-7E59-4741-B0D9-EC6C90C5E21C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*", "matchCriteriaId": "808DEBC5-0249-491C-9607-9263F781BCDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3130:-:*:*:*:*:*:*:*", "matchCriteriaId": "F15AF91D-A937-4F0B-88F9-B0EDEE7CE9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEB558C8-826C-486A-B7CF-1E0EC0A7A106", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FC95D92-296F-4671-9191-29CED1C38070", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3012:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B334CAF-50A9-4214-AA09-71617C1235A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3110:-:*:*:*:*:*:*:*", "matchCriteriaId": "E65AA2DC-C7FC-48F9-B481-920793CCD004", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3110x:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB7D6BCA-376D-40DE-88AF-358A23AEB25C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC6B538-A151-4C6F-AB66-2592335C9412", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FBF6124-87FE-4062-9774-3D7B314852FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*", "matchCriteriaId": "172A45CB-9976-4743-B342-460BDF1237E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D354D47-434F-48DB-9415-4B6B650485BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*", "matchCriteriaId": "573BD04B-6601-4F8A-BA6E-3B5769002B6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "230828B3-36C5-4183-824F-A0D2C8811AF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF0961D3-060C-415F-8721-6035BD813EC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:enhanced_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "9861A7C6-9AC2-4B84-B86E-56BEA7A84774", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:enhanced_layer_2_etherswitch_service_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "1526DA59-4077-44CF-A42C-56EC36EFFA76", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:gigabit_ethernet_switch_module_\\(cgesm\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "30B0E5E0-92ED-4AFF-BF81-A48AA6E9DC51", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0071F74-A0D3-45FE-8F58-F2F4D64AA0A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "095B70C4-0551-42BB-88B3-602DA9AE7C18", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "45EC8751-C17A-4F75-B88A-5778E2496462", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C52B1C4-A42A-42AC-ABB3-F2B289F47B8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "19155C80-7068-4E3A-88EA-9F90C1B14ABC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "64234EBB-B47D-4B2A-A46D-2AA234E0ECC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C4975AA-722F-43AB-A762-88D5A00FC7EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "A76C5B3B-03FF-47C0-88B1-A5AB932D02DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA64B716-2D79-4B4E-8007-C4575AA68E8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "763B3611-7EE1-455F-96C7-0A2E83D22AF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F2D391F-27DE-48E6-9AA3-36A8C672A6AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DE4E5E0-F7E8-43BC-9AFC-159D6B2B4344", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BBAC7B1-693D-40F8-90BB-6290E3DCD5A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "43AF8063-E30D-411B-9CEC-25E336E5E4E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A359421-6CD3-43E0-94FC-20C76756C7EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0F9DF32-3E0B-47FA-912A-FCE948BA768E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-5000-12s12p-10g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDCB2A84-541D-44A6-ABDA-67A3A6DFC80F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-5000-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE187051-5443-44D9-A0F8-2D351D2E4372", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F63F4C5-7784-4B83-B454-E9731210920B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A89AEB2-8690-4389-A896-10430A690243", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D464787-DC79-474F-84CA-2B4AD209C21F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAFC9C43-2BAE-4F4E-B084-F9FB54EEF6D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6EAC97A-E3FC-490F-9D02-8CA8FA87D6DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B0F4029-9E79-4ADE-A851-72F18635A492", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C224EE6-1436-4F11-94A8-4CC96A5001F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A4E545-9F74-40CC-8212-11798AF8D611", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D817838-BDA5-4ED8-8EC9-6C5F4C3C9C5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "842352DA-0E9B-4520-9B32-C766BEA7BF9C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "66521F18-9C3D-4323-AFC1-5A4ABC476084", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E62F6C8-1B96-4093-8E54-05B0086842A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D5D3398-D9AE-4447-8D21-03853B41594E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "27364811-6885-49B9-ADE7-55CD69105EC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "77F72F96-3272-432C-A8B8-781C95D65A5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "036F4AFB-CBAA-4155-AC79-B2DC38E37613", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "9725FF2E-25DB-42EB-B504-B169392D6C31", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "683C46D6-6DBD-4C99-A577-4CE624DEDD8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA132B36-55CB-492A-8B85-715201E7712F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ABD77B1-BF1E-4748-A965-08D19E323D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_3000-4tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED7DA136-4146-439B-A27B-013F353382B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_3000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "3374CF70-3F34-448D-ABA0-EEF1C79DC4BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:me_4924-10ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8D304B8-89EB-45DE-BEA3-564028842BB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:rf_gateway_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "18233C3F-7F08-4E97-BEC1-30B336E92511", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:sm-x_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "21F16053-2839-4A59-B2A7-7E642BD26BE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893." }, { "lang": "es", "value": "Una vulnerabilidad en el c\u00f3digo de procesamiento de Cisco Cluster Management Protocol (CMP) en Cisco IOS y Cisco IOS XE Software podr\u00eda permitir a un atacante remoto no autenticado provocar una recarga de un dispositivo afectado o ejecutar c\u00f3digo remotamente con privilegios elevados. El Cluster Management Protocol utiliza internamente Telnet como un protocolo de se\u00f1alizaci\u00f3n y comando entre los miembros del cl\u00faster. La vulnerabilidad se debe a la combinaci\u00f3n de dos factores: (1) la imposibilidad de restringir el uso de las opciones Telnet espec\u00edficas de CMP s\u00f3lo a las comunicaciones locales internas entre los miembros del cl\u00faster y, en cambio, aceptar y procesar dichas opciones a trav\u00e9s de cualquier conexi\u00f3n Telnet con un dispositivo afectado; y (2) el procesamiento incorrecto de las opciones malformadas de Telnet espec\u00edficas de CMP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando opciones malformadas de Telnet espec\u00edficas de CMP mientras establec\u00eda una sesi\u00f3n Telnet con un dispositivo Cisco afectado configurado para aceptar conexiones Telnet. Un exploit podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario y obtener el control total del dispositivo o provocar una recarga del dispositivo afectado. Esto afecta a los conmutadores Catalyst, los conmutadores Embedded Service 2020, el m\u00f3dulo de servicio Enhanced Layer 2 EtherSwitch, el m\u00f3dulo de servicio Enhanced Layer 2/3 EtherSwitch, el conmutador Gigabit Ethernet (CGESM) para HP, los conmutadores IE Industrial Ethernet, el conmutador ME 4924-10GE, la pasarela RF 10 , y m\u00f3dulo de servicio EtherSwitch de capa 2/3 SM-X. ID de errores de Cisco: CSCvd48893." } ], "id": "CVE-2017-3881", "lastModified": "2025-01-27T21:04:25.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-17T22:59:00.640", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96960" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97391" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038059" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "source": "psirt@cisco.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41872/" }, { "source": "psirt@cisco.com", "tags": [ "Broken Link" ], "url": "https://www.exploit-db.com/exploits/41874/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41872/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://www.exploit-db.com/exploits/41874/" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ICSA-17-094-03
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Rockwell Automation", "summary": "reporting this vulnerability" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Remotely exploitable/low skill level to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Milwaukee, Wisconsin", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-17-094-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-094-03.json" }, { "category": "self", "summary": "ICS Advisory ICSA-17-094-03 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-094-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-094-03" } ], "title": "Rockwell Automation Allen-Bradley Stratix and Allen-Bradley ArmorStratix", "tracking": { "current_release_date": "2017-04-04T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-17-094-03", "initial_release_date": "2017-04-04T00:00:00.000000Z", "revision_history": [ { "date": "2017-04-04T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-17-094-03 Rockwell Automation Allen-Bradley Stratix, Allen-Bradley ArmorStratix" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(5)EA.fc4", "product": { "name": "Allen-Bradley Stratix 8000 Modular Managed Industrial Ethernet Switches: All Versions 15.2(5)EA.fc4 and earlier", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 8000 Modular Managed Industrial Ethernet Switches" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(4a)EA5", "product": { "name": "Allen-Bradley Stratix 8300 Modular Managed Industrial Ethernet Switches: All Versions 15.2(4a)EA5 and earlier", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 8300 Modular Managed Industrial Ethernet Switches" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(5)EA.fc4", "product": { "name": "Allen-Bradley Stratix 5400 Industrial Ethernet Switches: All Versions 15.2(5)EA.fc4 and earlier", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 5400 Industrial Ethernet Switches" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(5)EA.fc4", "product": { "name": "Allen-Bradley Stratix 5410 Industrial Distribution Switches: All Versions 15.2(5)EA.fc4 and earlier", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 5410 Industrial Distribution Switches" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(5)EA.fc4", "product": { "name": "Allen-Bradley Stratix 5700 and ArmorStratix 5700 Industrial Managed Ethernet Switches: All Versions 15.2(5)EA.fc4 and earlier", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 5700 and ArmorStratix 5700 Industrial Managed Ethernet Switches" } ], "category": "vendor", "name": "Rockwell Automation" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3881", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An unauthorized remote attacker may be able to establish a Telnet session with a target device by sending malformed CMP-specific Telnet messages. Incorrect processing of these messages may cause the device to reload or to allow the attacker to execute arbitrary code with elevated privileges.CVE-2017-3881 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3881" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Rockwell Automation has provided interim compensating controls for Allen-Bradley Stratix and ArmorStratix switches to help reduce the risk of exploitation of the vulnerability identified in the Cisco Cluster Management Protocol (CMP) processing code used in the Cisco IOS and Cisco IOS XE software. Allen-Bradley Stratix and ArmorStratix products contain the affected versions of the Cisco IOS and IOS XE software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Disable the Telnet protocol as an allowed protocol for incoming connections on affected devices to diminish the network-based vector of attack. For information on how to disable Telnet via Command Line Interface, please see Knowledgebase Article ID 1040270, which is available at the following location (with a valid account):", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1040270" }, { "category": "mitigation", "details": "If a user is unable or unwilling to disable Telnet, then implementing infrastructure access control lists (iACLs) can reduce the attack service. For information on how to implement iACLs, please see Knowledgebase Article ID 1040270.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Cisco has created two Snort rules (SIDs), 41909 and 41910, to detect exploits associated with this vulnerability.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Rockwell Automation security advisory, Stratix CMP Remote Code Execution Vulnerability, is available at the following location (with a valid account):", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102" }, { "category": "mitigation", "details": "Cisco\u0027s security advisory, Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability, is available at the following location:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ] } ] }
icsa-17-094-03
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Rockwell Automation", "summary": "reporting this vulnerability" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Remotely exploitable/low skill level to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Milwaukee, Wisconsin", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-17-094-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2017/icsa-17-094-03.json" }, { "category": "self", "summary": "ICS Advisory ICSA-17-094-03 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-094-03" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-17-094-03" } ], "title": "Rockwell Automation Allen-Bradley Stratix and Allen-Bradley ArmorStratix", "tracking": { "current_release_date": "2017-04-04T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-17-094-03", "initial_release_date": "2017-04-04T00:00:00.000000Z", "revision_history": [ { "date": "2017-04-04T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-17-094-03 Rockwell Automation Allen-Bradley Stratix, Allen-Bradley ArmorStratix" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(5)EA.fc4", "product": { "name": "Allen-Bradley Stratix 8000 Modular Managed Industrial Ethernet Switches: All Versions 15.2(5)EA.fc4 and earlier", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 8000 Modular Managed Industrial Ethernet Switches" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(4a)EA5", "product": { "name": "Allen-Bradley Stratix 8300 Modular Managed Industrial Ethernet Switches: All Versions 15.2(4a)EA5 and earlier", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 8300 Modular Managed Industrial Ethernet Switches" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(5)EA.fc4", "product": { "name": "Allen-Bradley Stratix 5400 Industrial Ethernet Switches: All Versions 15.2(5)EA.fc4 and earlier", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 5400 Industrial Ethernet Switches" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(5)EA.fc4", "product": { "name": "Allen-Bradley Stratix 5410 Industrial Distribution Switches: All Versions 15.2(5)EA.fc4 and earlier", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 5410 Industrial Distribution Switches" }, { "branches": [ { "category": "product_version_range", "name": "\u003c= 15.2(5)EA.fc4", "product": { "name": "Allen-Bradley Stratix 5700 and ArmorStratix 5700 Industrial Managed Ethernet Switches: All Versions 15.2(5)EA.fc4 and earlier", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "Allen-Bradley Stratix 5700 and ArmorStratix 5700 Industrial Managed Ethernet Switches" } ], "category": "vendor", "name": "Rockwell Automation" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3881", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An unauthorized remote attacker may be able to establish a Telnet session with a target device by sending malformed CMP-specific Telnet messages. Incorrect processing of these messages may cause the device to reload or to allow the attacker to execute arbitrary code with elevated privileges.CVE-2017-3881 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-3881" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Rockwell Automation has provided interim compensating controls for Allen-Bradley Stratix and ArmorStratix switches to help reduce the risk of exploitation of the vulnerability identified in the Cisco Cluster Management Protocol (CMP) processing code used in the Cisco IOS and Cisco IOS XE software. Allen-Bradley Stratix and ArmorStratix products contain the affected versions of the Cisco IOS and IOS XE software.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Disable the Telnet protocol as an allowed protocol for incoming connections on affected devices to diminish the network-based vector of attack. For information on how to disable Telnet via Command Line Interface, please see Knowledgebase Article ID 1040270, which is available at the following location (with a valid account):", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/1040270" }, { "category": "mitigation", "details": "If a user is unable or unwilling to disable Telnet, then implementing infrastructure access control lists (iACLs) can reduce the attack service. For information on how to implement iACLs, please see Knowledgebase Article ID 1040270.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Cisco has created two Snort rules (SIDs), 41909 and 41910, to detect exploits associated with this vulnerability.", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] }, { "category": "mitigation", "details": "Rockwell Automation security advisory, Stratix CMP Remote Code Execution Vulnerability, is available at the following location (with a valid account):", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://rockwellautomation.custhelp.com/app/answers/detail/a_id/54102" }, { "category": "mitigation", "details": "Cisco\u0027s security advisory, Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability, is available at the following location:", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005" ] } ] } ] }
cisco-sa-20170317-cmp
Vulnerability from csaf_cisco
Notes
{ "document": { "acknowledgments": [ { "summary": "This vulnerability was found during the analysis of documents related to the Vault 7 disclosure." } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.\r\n\r\nThe Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors:\r\n\r\n The failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device, and\r\nThe incorrect processing of malformed CMP-specific Telnet options.\r\n An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device.\r\n\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.\r\n\r\n", "title": "Summary" }, { "category": "general", "text": "This vulnerability affects the following Cisco devices when running a vulnerable Cisco IOS software release and configured to accept incoming Telnet connections:\r\n\r\n\r\n Cisco Catalyst 2350-48TD-S Switch\r\n Cisco Catalyst 2350-48TD-SD Switch\r\n Cisco Catalyst 2360-48TD-S Switch\r\n Cisco Catalyst 2918-24TC-C Switch\r\n Cisco Catalyst 2918-24TT-C Switch\r\n Cisco Catalyst 2918-48TC-C Switch\r\n Cisco Catalyst 2918-48TT-C Switch\r\n Cisco Catalyst 2928-24TC-C Switch\r\n Cisco Catalyst 2960-24-S Switch\r\n Cisco Catalyst 2960-24LC-S Switch\r\n Cisco Catalyst 2960-24LT-L Switch\r\n Cisco Catalyst 2960-24PC-L Switch\r\n Cisco Catalyst 2960-24PC-S Switch\r\n Cisco Catalyst 2960-24TC-L Switch\r\n Cisco Catalyst 2960-24TC-S Switch\r\n Cisco Catalyst 2960-24TT-L Switch\r\n Cisco Catalyst 2960-48PST-L Switch\r\n Cisco Catalyst 2960-48PST-S Switch\r\n Cisco Catalyst 2960-48TC-L Switch\r\n Cisco Catalyst 2960-48TC-S Switch\r\n Cisco Catalyst 2960-48TT-L Switch\r\n Cisco Catalyst 2960-48TT-S Switch\r\n Cisco Catalyst 2960-8TC-L Compact Switch\r\n Cisco Catalyst 2960-8TC-S Compact Switch\r\n Cisco Catalyst 2960-Plus 24LC-L Switch\r\n Cisco Catalyst 2960-Plus 24LC-S Switch\r\n Cisco Catalyst 2960-Plus 24PC-L Switch\r\n Cisco Catalyst 2960-Plus 24PC-S Switch\r\n Cisco Catalyst 2960-Plus 24TC-L Switch\r\n Cisco Catalyst 2960-Plus 24TC-S Switch\r\n Cisco Catalyst 2960-Plus 48PST-L Switch\r\n Cisco Catalyst 2960-Plus 48PST-S Switch\r\n Cisco Catalyst 2960-Plus 48TC-L Switch\r\n Cisco Catalyst 2960-Plus 48TC-S Switch\r\n Cisco Catalyst 2960C-12PC-L Switch\r\n Cisco Catalyst 2960C-8PC-L Switch\r\n Cisco Catalyst 2960C-8TC-L Switch\r\n Cisco Catalyst 2960C-8TC-S Switch\r\n Cisco Catalyst 2960CG-8TC-L Compact Switch\r\n Cisco Catalyst 2960CPD-8PT-L Switch\r\n Cisco Catalyst 2960CPD-8TT-L Switch\r\n Cisco Catalyst 2960CX-8PC-L Switch\r\n Cisco Catalyst 2960CX-8TC-L Switch\r\n Cisco Catalyst 2960G-24TC-L Switch\r\n Cisco Catalyst 2960G-48TC-L Switch\r\n Cisco Catalyst 2960G-8TC-L Compact Switch\r\n Cisco Catalyst 2960L-16PS-LL Switch\r\n Cisco Catalyst 2960L-16TS-LL Switch\r\n Cisco Catalyst 2960L-24PS-LL Switch\r\n Cisco Catalyst 2960L-24TS-LL Switch\r\n Cisco Catalyst 2960L-48PS-LL Switch\r\n Cisco Catalyst 2960L-48TS-LL Switch\r\n Cisco Catalyst 2960L-8PS-LL Switch\r\n Cisco Catalyst 2960L-8TS-LL Switch\r\n Cisco Catalyst 2960PD-8TT-L Compact Switch\r\n Cisco Catalyst 2960S-24PD-L Switch\r\n Cisco Catalyst 2960S-24PS-L Switch\r\n Cisco Catalyst 2960S-24TD-L Switch\r\n Cisco Catalyst 2960S-24TS-L Switch\r\n Cisco Catalyst 2960S-24TS-S Switch\r\n Cisco Catalyst 2960S-48FPD-L Switch\r\n Cisco Catalyst 2960S-48FPS-L Switch\r\n Cisco Catalyst 2960S-48LPD-L Switch\r\n Cisco Catalyst 2960S-48LPS-L Switch\r\n Cisco Catalyst 2960S-48TD-L Switch\r\n Cisco Catalyst 2960S-48TS-L Switch\r\n Cisco Catalyst 2960S-48TS-S Switch\r\n Cisco Catalyst 2960S-F24PS-L Switch\r\n Cisco Catalyst 2960S-F24TS-L Switch\r\n Cisco Catalyst 2960S-F24TS-S Switch\r\n Cisco Catalyst 2960S-F48FPS-L Switch\r\n Cisco Catalyst 2960S-F48LPS-L Switch\r\n Cisco Catalyst 2960S-F48TS-L Switch\r\n Cisco Catalyst 2960S-F48TS-S Switch\r\n Cisco Catalyst 2960X-24PD-L Switch\r\n Cisco Catalyst 2960X-24PS-L Switch\r\n Cisco Catalyst 2960X-24PSQ-L Cool Switch\r\n Cisco Catalyst 2960X-24TD-L Switch\r\n Cisco Catalyst 2960X-24TS-L Switch\r\n Cisco Catalyst 2960X-24TS-LL Switch\r\n Cisco Catalyst 2960X-48FPD-L Switch\r\n Cisco Catalyst 2960X-48FPS-L Switch\r\n Cisco Catalyst 2960X-48LPD-L Switch\r\n Cisco Catalyst 2960X-48LPS-L Switch\r\n Cisco Catalyst 2960X-48TD-L Switch\r\n Cisco Catalyst 2960X-48TS-L Switch\r\n Cisco Catalyst 2960X-48TS-LL Switch\r\n Cisco Catalyst 2960XR-24PD-I Switch\r\n Cisco Catalyst 2960XR-24PD-L Switch\r\n Cisco Catalyst 2960XR-24PS-I Switch\r\n Cisco Catalyst 2960XR-24PS-L Switch\r\n Cisco Catalyst 2960XR-24TD-I Switch\r\n Cisco Catalyst 2960XR-24TD-L Switch\r\n Cisco Catalyst 2960XR-24TS-I Switch\r\n Cisco Catalyst 2960XR-24TS-L Switch\r\n Cisco Catalyst 2960XR-48FPD-I Switch\r\n Cisco Catalyst 2960XR-48FPD-L Switch\r\n Cisco Catalyst 2960XR-48FPS-I Switch\r\n Cisco Catalyst 2960XR-48FPS-L Switch\r\n Cisco Catalyst 2960XR-48LPD-I Switch\r\n Cisco Catalyst 2960XR-48LPD-L Switch\r\n Cisco Catalyst 2960XR-48LPS-I Switch\r\n Cisco Catalyst 2960XR-48LPS-L Switch\r\n Cisco Catalyst 2960XR-48TD-I Switch\r\n Cisco Catalyst 2960XR-48TD-L Switch\r\n Cisco Catalyst 2960XR-48TS-I Switch\r\n Cisco Catalyst 2960XR-48TS-L Switch\r\n Cisco Catalyst 2970G-24T Switch\r\n Cisco Catalyst 2970G-24TS Switch\r\n Cisco Catalyst 2975 Switch\r\n Cisco Catalyst 3550 12G Switch\r\n Cisco Catalyst 3550 12T Switch\r\n Cisco Catalyst 3550 24 DC SMI Switch\r\n Cisco Catalyst 3550 24 EMI Switch\r\n Cisco Catalyst 3550 24 FX SMI Switch\r\n Cisco Catalyst 3550 24 PWR Switch\r\n Cisco Catalyst 3550 24 SMI Switch\r\n Cisco Catalyst 3550 48 EMI Switch\r\n Cisco Catalyst 3550 48 SMI Switch\r\n Cisco Catalyst 3560-12PC-S Compact Switch\r\n Cisco Catalyst 3560-24PS Switch\r\n Cisco Catalyst 3560-24TS Switch\r\n Cisco Catalyst 3560-48PS Switch\r\n Cisco Catalyst 3560-48TS Switch\r\n Cisco Catalyst 3560-8PC Compact Switch\r\n Cisco Catalyst 3560C-12PC-S Switch\r\n Cisco Catalyst 3560C-8PC-S Switch\r\n Cisco Catalyst 3560CG-8PC-S Compact Switch\r\n Cisco Catalyst 3560CG-8TC-S Compact Switch\r\n Cisco Catalyst 3560CPD-8PT-S Compact Switch\r\n Cisco Catalyst 3560CX-12PC-S Switch\r\n Cisco Catalyst 3560CX-12PD-S Switch\r\n Cisco Catalyst 3560CX-12TC-S Switch\r\n Cisco Catalyst 3560CX-8PC-S Switch\r\n Cisco Catalyst 3560CX-8PT-S Switch\r\n Cisco Catalyst 3560CX-8TC-S Switch\r\n Cisco Catalyst 3560CX-8XPD-S Switch\r\n Cisco Catalyst 3560E-12D-E Switch\r\n Cisco Catalyst 3560E-12D-S Switch\r\n Cisco Catalyst 3560E-12SD-E Switch\r\n Cisco Catalyst 3560E-12SD-S Switch\r\n Cisco Catalyst 3560E-24PD-E Switch\r\n Cisco Catalyst 3560E-24PD-S Switch\r\n Cisco Catalyst 3560E-24TD-E Switch\r\n Cisco Catalyst 3560E-24TD-S Switch\r\n Cisco Catalyst 3560E-48PD-E Switch\r\n Cisco Catalyst 3560E-48PD-EF Switch\r\n Cisco Catalyst 3560E-48PD-S Switch\r\n Cisco Catalyst 3560E-48PD-SF Switch\r\n Cisco Catalyst 3560E-48TD-E Switch\r\n Cisco Catalyst 3560E-48TD-S Switch\r\n Cisco Catalyst 3560G-24PS Switch\r\n Cisco Catalyst 3560G-24TS Switch\r\n Cisco Catalyst 3560G-48PS Switch\r\n Cisco Catalyst 3560G-48TS Switch\r\n Cisco Catalyst 3560V2-24DC Switch\r\n Cisco Catalyst 3560V2-24PS Switch\r\n Cisco Catalyst 3560V2-24TS Switch\r\n Cisco Catalyst 3560V2-48PS Switch\r\n Cisco Catalyst 3560V2-48TS Switch\r\n Cisco Catalyst 3560X-24P-E Switch\r\n Cisco Catalyst 3560X-24P-L Switch\r\n Cisco Catalyst 3560X-24P-S Switch\r\n Cisco Catalyst 3560X-24T-E Switch\r\n Cisco Catalyst 3560X-24T-L Switch\r\n Cisco Catalyst 3560X-24T-S Switch\r\n Cisco Catalyst 3560X-24U-E Switch\r\n Cisco Catalyst 3560X-24U-L Switch\r\n Cisco Catalyst 3560X-24U-S Switch\r\n Cisco Catalyst 3560X-48P-E Switch\r\n Cisco Catalyst 3560X-48P-L Switch\r\n Cisco Catalyst 3560X-48P-S Switch\r\n Cisco Catalyst 3560X-48PF-E Switch\r\n Cisco Catalyst 3560X-48PF-L Switch\r\n Cisco Catalyst 3560X-48PF-S Switch\r\n Cisco Catalyst 3560X-48T-E Switch\r\n Cisco Catalyst 3560X-48T-L Switch\r\n Cisco Catalyst 3560X-48T-S Switch\r\n Cisco Catalyst 3560X-48U-E Switch\r\n Cisco Catalyst 3560X-48U-L Switch\r\n Cisco Catalyst 3560X-48U-S Switch\r\n Cisco Catalyst 3750 Metro 24-AC Switch\r\n Cisco Catalyst 3750 Metro 24-DC Switch\r\n Cisco Catalyst 3750-24FS Switch\r\n Cisco Catalyst 3750-24PS Switch\r\n Cisco Catalyst 3750-24TS Switch\r\n Cisco Catalyst 3750-48PS Switch\r\n Cisco Catalyst 3750-48TS Switch\r\n Cisco Catalyst 3750E-24PD-E Switch\r\n Cisco Catalyst 3750E-24PD-S Switch\r\n Cisco Catalyst 3750E-24TD-E Switch\r\n Cisco Catalyst 3750E-24TD-S Switch\r\n Cisco Catalyst 3750E-48PD-E Switch\r\n Cisco Catalyst 3750E-48PD-EF Switch\r\n Cisco Catalyst 3750E-48PD-S Switch\r\n Cisco Catalyst 3750E-48PD-SF Switch\r\n Cisco Catalyst 3750E-48TD-E Switch\r\n Cisco Catalyst 3750E-48TD-S Switch\r\n Cisco Catalyst 3750G-12S Switch\r\n Cisco Catalyst 3750G-12S-SD Switch\r\n Cisco Catalyst 3750G-16TD Switch\r\n Cisco Catalyst 3750G-24PS Switch\r\n Cisco Catalyst 3750G-24T Switch\r\n Cisco Catalyst 3750G-24TS Switch\r\n Cisco Catalyst 3750G-24TS-1U Switch\r\n Cisco Catalyst 3750G-48PS Switch\r\n Cisco Catalyst 3750G-48TS Switch\r\n Cisco Catalyst 3750V2-24FS Switch\r\n Cisco Catalyst 3750V2-24PS Switch\r\n Cisco Catalyst 3750V2-24TS Switch\r\n Cisco Catalyst 3750V2-48PS Switch\r\n Cisco Catalyst 3750V2-48TS Switch\r\n Cisco Catalyst 3750X-12S-E Switch\r\n Cisco Catalyst 3750X-12S-S Switch\r\n Cisco Catalyst 3750X-24P-E Switch\r\n Cisco Catalyst 3750X-24P-L Switch\r\n Cisco Catalyst 3750X-24P-S Switch\r\n Cisco Catalyst 3750X-24S-E Switch\r\n Cisco Catalyst 3750X-24S-S Switch\r\n Cisco Catalyst 3750X-24T-E Switch\r\n Cisco Catalyst 3750X-24T-L Switch\r\n Cisco Catalyst 3750X-24T-S Switch\r\n Cisco Catalyst 3750X-24U-E Switch\r\n Cisco Catalyst 3750X-24U-L Switch\r\n Cisco Catalyst 3750X-24U-S Switch\r\n Cisco Catalyst 3750X-48P-E Switch\r\n Cisco Catalyst 3750X-48P-L Switch\r\n Cisco Catalyst 3750X-48P-S Switch\r\n Cisco Catalyst 3750X-48PF-E Switch\r\n Cisco Catalyst 3750X-48PF-L Switch\r\n Cisco Catalyst 3750X-48PF-S Switch\r\n Cisco Catalyst 3750X-48T-E Switch\r\n Cisco Catalyst 3750X-48T-L Switch\r\n Cisco Catalyst 3750X-48T-S Switch\r\n Cisco Catalyst 3750X-48U-E Switch\r\n Cisco Catalyst 3750X-48U-L Switch\r\n Cisco Catalyst 3750X-48U-S Switch\r\n Cisco Catalyst 4000 Supervisor Engine I\r\n Cisco Catalyst 4000/4500 Supervisor Engine IV\r\n Cisco Catalyst 4000/4500 Supervisor Engine V\r\n Cisco Catalyst 4500 Series Supervisor Engine II-Plus\r\n Cisco Catalyst 4500 Series Supervisor Engine II-Plus-TS\r\n Cisco Catalyst 4500 Series Supervisor Engine V-10GE\r\n Cisco Catalyst 4500 Series Supervisor II-Plus-10GE\r\n Cisco Catalyst 4500 Supervisor Engine 6-E\r\n Cisco Catalyst 4500 Supervisor Engine 6L-E\r\n Cisco Catalyst 4500E Supervisor Engine 8-E\r\n Cisco Catalyst 4900M Switch\r\n Cisco Catalyst 4928 10 Gigabit Ethernet Switch\r\n Cisco Catalyst 4948 10 Gigabit Ethernet Switch\r\n Cisco Catalyst 4948 Switch\r\n Cisco Catalyst 4948E Ethernet Switch\r\n Cisco Catalyst 4948E-F Ethernet Switch\r\n Cisco Catalyst Blade Switch 3020 for HP\r\n Cisco Catalyst Blade Switch 3030 for Dell\r\n Cisco Catalyst Blade Switch 3032 for Dell M1000E\r\n Cisco Catalyst Blade Switch 3040 for FSC\r\n Cisco Catalyst Blade Switch 3120 for HP\r\n Cisco Catalyst Blade Switch 3120X for HP\r\n Cisco Catalyst Blade Switch 3130 for Dell M1000E\r\n Cisco Catalyst C2928-24LT-C Switch\r\n Cisco Catalyst C2928-48TC-C Switch\r\n Cisco Catalyst Switch Module 3012 for IBM BladeCenter\r\n Cisco Catalyst Switch Module 3110 for IBM BladeCenter\r\n Cisco Catalyst Switch Module 3110X for IBM BladeCenter\r\n Cisco Embedded Service 2020 24TC CON B Switch\r\n Cisco Embedded Service 2020 24TC CON Switch\r\n Cisco Embedded Service 2020 24TC NCP B Switch\r\n Cisco Embedded Service 2020 24TC NCP Switch\r\n Cisco Embedded Service 2020 CON B Switch\r\n Cisco Embedded Service 2020 CON Switch\r\n Cisco Embedded Service 2020 NCP B Switch\r\n Cisco Embedded Service 2020 NCP Switch\r\n Cisco Enhanced Layer 2 EtherSwitch Service Module\r\n Cisco Enhanced Layer 2/3 EtherSwitch Service Module\r\n Cisco Gigabit Ethernet Switch Module (CGESM) for HP\r\n Cisco IE 2000-16PTC-G Industrial Ethernet Switch\r\n Cisco IE 2000-16T67 Industrial Ethernet Switch\r\n Cisco IE 2000-16T67P Industrial Ethernet Switch\r\n Cisco IE 2000-16TC Industrial Ethernet Switch\r\n Cisco IE 2000-16TC-G Industrial Ethernet Switch\r\n Cisco IE 2000-16TC-G-E Industrial Ethernet Switch\r\n Cisco IE 2000-16TC-G-N Industrial Ethernet Switch\r\n Cisco IE 2000-16TC-G-X Industrial Ethernet Switch\r\n Cisco IE 2000-24T67 Industrial Ethernet Switch\r\n Cisco IE 2000-4S-TS-G Industrial Ethernet Switch\r\n Cisco IE 2000-4T Industrial Ethernet Switch\r\n Cisco IE 2000-4T-G Industrial Ethernet Switch\r\n Cisco IE 2000-4TS Industrial Ethernet Switch\r\n Cisco IE 2000-4TS-G Industrial Ethernet Switch\r\n Cisco IE 2000-8T67 Industrial Ethernet Switch\r\n Cisco IE 2000-8T67P Industrial Ethernet Switch\r\n Cisco IE 2000-8TC Industrial Ethernet Switch\r\n Cisco IE 2000-8TC-G Industrial Ethernet Switch\r\n Cisco IE 2000-8TC-G-E Industrial Ethernet Switch\r\n Cisco IE 2000-8TC-G-N Industrial Ethernet Switch\r\n Cisco IE 3000-4TC Industrial Ethernet Switch\r\n Cisco IE 3000-8TC Industrial Ethernet Switch\r\n Cisco IE-3010-16S-8PC Industrial Ethernet Switch\r\n Cisco IE-3010-24TC Industrial Ethernet Switch\r\n Cisco IE-4000-16GT4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-16T4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-4GC4GP4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-4GS8GP4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-4S8P4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-4T4P4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-4TC4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-8GS4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-8GT4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-8GT8GP4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-8S4G-E Industrial Ethernet Switch\r\n Cisco IE-4000-8T4G-E Industrial Ethernet Switch\r\n Cisco IE-4010-16S12P Industrial Ethernet Switch\r\n Cisco IE-4010-4S24P Industrial Ethernet Switch\r\n Cisco IE-5000-12S12P-10G Industrial Ethernet Switch\r\n Cisco IE-5000-16S12P Industrial Ethernet Switch\r\n Cisco ME 4924-10GE Switch\r\n Cisco RF Gateway 10\r\n Cisco SM-X Layer 2/3 EtherSwitch Service Module\r\n\r\nNote: Checking for the presence of the CMP subsystem is only required on devices running Cisco IOS XE Software, not Cisco IOS Software. Checking if the device is configured to accept Telnet connections is required for devices running either Cisco IOS or Cisco IOS XE Software.\r\n\r\nCisco devices running a vulnerable Cisco IOS XE release are affected by this vulnerability when the following conditions are met:\r\nThe CMP subsystem is present on the Cisco IOS XE software image running on the device, and\r\nThe device is configured to accept incoming Telnet connections.\r\n\r\n In order to determine if the CMP subsystem is present on the running software image, execute the command show subsys class protocol | include ^cmp from a privileged CLI prompt on the device.\r\n\r\nThe following example shows the output of the command show subsys class protocol | include ^cmp when the CMP subsystem is present on the software image running on the device:\r\n\r\nSwitch#show subsys class protocol | include ^cmp\r\ncmp Protocol 1.000.001 Switch#\r\n\r\nThe following example shows the output of the command show subsys class protocol | include ^cmp when the CMP subsystem is not present on the software image running on the device:\r\nSwitch#show subsys class protocol | include ^cmp\r\nSwitch#\r\n In order to determine if the device is configured to accept incoming Telnet connections, execute the command show running-config | include ^line vty|transport input from a privileged CLI prompt. The command output may indicate one of multiple possible configurations, such as the following:\r\nThe absence of a transport input configuration line after the line vty configuration line indicates the device is using the default set of protocols for incoming connections through a virtual terminal (VTY). The default set of protocols includes the Telnet protocol; hence, this device will accept Telnet connections on all VTYs. This is a vulnerable configuration.\r\n\r\n\r\nSwitch#show running-config | include ^line vty|transport input\r\nline vty 0 4 line vty 5 15 Switch#\r\n\r\nThe device has been explicitly configured to only accept the Secure Shell (SSH) protocol for incoming connections to a subset of the available VTYs, but VTYs numbered 6 to 15 are still using the default set of protocols. Hence, this device will accept Telnet connections to those VTYs. This is a vulnerable configuration.\r\n\r\n\r\nSwitch#show running-config | include ^line vty|transport input\r\nline vty 0 4 transport input ssh line vty 5 transport input ssh line vty 6 15 Switch#\r\n\r\nAll available transport protocols have been enabled for incoming connections to all VTYs. Enabling all protocols also enables the Telnet protocol, and will allow Telnet connections to the device. This is a vulnerable configuration.\r\n\r\n\r\nSwitch#show running-config | include ^line vty|transport input\r\nline vty 0 4 transport input all line vty 5 15 transport input all Switch#\r\n\r\nThe SSH protocol is the only protocol enabled for incoming connections on all VTYs. No Telnet connections are possible to any VTY on the device while using this configuration. This configuration is not vulnerable.\r\n\r\n\r\nSwitch#show running-config | include ^line vty|transport input\r\nline vty 0 4 transport input ssh line vty 5 15 transport input ssh Switch#\r\n\r\n Both the Telnet and the SSH protocols have been explicitly enabled as allowed protocols for incoming connections on all VTYs. Telnet connections to the device will be successful under this configuration. This is a vulnerable configuration.\r\n\r\n\r\nSwitch#show running-config | include ^line vty|transport input\r\nline vty 0 4 transport input telnet ssh line vty 5 15 transport input telnet ssh\r\n\r\nDetermining the Cisco IOS Software Release\r\nTo determine which Cisco IOS Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS Software, the system banner displays text similar to Cisco Internetwork Operating System Software or Cisco IOS Software. The banner also displays the installed image name in parentheses, followed by the Cisco IOS Software release number and release name. Some Cisco devices do not support the show version command or may provide different output.\r\n\r\nThe following example shows the output of the command for a device that is running Cisco IOS Software Release 15.5(2)T1 and has an installed image name of C2951-UNIVERSALK9-M:\r\n\r\n\r\nRouter\u003e show version\r\n Cisco IOS Software, C2951 Software (C2951-UNIVERSALK9-M), Version 15.5(2)T1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2015 by Cisco Systems, Inc. Compiled Mon 22-Jun-15 09:32 by prod_rel_team . . .\r\n\r\nFor information about the naming and numbering conventions for Cisco IOS Software releases, see White Paper: Cisco IOS and NX-OS Software Reference Guide [\"https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html\"].\r\n\r\nDetermining the Cisco IOS XE Software Release\r\nTo determine which Cisco IOS XE Software release is running on a device, administrators can log in to the device, use the show version command in the CLI, and then refer to the system banner that appears. If the device is running Cisco IOS XE Software, the system banner displays Cisco IOS Software, Cisco IOS XE Software, or similar text.\r\n\r\nThe following example shows the output of the command for a device that is running Cisco IOS XE Software Release 16.2.1 and has an installed image name of CAT3K_CAA-UNIVERSALK9-M:\r\n\r\n\r\nios-xe-device# show version\r\n Cisco IOS Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version Denali 16.2.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2016 by Cisco Systems, Inc. Compiled Sun 27-Mar-16 21:47 by mcpre . . .\r\n\r\nFor information about the naming and numbering conventions for Cisco IOS XE Software releases, see White Paper: Cisco IOS and NX-OS Software Reference Guide [\"https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html\"].", "title": "Vulnerable Products" }, { "category": "general", "text": "No other Cisco products are currently known to be affected by this vulnerability.\r\n\r\nCisco devices running a vulnerable Cisco IOS Software release but not listed under the \"Vulnerable Products\" section of this advisory are not affected by this vulnerability.\r\n\r\nCisco devices running a vulnerable Cisco IOS XE Software release but not including the CMP protocol subsystem are not affected by this vulnerability.", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.\r\n\r\nThe Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors:\r\n\r\n The failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device, and\r\nThe incorrect processing of malformed CMP-specific Telnet options.\r\n An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device.\r\n\r\nCMP-specific Telnet options are processed by default, even if no cluster configuration commands are present on the device configuration.\r\n\r\nThis vulnerability can be exploited during Telnet session negotiation over either IPv4 or IPv6. This vulnerability can only be exploited through a Telnet session established to the device\u2014sending the malformed options on Telnet sessions through the device will not trigger the vulnerability.", "title": "Details" }, { "category": "general", "text": "Cisco IPS Signature 7880-0 and Snort SIDs 41909 and 41910 can detect attempts to exploit this vulnerability.", "title": "Indicators of Compromise" }, { "category": "general", "text": "There are no workarounds that address this vulnerability.\r\n\r\nDisabling the Telnet protocol as an allowed protocol for incoming connections would eliminate the exploit vector. Disabling Telnet and using SSH is recommended by Cisco. Information on how to do both can be found on the Cisco Guide to Harden Cisco IOS Devices [\"http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html\"].\r\n\r\nCustomers unable or unwilling to disable the Telnet protocol can reduce the attack surface by implementing VTY access lists (at the device level) or infrastructure access control lists (iACLs). Information on VTY access list can be found in the document: Cisco Guide to Harden Cisco IOS Devices [\"http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc41\"]. Information on iACLs can be found in the document: Protecting Your Core: Infrastructure Protection Access Control Lists [\"http://www.cisco.com/c/en/us/support/docs/ip/access-lists/43920-iacl.html\"].", "title": "Workarounds" }, { "category": "general", "text": "Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:\r\nhttp://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html [\"http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html\"]\r\nAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to upgrade contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.\r\n\r\nCustomers Without Service Contracts\r\n\r\nCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC:\r\nhttp://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html [\"http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html\"]\r\n\r\nCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.\r\n Cisco IOS and IOS XE Software\r\nTo help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides a tool, the Cisco IOS Software Checker [\"https://sec.cloudapps.cisco.com/security/center/selectIOSVersion.x\"], that identifies any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (\u201cFirst Fixed\u201d). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (\u201cCombined First Fixed\u201d).\r\n\r\nCustomers can use this tool to perform the following tasks:\r\n\r\nInitiate a search by choosing one or more releases from a drop-down menu or uploading a file from a local system for the tool to parse\r\nEnter the output of the show version command for the tool to parse\r\nCreate a custom search by including all previously published Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication\r\n\r\nTo determine whether a release is affected by any published Cisco Security Advisory, use the Cisco IOS Software Checker [\"https://sec.cloudapps.cisco.com/security/center/selectIOSVersion.x\"] on Cisco.com or enter a Cisco IOS Software or Cisco IOS XE Software release\u2014for example, 15.1(4)M2 or 3.13.8S\u2014in the following field:\r\n\r\n\r\n\r\n\r\n\r\n\r\nFor a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032\"], Cisco IOS XE 3S Release Notes [\"https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754\"], or Cisco IOS XE 3SG Release Notes [\"https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252\"], depending on the Cisco IOS XE Software release.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "Exploit code for the vulnerability described in this advisory was made available by a security researcher on April 10, 2017.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) is aware of exploitation of the vulnerability that is described in this advisory. Additional information can be found at Cisco TALOS: DNS Hijacking Abuses Trust In Core Internet Service [\"https://blog.talosintelligence.com/2019/04/seaturtle.html\"]", "title": "Exploitation and Public Announcements" }, { "category": "general", "text": "This vulnerability was found during the analysis of documents related to the Vault 7 disclosure.", "title": "Source" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "psirt@cisco.com", "issuing_authority": "Cisco PSIRT", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "White Paper: Cisco IOS and NX-OS Software Reference Guide", "url": "https://www.cisco.com/c/en/us/about/security-center/ios-nx-os-reference-guide.html" }, { "category": "external", "summary": "Cisco Guide to Harden Cisco IOS Devices", "url": "http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html" }, { "category": "external", "summary": "Cisco Guide to Harden Cisco IOS Devices", "url": "http://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html#anc41" }, { "category": "external", "summary": "Protecting Your Core: Infrastructure Protection Access Control Lists", "url": "http://www.cisco.com/c/en/us/support/docs/ip/access-lists/43920-iacl.html" }, { "category": "external", "summary": "http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.html", "url": "http://www.cisco.com/c/en/us/td/docs/general/warranty/English/EU1KEN_.html" }, { "category": "external", "summary": "Cisco Security Advisories and Alerts page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html", "url": "http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS Software Checker", "url": "https://sec.cloudapps.cisco.com/security/center/selectIOSVersion.x" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 2 Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 3S Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754" }, { "category": "external", "summary": "Cisco\u0026nbsp;IOS XE 3SG Release Notes", "url": "https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252" }, { "category": "external", "summary": "Cisco TALOS: DNS Hijacking Abuses Trust In Core Internet Service", "url": "https://blog.talosintelligence.com/2019/04/seaturtle.html" } ], "title": "Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability", "tracking": { "current_release_date": "2019-04-17T18:47:43+00:00", "generator": { "date": "2023-11-15T06:04:37+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-20170317-cmp", "initial_release_date": "2017-03-17T16:00:00+00:00", "revision_history": [ { "date": "2017-03-17T15:40:50+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2017-03-29T18:43:50+00:00", "number": "1.1.0", "summary": "Added information on VTY access list." }, { "date": "2017-04-03T17:51:59+00:00", "number": "1.2.0", "summary": "Added OVAL definition. The content of the advisory did not change." }, { "date": "2017-04-13T20:02:29+00:00", "number": "1.3.0", "summary": "Added information about the public availability of an exploit for the vulnerability described in this advisory." }, { "date": "2017-05-08T20:47:27+00:00", "number": "1.4.0", "summary": "Updated fixed software availability information." }, { "date": "2017-09-20T11:31:51+00:00", "number": "1.5.0", "summary": "Updated the Common Vulnerability Reporting Framework (CVRF) file that is linked to this advisory." }, { "date": "2017-09-21T14:39:41+00:00", "number": "1.6.0", "summary": "Updated the Common Vulnerability Reporting Framework (CVRF) file that is linked to this advisory." }, { "date": "2018-03-06T12:47:51+00:00", "number": "1.7.0", "summary": "Updated the Vulnerable Products section to include the Cisco Catalyst 4500E Supervisor Engine 8-E." }, { "date": "2019-04-17T18:47:43+00:00", "number": "1.8.0", "summary": "Updated the Exploitation and Public Announcements section with information on public exploitation." } ], "status": "final", "version": "1.8.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "service_pack", "name": "12.2(22)S", "product": { "name": "12.2(22)S", "product_id": "CSAFPID-50447" } }, { "category": "service_pack", "name": "12.2(20)S", "product": { "name": "12.2(20)S", "product_id": "CSAFPID-50448" } }, { "category": "service_pack", "name": "12.2(18)S", "product": { "name": "12.2(18)S", "product_id": "CSAFPID-50449" } }, { "category": "service_pack", "name": "12.2(25)S", "product": { "name": "12.2(25)S", "product_id": "CSAFPID-62597" } }, { "category": "service_pack", "name": "12.2(20)S2a", "product": { "name": "12.2(20)S2a", "product_id": "CSAFPID-103776" } }, { "category": "service_pack", "name": "12.2(20)S4a", "product": { "name": "12.2(20)S4a", "product_id": "CSAFPID-104035" } }, { "category": "service_pack", "name": "12.2(20)S5", "product": { "name": "12.2(20)S5", "product_id": "CSAFPID-104476" } }, { "category": "service_pack", "name": "12.2(18)S1", "product": { "name": "12.2(18)S1", "product_id": "CSAFPID-105159" } }, { "category": "service_pack", "name": "12.2(20)S4", "product": { "name": "12.2(20)S4", "product_id": "CSAFPID-105334" } }, { "category": "service_pack", "name": "12.2(18)S2", "product": { "name": "12.2(18)S2", "product_id": "CSAFPID-105550" } }, { "category": "service_pack", "name": "12.2(18)S4", "product": { "name": "12.2(18)S4", "product_id": "CSAFPID-106118" } }, { "category": "service_pack", "name": "12.2(25)S2", "product": { "name": "12.2(25)S2", "product_id": "CSAFPID-106129" } }, { "category": "service_pack", "name": "12.2(20)S2", "product": { "name": "12.2(20)S2", "product_id": "CSAFPID-106130" } }, { "category": "service_pack", "name": "12.2(18)S3", "product": { "name": "12.2(18)S3", "product_id": "CSAFPID-106823" } }, { "category": "service_pack", "name": "12.2(20)S6", "product": { "name": "12.2(20)S6", "product_id": "CSAFPID-106851" } }, { "category": "service_pack", "name": "12.2(20)S3", "product": { "name": "12.2(20)S3", "product_id": "CSAFPID-107175" } }, { "category": "service_pack", "name": "12.2(25)S1", "product": { "name": "12.2(25)S1", "product_id": "CSAFPID-107184" } }, { "category": "service_pack", "name": "12.2(20)S1", "product": { "name": "12.2(20)S1", "product_id": "CSAFPID-107481" } } ], "category": "product_version", "name": "12.2S" }, { "branches": [ { "category": "service_pack", "name": "12.1(9)EX", "product": { "name": "12.1(9)EX", "product_id": "CSAFPID-35244" } } ], "category": "product_version", "name": "12.1EX" }, { "branches": [ { "category": "service_pack", "name": "12.2(14)SZ", "product": { "name": "12.2(14)SZ", "product_id": "CSAFPID-60330" } }, { "category": "service_pack", "name": "12.2(14)SZ5", "product": { "name": "12.2(14)SZ5", "product_id": "CSAFPID-104159" } }, { "category": "service_pack", "name": "12.2(14)SZ6", "product": { "name": "12.2(14)SZ6", "product_id": "CSAFPID-104434" } }, { "category": "service_pack", "name": "12.2(14)SZ3", "product": { "name": "12.2(14)SZ3", "product_id": "CSAFPID-105368" } }, { "category": "service_pack", "name": "12.2(14)SZ4", "product": { "name": "12.2(14)SZ4", "product_id": "CSAFPID-106048" } }, { "category": "service_pack", "name": "12.2(14)SZ1", "product": { "name": "12.2(14)SZ1", "product_id": "CSAFPID-106107" } }, { "category": "service_pack", "name": "12.2(14)SZ2", "product": { "name": "12.2(14)SZ2", "product_id": "CSAFPID-107181" } } ], "category": "product_version", "name": "12.2SZ" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)EW", "product": { "name": "12.2(25)EW", "product_id": "CSAFPID-63912" } } ], "category": "product_version", "name": "12.2EW" }, { "branches": [ { "category": "service_pack", "name": "12.2(20)EWA", "product": { "name": "12.2(20)EWA", "product_id": "CSAFPID-60367" } }, { "category": "service_pack", "name": "12.2(25)EWA", "product": { "name": "12.2(25)EWA", "product_id": "CSAFPID-60369" } }, { "category": "service_pack", "name": "12.2(25)EWA6", "product": { "name": "12.2(25)EWA6", "product_id": "CSAFPID-62582" } }, { "category": "service_pack", "name": "12.2(25)EWA5", "product": { "name": "12.2(25)EWA5", "product_id": "CSAFPID-103499" } }, { "category": "service_pack", "name": "12.2(25)EWA1", "product": { "name": "12.2(25)EWA1", "product_id": "CSAFPID-103567" } }, { "category": "service_pack", "name": "12.2(25)EWA10", "product": { "name": "12.2(25)EWA10", "product_id": "CSAFPID-103736" } }, { "category": "service_pack", "name": "12.2(25)EWA8", "product": { "name": "12.2(25)EWA8", "product_id": "CSAFPID-104305" } }, { "category": "service_pack", "name": "12.2(20)EWA1", "product": { "name": "12.2(20)EWA1", "product_id": "CSAFPID-104746" } }, { "category": "service_pack", "name": "12.2(25)EWA11", "product": { "name": "12.2(25)EWA11", "product_id": "CSAFPID-104903" } }, { "category": "service_pack", "name": "12.2(25)EWA9", "product": { "name": "12.2(25)EWA9", "product_id": "CSAFPID-105328" } }, { "category": "service_pack", "name": "12.2(25)EWA2", "product": { "name": "12.2(25)EWA2", "product_id": "CSAFPID-105492" } }, { "category": "service_pack", "name": "12.2(25)EWA14", "product": { "name": "12.2(25)EWA14", "product_id": "CSAFPID-105702" } }, { "category": "service_pack", "name": "12.2(25)EWA4", "product": { "name": "12.2(25)EWA4", "product_id": "CSAFPID-106528" } }, { "category": "service_pack", "name": "12.2(20)EWA3", "product": { "name": "12.2(20)EWA3", "product_id": "CSAFPID-106570" } }, { "category": "service_pack", "name": "12.2(25)EWA3", "product": { "name": "12.2(25)EWA3", "product_id": "CSAFPID-106686" } }, { "category": "service_pack", "name": "12.2(25)EWA7", "product": { "name": "12.2(25)EWA7", "product_id": "CSAFPID-106718" } }, { "category": "service_pack", "name": "12.2(20)EWA4", "product": { "name": "12.2(20)EWA4", "product_id": "CSAFPID-106886" } }, { "category": "service_pack", "name": "12.2(25)EWA12", "product": { "name": "12.2(25)EWA12", "product_id": "CSAFPID-107308" } }, { "category": "service_pack", "name": "12.2(25)EWA13", "product": { "name": "12.2(25)EWA13", "product_id": "CSAFPID-107544" } }, { "category": "service_pack", "name": "12.2(20)EWA2", "product": { "name": "12.2(20)EWA2", "product_id": "CSAFPID-107650" } } ], "category": "product_version", "name": "12.2EWA" }, { "branches": [ { "category": "service_pack", "name": "12.2(35)SE", "product": { "name": "12.2(35)SE", "product_id": "CSAFPID-62600" } }, { "category": "service_pack", "name": "12.2(18)SE", "product": { "name": "12.2(18)SE", "product_id": "CSAFPID-63898" } }, { "category": "service_pack", "name": "12.2(20)SE", "product": { "name": "12.2(20)SE", "product_id": "CSAFPID-63903" } }, { "category": "service_pack", "name": "12.2(25)SE", "product": { "name": "12.2(25)SE", "product_id": "CSAFPID-63916" } }, { "category": "service_pack", "name": "12.2(37)SE", "product": { "name": "12.2(37)SE", "product_id": "CSAFPID-69801" } }, { "category": "service_pack", "name": "12.2(53)SE1", "product": { "name": "12.2(53)SE1", "product_id": "CSAFPID-103648" } }, { "category": "service_pack", "name": "12.2(55)SE", "product": { "name": "12.2(55)SE", "product_id": "CSAFPID-103763" } }, { "category": "service_pack", "name": "12.2(25)SE2", "product": { "name": "12.2(25)SE2", "product_id": "CSAFPID-103774" } }, { "category": "service_pack", "name": "12.2(40)SE2", "product": { "name": "12.2(40)SE2", "product_id": "CSAFPID-103840" } }, { "category": "service_pack", "name": "12.2(46)SE", "product": { "name": "12.2(46)SE", "product_id": "CSAFPID-103921" } }, { "category": "service_pack", "name": "12.2(46)SE2", "product": { "name": "12.2(46)SE2", "product_id": "CSAFPID-104089" } }, { "category": "service_pack", "name": "12.2(50)SE2", "product": { "name": "12.2(50)SE2", "product_id": "CSAFPID-104101" } }, { "category": "service_pack", "name": "12.2(35)SE5", "product": { "name": "12.2(35)SE5", "product_id": "CSAFPID-104191" } }, { "category": "service_pack", "name": "12.2(50)SE1", "product": { "name": "12.2(50)SE1", "product_id": "CSAFPID-104342" } }, { "category": "service_pack", "name": "12.2(44)SE2", "product": { "name": "12.2(44)SE2", "product_id": "CSAFPID-104630" } }, { "category": "service_pack", "name": "12.2(20)SE3", "product": { "name": "12.2(20)SE3", "product_id": "CSAFPID-104706" } }, { "category": "service_pack", "name": "12.2(35)SE1", "product": { "name": "12.2(35)SE1", "product_id": "CSAFPID-104815" } }, { "category": "service_pack", "name": "12.2(50)SE5", "product": { "name": "12.2(50)SE5", "product_id": "CSAFPID-104855" } }, { "category": "service_pack", "name": "12.2(44)SE1", "product": { "name": "12.2(44)SE1", "product_id": "CSAFPID-104970" } }, { "category": "service_pack", "name": "12.2(53)SE", "product": { "name": "12.2(53)SE", "product_id": "CSAFPID-104972" } }, { "category": "service_pack", "name": "12.2(37)SE1", "product": { "name": "12.2(37)SE1", "product_id": "CSAFPID-105043" } }, { "category": "service_pack", "name": "12.2(25)SE3", "product": { "name": "12.2(25)SE3", "product_id": "CSAFPID-105185" } }, { "category": "service_pack", "name": "12.2(35)SE3", "product": { "name": "12.2(35)SE3", "product_id": "CSAFPID-105186" } }, { "category": "service_pack", "name": "12.2(44)SE4", "product": { "name": "12.2(44)SE4", "product_id": "CSAFPID-105285" } }, { "category": "service_pack", "name": "12.2(55)SE3", "product": { "name": "12.2(55)SE3", "product_id": "CSAFPID-105394" } }, { "category": "service_pack", "name": "12.2(55)SE2", "product": { "name": "12.2(55)SE2", "product_id": "CSAFPID-105689" } }, { "category": "service_pack", "name": "12.2(40)SE", "product": { "name": "12.2(40)SE", "product_id": "CSAFPID-105780" } }, { "category": "service_pack", "name": "12.2(44)SE", "product": { "name": "12.2(44)SE", "product_id": "CSAFPID-105881" } }, { "category": "service_pack", "name": "12.2(52)SE", "product": { "name": "12.2(52)SE", "product_id": "CSAFPID-105973" } }, { "category": "service_pack", "name": "12.2(58)SE", "product": { "name": "12.2(58)SE", "product_id": "CSAFPID-105987" } }, { "category": "service_pack", "name": "12.2(50)SE3", "product": { "name": "12.2(50)SE3", "product_id": "CSAFPID-106016" } }, { "category": "service_pack", "name": "12.2(55)SE1", "product": { "name": "12.2(55)SE1", "product_id": "CSAFPID-106029" } }, { "category": "service_pack", "name": "12.2(35)SE2", "product": { "name": "12.2(35)SE2", "product_id": "CSAFPID-106071" } }, { "category": "service_pack", "name": "12.2(18)SE1", "product": { "name": "12.2(18)SE1", "product_id": "CSAFPID-106163" } }, { "category": "service_pack", "name": "12.2(40)SE1", "product": { "name": "12.2(40)SE1", "product_id": "CSAFPID-106203" } }, { "category": "service_pack", "name": "12.2(20)SE1", "product": { "name": "12.2(20)SE1", "product_id": "CSAFPID-106232" } }, { "category": "service_pack", "name": "12.2(44)SE6", "product": { "name": "12.2(44)SE6", "product_id": "CSAFPID-106323" } }, { "category": "service_pack", "name": "12.2(44)SE3", "product": { "name": "12.2(44)SE3", "product_id": "CSAFPID-106526" } }, { "category": "service_pack", "name": "12.2(53)SE2", "product": { "name": "12.2(53)SE2", "product_id": "CSAFPID-106606" } }, { "category": "service_pack", "name": "12.2(52)SE1", "product": { "name": "12.2(52)SE1", "product_id": "CSAFPID-106684" } }, { "category": "service_pack", "name": "12.2(46)SE1", "product": { "name": "12.2(46)SE1", "product_id": "CSAFPID-106997" } }, { "category": "service_pack", "name": "12.2(20)SE2", "product": { "name": "12.2(20)SE2", "product_id": "CSAFPID-107002" } }, { "category": "service_pack", "name": "12.2(54)SE", "product": { "name": "12.2(54)SE", "product_id": "CSAFPID-107135" } }, { "category": "service_pack", "name": "12.2(44)SE5", "product": { "name": "12.2(44)SE5", "product_id": "CSAFPID-107142" } }, { "category": "service_pack", "name": "12.2(50)SE4", "product": { "name": "12.2(50)SE4", "product_id": "CSAFPID-107209" } }, { "category": "service_pack", "name": "12.2(50)SE", "product": { "name": "12.2(50)SE", "product_id": "CSAFPID-107630" } }, { "category": "service_pack", "name": "12.2(20)SE4", "product": { "name": "12.2(20)SE4", "product_id": "CSAFPID-107692" } }, { "category": "service_pack", "name": "12.2(58)SE1", "product": { "name": "12.2(58)SE1", "product_id": "CSAFPID-109098" } }, { "category": "service_pack", "name": "12.2(55)SE4", "product": { "name": "12.2(55)SE4", "product_id": "CSAFPID-109439" } }, { "category": "service_pack", "name": "12.2(58)SE2", "product": { "name": "12.2(58)SE2", "product_id": "CSAFPID-109808" } }, { "category": "service_pack", "name": "12.2(55)SE5", "product": { "name": "12.2(55)SE5", "product_id": "CSAFPID-111674" } }, { "category": "service_pack", "name": "12.2(55)SE6", "product": { "name": "12.2(55)SE6", "product_id": "CSAFPID-114665" } }, { "category": "service_pack", "name": "12.2(55)SE7", "product": { "name": "12.2(55)SE7", "product_id": "CSAFPID-184125" } }, { "category": "service_pack", "name": "12.2(55)SE8", "product": { "name": "12.2(55)SE8", "product_id": "CSAFPID-189187" } }, { "category": "service_pack", "name": "12.2(55)SE9", "product": { "name": "12.2(55)SE9", "product_id": "CSAFPID-192911" } }, { "category": "service_pack", "name": "12.2(55)SE10", "product": { "name": "12.2(55)SE10", "product_id": "CSAFPID-198542" } }, { "category": "service_pack", "name": "12.2(55)SE11", "product": { "name": "12.2(55)SE11", "product_id": "CSAFPID-210732" } } ], "category": "product_version", "name": "12.2SE" }, { "branches": [ { "category": "service_pack", "name": "12.1(14)AZ", "product": { "name": "12.1(14)AZ", "product_id": "CSAFPID-59974" } } ], "category": "product_version", "name": "12.1AZ" }, { "branches": [ { "category": "service_pack", "name": "12.2(20)EU", "product": { "name": "12.2(20)EU", "product_id": "CSAFPID-60365" } }, { "category": "service_pack", "name": "12.2(20)EU1", "product": { "name": "12.2(20)EU1", "product_id": "CSAFPID-105216" } }, { "category": "service_pack", "name": "12.2(20)EU2", "product": { "name": "12.2(20)EU2", "product_id": "CSAFPID-106930" } } ], "category": "product_version", "name": "12.2EU" }, { "branches": [ { "category": "service_pack", "name": "12.2(20)EX", "product": { "name": "12.2(20)EX", "product_id": "CSAFPID-63905" } }, { "category": "service_pack", "name": "12.2(44)EX", "product": { "name": "12.2(44)EX", "product_id": "CSAFPID-104061" } }, { "category": "service_pack", "name": "12.2(40)EX3", "product": { "name": "12.2(40)EX3", "product_id": "CSAFPID-104578" } }, { "category": "service_pack", "name": "12.2(40)EX", "product": { "name": "12.2(40)EX", "product_id": "CSAFPID-104662" } }, { "category": "service_pack", "name": "12.2(52)EX", "product": { "name": "12.2(52)EX", "product_id": "CSAFPID-105183" } }, { "category": "service_pack", "name": "12.2(44)EX1", "product": { "name": "12.2(44)EX1", "product_id": "CSAFPID-105253" } }, { "category": "service_pack", "name": "12.2(40)EX2", "product": { "name": "12.2(40)EX2", "product_id": "CSAFPID-106449" } }, { "category": "service_pack", "name": "12.2(40)EX1", "product": { "name": "12.2(40)EX1", "product_id": "CSAFPID-106564" } }, { "category": "service_pack", "name": "12.2(55)EX", "product": { "name": "12.2(55)EX", "product_id": "CSAFPID-106674" } }, { "category": "service_pack", "name": "12.2(46)EX", "product": { "name": "12.2(46)EX", "product_id": "CSAFPID-106733" } }, { "category": "service_pack", "name": "12.2(52)EX1", "product": { "name": "12.2(52)EX1", "product_id": "CSAFPID-107664" } }, { "category": "service_pack", "name": "12.2(55)EX1", "product": { "name": "12.2(55)EX1", "product_id": "CSAFPID-108306" } }, { "category": "service_pack", "name": "12.2(55)EX2", "product": { "name": "12.2(55)EX2", "product_id": "CSAFPID-109760" } }, { "category": "service_pack", "name": "12.2(55)EX3", "product": { "name": "12.2(55)EX3", "product_id": "CSAFPID-111019" } }, { "category": "service_pack", "name": "12.2(58)EX", "product": { "name": "12.2(58)EX", "product_id": "CSAFPID-113948" } } ], "category": "product_version", "name": "12.2EX" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)SEB", "product": { "name": "12.2(25)SEB", "product_id": "CSAFPID-63918" } }, { "category": "service_pack", "name": "12.2(25)SEB2", "product": { "name": "12.2(25)SEB2", "product_id": "CSAFPID-105058" } }, { "category": "service_pack", "name": "12.2(25)SEB1", "product": { "name": "12.2(25)SEB1", "product_id": "CSAFPID-105111" } }, { "category": "service_pack", "name": "12.2(25)SEB4", "product": { "name": "12.2(25)SEB4", "product_id": "CSAFPID-105430" } }, { "category": "service_pack", "name": "12.2(25)SEB3", "product": { "name": "12.2(25)SEB3", "product_id": "CSAFPID-106401" } } ], "category": "product_version", "name": "12.2SEB" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)SEA", "product": { "name": "12.2(25)SEA", "product_id": "CSAFPID-63911" } } ], "category": "product_version", "name": "12.2SEA" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)EY", "product": { "name": "12.2(25)EY", "product_id": "CSAFPID-62580" } }, { "category": "service_pack", "name": "12.2(46)EY", "product": { "name": "12.2(46)EY", "product_id": "CSAFPID-103473" } }, { "category": "service_pack", "name": "12.2(55)EY", "product": { "name": "12.2(55)EY", "product_id": "CSAFPID-103559" } }, { "category": "service_pack", "name": "12.2(25)EY1", "product": { "name": "12.2(25)EY1", "product_id": "CSAFPID-104642" } }, { "category": "service_pack", "name": "12.2(53)EY", "product": { "name": "12.2(53)EY", "product_id": "CSAFPID-105299" } }, { "category": "service_pack", "name": "12.2(25)EY3", "product": { "name": "12.2(25)EY3", "product_id": "CSAFPID-105704" } }, { "category": "service_pack", "name": "12.2(37)EY", "product": { "name": "12.2(37)EY", "product_id": "CSAFPID-106059" } }, { "category": "service_pack", "name": "12.2(25)EY2", "product": { "name": "12.2(25)EY2", "product_id": "CSAFPID-106540" } }, { "category": "service_pack", "name": "12.2(25)EY4", "product": { "name": "12.2(25)EY4", "product_id": "CSAFPID-107591" } } ], "category": "product_version", "name": "12.2EY" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)EZ", "product": { "name": "12.2(25)EZ", "product_id": "CSAFPID-63913" } }, { "category": "service_pack", "name": "12.2(25)EZ1", "product": { "name": "12.2(25)EZ1", "product_id": "CSAFPID-104313" } }, { "category": "service_pack", "name": "12.2(58)EZ", "product": { "name": "12.2(58)EZ", "product_id": "CSAFPID-104806" } }, { "category": "service_pack", "name": "12.2(53)EZ", "product": { "name": "12.2(53)EZ", "product_id": "CSAFPID-105444" } }, { "category": "service_pack", "name": "12.2(55)EZ", "product": { "name": "12.2(55)EZ", "product_id": "CSAFPID-107283" } }, { "category": "service_pack", "name": "12.2(60)EZ4", "product": { "name": "12.2(60)EZ4", "product_id": "CSAFPID-197480" } }, { "category": "service_pack", "name": "12.2(60)EZ5", "product": { "name": "12.2(60)EZ5", "product_id": "CSAFPID-204099" } } ], "category": "product_version", "name": "12.2EZ" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)SEC", "product": { "name": "12.2(25)SEC", "product_id": "CSAFPID-63919" } }, { "category": "service_pack", "name": "12.2(25)SEC2", "product": { "name": "12.2(25)SEC2", "product_id": "CSAFPID-104100" } }, { "category": "service_pack", "name": "12.2(25)SEC1", "product": { "name": "12.2(25)SEC1", "product_id": "CSAFPID-105923" } } ], "category": "product_version", "name": "12.2SEC" }, { "branches": [ { "category": "service_pack", "name": "12.2(31)SG", "product": { "name": "12.2(31)SG", "product_id": "CSAFPID-60292" } }, { "category": "service_pack", "name": "12.2(25)SG", "product": { "name": "12.2(25)SG", "product_id": "CSAFPID-60399" } }, { "category": "service_pack", "name": "12.2(37)SG", "product": { "name": "12.2(37)SG", "product_id": "CSAFPID-69479" } }, { "category": "service_pack", "name": "12.2(44)SG", "product": { "name": "12.2(44)SG", "product_id": "CSAFPID-78260" } }, { "category": "service_pack", "name": "12.2(50)SG3", "product": { "name": "12.2(50)SG3", "product_id": "CSAFPID-103492" } }, { "category": "service_pack", "name": "12.2(31)SG1", "product": { "name": "12.2(31)SG1", "product_id": "CSAFPID-103646" } }, { "category": "service_pack", "name": "12.2(53)SG", "product": { "name": "12.2(53)SG", "product_id": "CSAFPID-103649" } }, { "category": "service_pack", "name": "12.2(31)SG3", "product": { "name": "12.2(31)SG3", "product_id": "CSAFPID-103678" } }, { "category": "service_pack", "name": "12.2(50)SG6", "product": { "name": "12.2(50)SG6", "product_id": "CSAFPID-103766" } }, { "category": "service_pack", "name": "12.2(53)SG1", "product": { "name": "12.2(53)SG1", "product_id": "CSAFPID-103775" } }, { "category": "service_pack", "name": "12.2(46)SG", "product": { "name": "12.2(46)SG", "product_id": "CSAFPID-104041" } }, { "category": "service_pack", "name": "12.2(25)SG1", "product": { "name": "12.2(25)SG1", "product_id": "CSAFPID-104158" } }, { "category": "service_pack", "name": "12.2(53)SG2", "product": { "name": "12.2(53)SG2", "product_id": "CSAFPID-104254" } }, { "category": "service_pack", "name": "12.2(50)SG5", "product": { "name": "12.2(50)SG5", "product_id": "CSAFPID-104591" } }, { "category": "service_pack", "name": "12.2(37)SG1", "product": { "name": "12.2(37)SG1", "product_id": "CSAFPID-104696" } }, { "category": "service_pack", "name": "12.2(53)SG3", "product": { "name": "12.2(53)SG3", "product_id": "CSAFPID-104833" } }, { "category": "service_pack", "name": "12.2(50)SG8", "product": { "name": "12.2(50)SG8", "product_id": "CSAFPID-104896" } }, { "category": "service_pack", "name": "12.2(25)SG3", "product": { "name": "12.2(25)SG3", "product_id": "CSAFPID-105290" } }, { "category": "service_pack", "name": "12.2(50)SG2", "product": { "name": "12.2(50)SG2", "product_id": "CSAFPID-105302" } }, { "category": "service_pack", "name": "12.2(40)SG", "product": { "name": "12.2(40)SG", "product_id": "CSAFPID-105485" } }, { "category": "service_pack", "name": "12.2(25)SG2", "product": { "name": "12.2(25)SG2", "product_id": "CSAFPID-105513" } }, { "category": "service_pack", "name": "12.2(54)SG1", "product": { "name": "12.2(54)SG1", "product_id": "CSAFPID-105741" } }, { "category": "service_pack", "name": "12.2(44)SG1", "product": { "name": "12.2(44)SG1", "product_id": "CSAFPID-105765" } }, { "category": "service_pack", "name": "12.2(50)SG1", "product": { "name": "12.2(50)SG1", "product_id": "CSAFPID-106145" } }, { "category": "service_pack", "name": "12.2(52)SG", "product": { "name": "12.2(52)SG", "product_id": "CSAFPID-106156" } }, { "category": "service_pack", "name": "12.2(54)SG", "product": { "name": "12.2(54)SG", "product_id": "CSAFPID-106291" } }, { "category": "service_pack", "name": "12.2(31)SG2", "product": { "name": "12.2(31)SG2", "product_id": "CSAFPID-107077" } }, { "category": "service_pack", "name": "12.2(50)SG", "product": { "name": "12.2(50)SG", "product_id": "CSAFPID-107108" } }, { "category": "service_pack", "name": "12.2(25)SG4", "product": { "name": "12.2(25)SG4", "product_id": "CSAFPID-107112" } }, { "category": "service_pack", "name": "12.2(50)SG7", "product": { "name": "12.2(50)SG7", "product_id": "CSAFPID-107301" } }, { "category": "service_pack", "name": "12.2(53)SG4", "product": { "name": "12.2(53)SG4", "product_id": "CSAFPID-107304" } }, { "category": "service_pack", "name": "12.2(50)SG4", "product": { "name": "12.2(50)SG4", "product_id": "CSAFPID-107495" } }, { "category": "service_pack", "name": "12.2(46)SG1", "product": { "name": "12.2(46)SG1", "product_id": "CSAFPID-107645" } }, { "category": "service_pack", "name": "12.2(53)SG5", "product": { "name": "12.2(53)SG5", "product_id": "CSAFPID-108062" } }, { "category": "service_pack", "name": "12.2(53)SG6", "product": { "name": "12.2(53)SG6", "product_id": "CSAFPID-109242" } }, { "category": "service_pack", "name": "12.2(53)SG7", "product": { "name": "12.2(53)SG7", "product_id": "CSAFPID-112131" } }, { "category": "service_pack", "name": "12.2(53)SG8", "product": { "name": "12.2(53)SG8", "product_id": "CSAFPID-117280" } }, { "category": "service_pack", "name": "12.2(53)SG9", "product": { "name": "12.2(53)SG9", "product_id": "CSAFPID-184567" } }, { "category": "service_pack", "name": "12.2(53)SG10", "product": { "name": "12.2(53)SG10", "product_id": "CSAFPID-188816" } }, { "category": "service_pack", "name": "12.2(53)SG11", "product": { "name": "12.2(53)SG11", "product_id": "CSAFPID-197488" } } ], "category": "product_version", "name": "12.2SG" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)FX", "product": { "name": "12.2(25)FX", "product_id": "CSAFPID-63914" } } ], "category": "product_version", "name": "12.2FX" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)FY", "product": { "name": "12.2(25)FY", "product_id": "CSAFPID-63915" } } ], "category": "product_version", "name": "12.2FY" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)SEF", "product": { "name": "12.2(25)SEF", "product_id": "CSAFPID-60350" } }, { "category": "service_pack", "name": "12.2(25)SEF1", "product": { "name": "12.2(25)SEF1", "product_id": "CSAFPID-62601" } }, { "category": "service_pack", "name": "12.2(25)SEF2", "product": { "name": "12.2(25)SEF2", "product_id": "CSAFPID-103684" } }, { "category": "service_pack", "name": "12.2(25)SEF3", "product": { "name": "12.2(25)SEF3", "product_id": "CSAFPID-103801" } } ], "category": "product_version", "name": "12.2SEF" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)SEE", "product": { "name": "12.2(25)SEE", "product_id": "CSAFPID-60351" } }, { "category": "service_pack", "name": "12.2(25)SEE1", "product": { "name": "12.2(25)SEE1", "product_id": "CSAFPID-62587" } }, { "category": "service_pack", "name": "12.2(25)SEE3", "product": { "name": "12.2(25)SEE3", "product_id": "CSAFPID-95363" } }, { "category": "service_pack", "name": "12.2(25)SEE4", "product": { "name": "12.2(25)SEE4", "product_id": "CSAFPID-104355" } }, { "category": "service_pack", "name": "12.2(25)SEE2", "product": { "name": "12.2(25)SEE2", "product_id": "CSAFPID-105965" } } ], "category": "product_version", "name": "12.2SEE" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)SED", "product": { "name": "12.2(25)SED", "product_id": "CSAFPID-63920" } }, { "category": "service_pack", "name": "12.2(25)SED1", "product": { "name": "12.2(25)SED1", "product_id": "CSAFPID-107476" } } ], "category": "product_version", "name": "12.2SED" }, { "branches": [ { "category": "service_pack", "name": "12.2(31)SGA", "product": { "name": "12.2(31)SGA", "product_id": "CSAFPID-63936" } }, { "category": "service_pack", "name": "12.2(31)SGA3", "product": { "name": "12.2(31)SGA3", "product_id": "CSAFPID-104153" } }, { "category": "service_pack", "name": "12.2(31)SGA2", "product": { "name": "12.2(31)SGA2", "product_id": "CSAFPID-104467" } }, { "category": "service_pack", "name": "12.2(31)SGA10", "product": { "name": "12.2(31)SGA10", "product_id": "CSAFPID-105392" } }, { "category": "service_pack", "name": "12.2(31)SGA5", "product": { "name": "12.2(31)SGA5", "product_id": "CSAFPID-105466" } }, { "category": "service_pack", "name": "12.2(31)SGA4", "product": { "name": "12.2(31)SGA4", "product_id": "CSAFPID-105539" } }, { "category": "service_pack", "name": "12.2(31)SGA11", "product": { "name": "12.2(31)SGA11", "product_id": "CSAFPID-105572" } }, { "category": "service_pack", "name": "12.2(31)SGA6", "product": { "name": "12.2(31)SGA6", "product_id": "CSAFPID-105760" } }, { "category": "service_pack", "name": "12.2(31)SGA1", "product": { "name": "12.2(31)SGA1", "product_id": "CSAFPID-105824" } }, { "category": "service_pack", "name": "12.2(31)SGA7", "product": { "name": "12.2(31)SGA7", "product_id": "CSAFPID-106496" } }, { "category": "service_pack", "name": "12.2(31)SGA8", "product": { "name": "12.2(31)SGA8", "product_id": "CSAFPID-106746" } }, { "category": "service_pack", "name": "12.2(31)SGA9", "product": { "name": "12.2(31)SGA9", "product_id": "CSAFPID-106971" } } ], "category": "product_version", "name": "12.2SGA" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)SEG", "product": { "name": "12.2(25)SEG", "product_id": "CSAFPID-60358" } }, { "category": "service_pack", "name": "12.2(25)SEG1", "product": { "name": "12.2(25)SEG1", "product_id": "CSAFPID-106247" } }, { "category": "service_pack", "name": "12.2(25)SEG3", "product": { "name": "12.2(25)SEG3", "product_id": "CSAFPID-107325" } } ], "category": "product_version", "name": "12.2SEG" }, { "branches": [ { "category": "service_pack", "name": "12.2(25)FZ", "product": { "name": "12.2(25)FZ", "product_id": "CSAFPID-60368" } } ], "category": "product_version", "name": "12.2FZ" }, { "branches": [ { "category": "service_pack", "name": "12.2(44)SQ", "product": { "name": "12.2(44)SQ", "product_id": "CSAFPID-103930" } }, { "category": "service_pack", "name": "12.2(44)SQ2", "product": { "name": "12.2(44)SQ2", "product_id": "CSAFPID-104091" } }, { "category": "service_pack", "name": "12.2(50)SQ2", "product": { "name": "12.2(50)SQ2", "product_id": "CSAFPID-104427" } }, { "category": "service_pack", "name": "12.2(50)SQ1", "product": { "name": "12.2(50)SQ1", "product_id": "CSAFPID-104743" } }, { "category": "service_pack", "name": "12.2(50)SQ", "product": { "name": "12.2(50)SQ", "product_id": "CSAFPID-106466" } }, { "category": "service_pack", "name": "12.2(50)SQ3", "product": { "name": "12.2(50)SQ3", "product_id": "CSAFPID-108172" } }, { "category": "service_pack", "name": "12.2(50)SQ4", "product": { "name": "12.2(50)SQ4", "product_id": "CSAFPID-111045" } }, { "category": "service_pack", "name": "12.2(50)SQ5", "product": { "name": "12.2(50)SQ5", "product_id": "CSAFPID-185274" } }, { "category": "service_pack", "name": "12.2(50)SQ6", "product": { "name": "12.2(50)SQ6", "product_id": "CSAFPID-194649" } }, { "category": "service_pack", "name": "12.2(50)SQ7", "product": { "name": "12.2(50)SQ7", "product_id": "CSAFPID-202716" } } ], "category": "product_version", "name": "12.2SQ" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)XO1", "product": { "name": "15.0(1)XO1", "product_id": "CSAFPID-103955" } }, { "category": "service_pack", "name": "15.0(1)XO", "product": { "name": "15.0(1)XO", "product_id": "CSAFPID-106072" } }, { "category": "service_pack", "name": "15.0(2)XO", "product": { "name": "15.0(2)XO", "product_id": "CSAFPID-111005" } } ], "category": "product_version", "name": "15.0XO" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)EY", "product": { "name": "15.0(1)EY", "product_id": "CSAFPID-104376" } }, { "category": "service_pack", "name": "15.0(1)EY1", "product": { "name": "15.0(1)EY1", "product_id": "CSAFPID-115969" } }, { "category": "service_pack", "name": "15.0(1)EY2", "product": { "name": "15.0(1)EY2", "product_id": "CSAFPID-187269" } }, { "category": "service_pack", "name": "15.0(2)EY", "product": { "name": "15.0(2)EY", "product_id": "CSAFPID-187932" } }, { "category": "service_pack", "name": "15.0(2)EY1", "product": { "name": "15.0(2)EY1", "product_id": "CSAFPID-190250" } }, { "category": "service_pack", "name": "15.0(2)EY2", "product": { "name": "15.0(2)EY2", "product_id": "CSAFPID-192831" } }, { "category": "service_pack", "name": "15.0(2)EY3", "product": { "name": "15.0(2)EY3", "product_id": "CSAFPID-195481" } } ], "category": "product_version", "name": "15.0EY" }, { "branches": [ { "category": "service_pack", "name": "12.2(54)WO", "product": { "name": "12.2(54)WO", "product_id": "CSAFPID-104719" } } ], "category": "product_version", "name": "12.2WO" }, { "branches": [ { "category": "service_pack", "name": "12.2(27)SBK9", "product": { "name": "12.2(27)SBK9", "product_id": "CSAFPID-107832" } } ], "category": "product_version", "name": "12.2SBK" }, { "branches": [ { "category": "service_pack", "name": "15.0(1)SE", "product": { "name": "15.0(1)SE", "product_id": "CSAFPID-105660" } }, { "category": "service_pack", "name": "15.0(2)SE", "product": { "name": "15.0(2)SE", "product_id": "CSAFPID-107852" } }, { "category": "service_pack", "name": "15.0(1)SE1", "product": { "name": "15.0(1)SE1", "product_id": "CSAFPID-111010" } }, { "category": "service_pack", "name": "15.0(1)SE2", "product": { "name": "15.0(1)SE2", "product_id": "CSAFPID-113961" } }, { "category": "service_pack", "name": "15.0(1)SE3", "product": { "name": "15.0(1)SE3", "product_id": "CSAFPID-115832" } }, { "category": "service_pack", "name": "15.0(2)SE1", "product": { "name": "15.0(2)SE1", "product_id": "CSAFPID-115939" } }, { "category": "service_pack", "name": "15.0(2)SE2", "product": { "name": "15.0(2)SE2", "product_id": "CSAFPID-116083" } }, { "category": "service_pack", "name": "15.0(2)SE3", "product": { "name": "15.0(2)SE3", "product_id": "CSAFPID-189455" } }, { "category": "service_pack", "name": "15.0(2)SE4", "product": { "name": "15.0(2)SE4", "product_id": "CSAFPID-190635" } }, { "category": "service_pack", "name": "15.0(2)SE5", "product": { "name": "15.0(2)SE5", "product_id": "CSAFPID-192706" } }, { "category": "service_pack", "name": "15.0(2)SE6", "product": { "name": "15.0(2)SE6", "product_id": "CSAFPID-195770" } }, { "category": "service_pack", "name": "15.0(2)SE7", "product": { "name": "15.0(2)SE7", "product_id": "CSAFPID-204097" } }, { "category": "service_pack", "name": "15.0(2)SE8", "product": { "name": "15.0(2)SE8", "product_id": "CSAFPID-209028" } }, { "category": "service_pack", "name": "15.0(2)SE9", "product": { "name": "15.0(2)SE9", "product_id": "CSAFPID-209029" } }, { "category": "service_pack", "name": "15.0(2a)SE9", "product": { "name": "15.0(2a)SE9", "product_id": "CSAFPID-212329" } }, { "category": "service_pack", "name": "15.0(2)SE10", "product": { "name": "15.0(2)SE10", "product_id": "CSAFPID-213788" } }, { "category": "service_pack", "name": "15.0(2)SE10a", "product": { "name": "15.0(2)SE10a", "product_id": "CSAFPID-222342" } } ], "category": "product_version", "name": "15.0SE" }, { "branches": [ { "category": "service_pack", "name": "15.1(1)SG", "product": { "name": "15.1(1)SG", "product_id": "CSAFPID-106089" } }, { "category": "service_pack", "name": "15.1(2)SG", "product": { "name": "15.1(2)SG", "product_id": "CSAFPID-115477" } }, { "category": "service_pack", "name": "15.1(1)SG1", "product": { "name": "15.1(1)SG1", "product_id": "CSAFPID-117196" } }, { "category": "service_pack", "name": "15.1(1)SG2", "product": { "name": "15.1(1)SG2", "product_id": "CSAFPID-185281" } }, { "category": "service_pack", "name": "15.1(2)SG1", "product": { "name": "15.1(2)SG1", "product_id": "CSAFPID-188035" } }, { "category": "service_pack", "name": "15.1(2)SG2", "product": { "name": "15.1(2)SG2", "product_id": "CSAFPID-193283" } }, { "category": "service_pack", "name": "15.1(2)SG3", "product": { "name": "15.1(2)SG3", "product_id": "CSAFPID-194741" } }, { "category": "service_pack", "name": "15.1(2)SG4", "product": { "name": "15.1(2)SG4", "product_id": "CSAFPID-195489" } }, { "category": "service_pack", "name": "15.1(2)SG5", "product": { "name": "15.1(2)SG5", "product_id": "CSAFPID-197465" } }, { "category": "service_pack", "name": "15.1(2)SG6", "product": { "name": "15.1(2)SG6", "product_id": "CSAFPID-204187" } }, { "category": "service_pack", "name": "15.1(2)SG7", "product": { "name": "15.1(2)SG7", "product_id": "CSAFPID-209034" } }, { "category": "service_pack", "name": "15.1(2)SG8", "product": { "name": "15.1(2)SG8", "product_id": "CSAFPID-214992" } } ], "category": "product_version", "name": "15.1SG" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SG", "product": { "name": "15.0(2)SG", "product_id": "CSAFPID-107094" } }, { "category": "service_pack", "name": "15.0(2)SG1", "product": { "name": "15.0(2)SG1", "product_id": "CSAFPID-110186" } }, { "category": "service_pack", "name": "15.0(2)SG2", "product": { "name": "15.0(2)SG2", "product_id": "CSAFPID-111384" } }, { "category": "service_pack", "name": "15.0(2)SG3", "product": { "name": "15.0(2)SG3", "product_id": "CSAFPID-112141" } }, { "category": "service_pack", "name": "15.0(2)SG4", "product": { "name": "15.0(2)SG4", "product_id": "CSAFPID-114093" } }, { "category": "service_pack", "name": "15.0(2)SG5", "product": { "name": "15.0(2)SG5", "product_id": "CSAFPID-115688" } }, { "category": "service_pack", "name": "15.0(2)SG6", "product": { "name": "15.0(2)SG6", "product_id": "CSAFPID-117871" } }, { "category": "service_pack", "name": "15.0(2)SG7", "product": { "name": "15.0(2)SG7", "product_id": "CSAFPID-187233" } }, { "category": "service_pack", "name": "15.0(2)SG8", "product": { "name": "15.0(2)SG8", "product_id": "CSAFPID-192163" } }, { "category": "service_pack", "name": "15.0(2)SG9", "product": { "name": "15.0(2)SG9", "product_id": "CSAFPID-197481" } }, { "category": "service_pack", "name": "15.0(2)SG10", "product": { "name": "15.0(2)SG10", "product_id": "CSAFPID-209030" } }, { "category": "service_pack", "name": "15.0(2)SG11", "product": { "name": "15.0(2)SG11", "product_id": "CSAFPID-209031" } } ], "category": "product_version", "name": "15.0SG" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EX", "product": { "name": "15.0(2)EX", "product_id": "CSAFPID-189064" } }, { "category": "service_pack", "name": "15.0(2)EX1", "product": { "name": "15.0(2)EX1", "product_id": "CSAFPID-189115" } }, { "category": "service_pack", "name": "15.0(2)EX2", "product": { "name": "15.0(2)EX2", "product_id": "CSAFPID-192910" } }, { "category": "service_pack", "name": "15.0(2)EX3", "product": { "name": "15.0(2)EX3", "product_id": "CSAFPID-194540" } }, { "category": "service_pack", "name": "15.0(2)EX4", "product": { "name": "15.0(2)EX4", "product_id": "CSAFPID-194913" } }, { "category": "service_pack", "name": "15.0(2)EX5", "product": { "name": "15.0(2)EX5", "product_id": "CSAFPID-195943" } }, { "category": "service_pack", "name": "15.0(2)EX6", "product": { "name": "15.0(2)EX6", "product_id": "CSAFPID-200496" } }, { "category": "service_pack", "name": "15.0(2)EX7", "product": { "name": "15.0(2)EX7", "product_id": "CSAFPID-201366" } }, { "category": "service_pack", "name": "15.0(2)EX8", "product": { "name": "15.0(2)EX8", "product_id": "CSAFPID-204831" } }, { "category": "service_pack", "name": "15.0(2a)EX5", "product": { "name": "15.0(2a)EX5", "product_id": "CSAFPID-205064" } }, { "category": "service_pack", "name": "15.0(2)EX10", "product": { "name": "15.0(2)EX10", "product_id": "CSAFPID-211570" } }, { "category": "service_pack", "name": "15.0(2)EX11", "product": { "name": "15.0(2)EX11", "product_id": "CSAFPID-214797" } }, { "category": "service_pack", "name": "15.0(2)EX13", "product": { "name": "15.0(2)EX13", "product_id": "CSAFPID-225160" } }, { "category": "service_pack", "name": "15.0(2)EX12", "product": { "name": "15.0(2)EX12", "product_id": "CSAFPID-230965" } } ], "category": "product_version", "name": "15.0EX" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EA1", "product": { "name": "15.0(2)EA1", "product_id": "CSAFPID-193033" } } ], "category": "product_version", "name": "15.0EA" }, { "branches": [ { "category": "service_pack", "name": "15.2(1)E", "product": { "name": "15.2(1)E", "product_id": "CSAFPID-183811" } }, { "category": "service_pack", "name": "15.2(2)E", "product": { "name": "15.2(2)E", "product_id": "CSAFPID-187057" } }, { "category": "service_pack", "name": "15.2(1)E1", "product": { "name": "15.2(1)E1", "product_id": "CSAFPID-195469" } }, { "category": "service_pack", "name": "15.2(3)E", "product": { "name": "15.2(3)E", "product_id": "CSAFPID-197483" } }, { "category": "service_pack", "name": "15.2(1)E2", "product": { "name": "15.2(1)E2", "product_id": "CSAFPID-198060" } }, { "category": "service_pack", "name": "15.2(1)E3", "product": { "name": "15.2(1)E3", "product_id": "CSAFPID-200488" } }, { "category": "service_pack", "name": "15.2(2)E1", "product": { "name": "15.2(2)E1", "product_id": "CSAFPID-201074" } }, { "category": "service_pack", "name": "15.2(2b)E", "product": { "name": "15.2(2b)E", "product_id": "CSAFPID-204102" } }, { "category": "service_pack", "name": "15.2(4)E", "product": { "name": "15.2(4)E", "product_id": "CSAFPID-204108" } }, { "category": "service_pack", "name": "15.2(3)E1", "product": { "name": "15.2(3)E1", "product_id": "CSAFPID-204186" } }, { "category": "service_pack", "name": "15.2(2)E2", "product": { "name": "15.2(2)E2", "product_id": "CSAFPID-204228" } }, { "category": "service_pack", "name": "15.2(2a)E1", "product": { "name": "15.2(2a)E1", "product_id": "CSAFPID-204818" } }, { "category": "service_pack", "name": "15.2(2)E3", "product": { "name": "15.2(2)E3", "product_id": "CSAFPID-205672" } }, { "category": "service_pack", "name": "15.2(2a)E2", "product": { "name": "15.2(2a)E2", "product_id": "CSAFPID-209045" } }, { "category": "service_pack", "name": "15.2(3)E2", "product": { "name": "15.2(3)E2", "product_id": "CSAFPID-209046" } }, { "category": "service_pack", "name": "15.2(3a)E", "product": { "name": "15.2(3a)E", "product_id": "CSAFPID-209047" } }, { "category": "service_pack", "name": "15.2(3)E3", "product": { "name": "15.2(3)E3", "product_id": "CSAFPID-209358" } }, { "category": "service_pack", "name": "15.2(3m)E2", "product": { "name": "15.2(3m)E2", "product_id": "CSAFPID-209359" } }, { "category": "service_pack", "name": "15.2(4)E1", "product": { "name": "15.2(4)E1", "product_id": "CSAFPID-209887" } }, { "category": "service_pack", "name": "15.2(2)E4", "product": { "name": "15.2(2)E4", "product_id": "CSAFPID-210766" } }, { "category": "service_pack", "name": "15.2(2)E5", "product": { "name": "15.2(2)E5", "product_id": "CSAFPID-211296" } }, { "category": "service_pack", "name": "15.2(4)E2", "product": { "name": "15.2(4)E2", "product_id": "CSAFPID-213610" } }, { "category": "service_pack", "name": "15.2(4m)E1", "product": { "name": "15.2(4m)E1", "product_id": "CSAFPID-214072" } }, { "category": "service_pack", "name": "15.2(3)E4", "product": { "name": "15.2(3)E4", "product_id": "CSAFPID-214078" } }, { "category": "service_pack", "name": "15.2(5)E", "product": { "name": "15.2(5)E", "product_id": "CSAFPID-214556" } }, { "category": "service_pack", "name": "15.2(3m)E7", "product": { "name": "15.2(3m)E7", "product_id": "CSAFPID-216295" } }, { "category": "service_pack", "name": "15.2(4)E3", "product": { "name": "15.2(4)E3", "product_id": "CSAFPID-217805" } }, { "category": "service_pack", "name": "15.2(2)E6", "product": { "name": "15.2(2)E6", "product_id": "CSAFPID-218891" } }, { "category": "service_pack", "name": "15.2(5a)E", "product": { "name": "15.2(5a)E", "product_id": "CSAFPID-218995" } }, { "category": "service_pack", "name": "15.2(5)E1", "product": { "name": "15.2(5)E1", "product_id": "CSAFPID-220441" } }, { "category": "service_pack", "name": "15.2(5b)E", "product": { "name": "15.2(5b)E", "product_id": "CSAFPID-220457" } }, { "category": "service_pack", "name": "15.2(4m)E3", "product": { "name": "15.2(4m)E3", "product_id": "CSAFPID-220664" } }, { "category": "service_pack", "name": "15.2(3m)E8", "product": { "name": "15.2(3m)E8", "product_id": "CSAFPID-220689" } }, { "category": "service_pack", "name": "15.2(2)E5a", "product": { "name": "15.2(2)E5a", "product_id": "CSAFPID-221033" } }, { "category": "service_pack", "name": "15.2(5c)E", "product": { "name": "15.2(5c)E", "product_id": "CSAFPID-221137" } }, { "category": "service_pack", "name": "15.2(2)E5b", "product": { "name": "15.2(2)E5b", "product_id": "CSAFPID-222436" } }, { "category": "service_pack", "name": "15.2(4n)E2", "product": { "name": "15.2(4n)E2", "product_id": "CSAFPID-222500" } }, { "category": "service_pack", "name": "15.2(4o)E2", "product": { "name": "15.2(4o)E2", "product_id": "CSAFPID-222924" } }, { "category": "service_pack", "name": "15.2(5a)E1", "product": { "name": "15.2(5a)E1", "product_id": "CSAFPID-223143" } }, { "category": "service_pack", "name": "15.2(4p)E1", "product": { "name": "15.2(4p)E1", "product_id": "CSAFPID-226077" } }, { "category": "service_pack", "name": "15.2(4m)E2", "product": { "name": "15.2(4m)E2", "product_id": "CSAFPID-230588" } }, { "category": "service_pack", "name": "15.2(4o)E3", "product": { "name": "15.2(4o)E3", "product_id": "CSAFPID-230589" } }, { "category": "service_pack", "name": "15.2(4q)E1", "product": { "name": "15.2(4q)E1", "product_id": "CSAFPID-230590" } }, { "category": "service_pack", "name": "15.2(4s)E1", "product": { "name": "15.2(4s)E1", "product_id": "CSAFPID-241916" } }, { "category": "service_pack", "name": "15.2(4s)E2", "product": { "name": "15.2(4s)E2", "product_id": "CSAFPID-250628" } } ], "category": "product_version", "name": "15.2E" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EZ", "product": { "name": "15.0(2)EZ", "product_id": "CSAFPID-190637" } } ], "category": "product_version", "name": "15.0EZ" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)SC3", "product": { "name": "15.2(2)SC3", "product_id": "CSAFPID-209060" } } ], "category": "product_version", "name": "15.2SC" }, { "branches": [ { "category": "service_pack", "name": "15.2(1)EY", "product": { "name": "15.2(1)EY", "product_id": "CSAFPID-191928" } } ], "category": "product_version", "name": "15.2EY" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)EJ", "product": { "name": "15.0(2)EJ", "product_id": "CSAFPID-191948" } }, { "category": "service_pack", "name": "15.0(2)EJ1", "product": { "name": "15.0(2)EJ1", "product_id": "CSAFPID-197471" } } ], "category": "product_version", "name": "15.0EJ" }, { "branches": [ { "category": "service_pack", "name": "15.5(3)S10c", "product": { "name": "15.5(3)S10c", "product_id": "CSAFPID-284568" } } ], "category": "product_version", "name": "15.5S" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)EB", "product": { "name": "15.2(2)EB", "product_id": "CSAFPID-197462" } }, { "category": "service_pack", "name": "15.2(2)EB1", "product": { "name": "15.2(2)EB1", "product_id": "CSAFPID-209839" } }, { "category": "service_pack", "name": "15.2(2)EB2", "product": { "name": "15.2(2)EB2", "product_id": "CSAFPID-214218" } } ], "category": "product_version", "name": "15.2EB" }, { "branches": [ { "category": "service_pack", "name": "15.2(2)EA", "product": { "name": "15.2(2)EA", "product_id": "CSAFPID-198063" } }, { "category": "service_pack", "name": "15.2(2)EA1", "product": { "name": "15.2(2)EA1", "product_id": "CSAFPID-209049" } }, { "category": "service_pack", "name": "15.2(2)EA2", "product": { "name": "15.2(2)EA2", "product_id": "CSAFPID-209050" } }, { "category": "service_pack", "name": "15.2(3)EA", "product": { "name": "15.2(3)EA", "product_id": "CSAFPID-209051" } }, { "category": "service_pack", "name": "15.2(4)EA", "product": { "name": "15.2(4)EA", "product_id": "CSAFPID-210203" } }, { "category": "service_pack", "name": "15.2(4)EA1", "product": { "name": "15.2(4)EA1", "product_id": "CSAFPID-210958" } }, { "category": "service_pack", "name": "15.2(2)EA3", "product": { "name": "15.2(2)EA3", "product_id": "CSAFPID-214217" } }, { "category": "service_pack", "name": "15.2(4)EA3", "product": { "name": "15.2(4)EA3", "product_id": "CSAFPID-214965" } }, { "category": "service_pack", "name": "15.2(5)EA", "product": { "name": "15.2(5)EA", "product_id": "CSAFPID-220038" } }, { "category": "service_pack", "name": "15.2(4)EA4", "product": { "name": "15.2(4)EA4", "product_id": "CSAFPID-220460" } }, { "category": "service_pack", "name": "15.2(4)EA2", "product": { "name": "15.2(4)EA2", "product_id": "CSAFPID-220507" } }, { "category": "service_pack", "name": "15.2(4)EA5", "product": { "name": "15.2(4)EA5", "product_id": "CSAFPID-222419" } } ], "category": "product_version", "name": "15.2EA" }, { "branches": [ { "category": "service_pack", "name": "15.0(2)SQD", "product": { "name": "15.0(2)SQD", "product_id": "CSAFPID-204324" } }, { "category": "service_pack", "name": "15.0(2)SQD1", "product": { "name": "15.0(2)SQD1", "product_id": "CSAFPID-209628" } }, { "category": "service_pack", "name": "15.0(2)SQD2", "product": { "name": "15.0(2)SQD2", "product_id": "CSAFPID-211290" } }, { "category": "service_pack", "name": "15.0(2)SQD3", "product": { "name": "15.0(2)SQD3", "product_id": "CSAFPID-217078" } }, { "category": "service_pack", "name": "15.0(2)SQD4", "product": { "name": "15.0(2)SQD4", "product_id": "CSAFPID-220670" } }, { "category": "service_pack", "name": "15.0(2)SQD5", "product": { "name": "15.0(2)SQD5", "product_id": "CSAFPID-225358" } } ], "category": "product_version", "name": "15.0SQD" }, { "branches": [ { "category": "service_pack", "name": "15.2(4)EC1", "product": { "name": "15.2(4)EC1", "product_id": "CSAFPID-220461" } }, { "category": "service_pack", "name": "15.2(4)EC2", "product": { "name": "15.2(4)EC2", "product_id": "CSAFPID-223086" } } ], "category": "product_version", "name": "15.2EC" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVS", "product": { "name": "15.1(3)SVS", "product_id": "CSAFPID-277232" } } ], "category": "product_version", "name": "15.1SVS" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVT1", "product": { "name": "15.1(3)SVT1", "product_id": "CSAFPID-280759" } }, { "category": "service_pack", "name": "15.1(3)SVT3", "product": { "name": "15.1(3)SVT3", "product_id": "CSAFPID-284785" } }, { "category": "service_pack", "name": "15.1(3)SVT4", "product": { "name": "15.1(3)SVT4", "product_id": "CSAFPID-286399" } } ], "category": "product_version", "name": "15.1SVT" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVU1", "product": { "name": "15.1(3)SVU1", "product_id": "CSAFPID-283833" } }, { "category": "service_pack", "name": "15.1(3)SVU10", "product": { "name": "15.1(3)SVU10", "product_id": "CSAFPID-284291" } }, { "category": "service_pack", "name": "15.1(3)SVU2", "product": { "name": "15.1(3)SVU2", "product_id": "CSAFPID-284566" } }, { "category": "service_pack", "name": "15.1(3)SVU11", "product": { "name": "15.1(3)SVU11", "product_id": "CSAFPID-286400" } }, { "category": "service_pack", "name": "15.1(3)SVU21", "product": { "name": "15.1(3)SVU21", "product_id": "CSAFPID-290557" } } ], "category": "product_version", "name": "15.1SVU" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVV1", "product": { "name": "15.1(3)SVV1", "product_id": "CSAFPID-284341" } }, { "category": "service_pack", "name": "15.1(3)SVV2", "product": { "name": "15.1(3)SVV2", "product_id": "CSAFPID-286029" } }, { "category": "service_pack", "name": "15.1(3)SVV3", "product": { "name": "15.1(3)SVV3", "product_id": "CSAFPID-286940" } }, { "category": "service_pack", "name": "15.1(3)SVV4", "product": { "name": "15.1(3)SVV4", "product_id": "CSAFPID-289371" } } ], "category": "product_version", "name": "15.1SVV" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVW", "product": { "name": "15.1(3)SVW", "product_id": "CSAFPID-286451" } }, { "category": "service_pack", "name": "15.1(3)SVW1", "product": { "name": "15.1(3)SVW1", "product_id": "CSAFPID-286844" } } ], "category": "product_version", "name": "15.1SVW" }, { "branches": [ { "category": "service_pack", "name": "15.1(3)SVX", "product": { "name": "15.1(3)SVX", "product_id": "CSAFPID-286927" } }, { "category": "service_pack", "name": "15.1(3)SVX1", "product": { "name": "15.1(3)SVX1", "product_id": "CSAFPID-289301" } } ], "category": "product_version", "name": "15.1SVX" } ], "category": "product_family", "name": "IOS" }, { "branches": [ { "branches": [ { "category": "service_pack", "name": "3.2.0SG", "product": { "name": "3.2.0SG", "product_id": "CSAFPID-112457" } }, { "category": "service_pack", "name": "3.2.1SG", "product": { "name": "3.2.1SG", "product_id": "CSAFPID-112458" } }, { "category": "service_pack", "name": "3.2.2SG", "product": { "name": "3.2.2SG", "product_id": "CSAFPID-196224" } }, { "category": "service_pack", "name": "3.2.3SG", "product": { "name": "3.2.3SG", "product_id": "CSAFPID-196225" } }, { "category": "service_pack", "name": "3.2.4SG", "product": { "name": "3.2.4SG", "product_id": "CSAFPID-196226" } }, { "category": "service_pack", "name": "3.2.5SG", "product": { "name": "3.2.5SG", "product_id": "CSAFPID-196227" } }, { "category": "service_pack", "name": "3.2.6SG", "product": { "name": "3.2.6SG", "product_id": "CSAFPID-206195" } }, { "category": "service_pack", "name": "3.2.7SG", "product": { "name": "3.2.7SG", "product_id": "CSAFPID-206196" } }, { "category": "service_pack", "name": "3.2.8SG", "product": { "name": "3.2.8SG", "product_id": "CSAFPID-206197" } }, { "category": "service_pack", "name": "3.2.9SG", "product": { "name": "3.2.9SG", "product_id": "CSAFPID-206198" } }, { "category": "service_pack", "name": "3.2.10SG", "product": { "name": "3.2.10SG", "product_id": "CSAFPID-210068" } }, { "category": "service_pack", "name": "3.2.11SG", "product": { "name": "3.2.11SG", "product_id": "CSAFPID-221184" } } ], "category": "product_version", "name": "3.2SG" }, { "branches": [ { "category": "service_pack", "name": "3.3.0SG", "product": { "name": "3.3.0SG", "product_id": "CSAFPID-188726" } }, { "category": "service_pack", "name": "3.3.2SG", "product": { "name": "3.3.2SG", "product_id": "CSAFPID-196228" } }, { "category": "service_pack", "name": "3.3.1SG", "product": { "name": "3.3.1SG", "product_id": "CSAFPID-196287" } } ], "category": "product_version", "name": "3.3SG" }, { "branches": [ { "category": "service_pack", "name": "3.9.0xaS", "product": { "name": "3.9.0xaS", "product_id": "CSAFPID-213815" } } ], "category": "product_version", "name": "3.9S" }, { "branches": [ { "category": "service_pack", "name": "3.4.0SG", "product": { "name": "3.4.0SG", "product_id": "CSAFPID-196230" } }, { "category": "service_pack", "name": "3.4.2SG", "product": { "name": "3.4.2SG", "product_id": "CSAFPID-196231" } }, { "category": "service_pack", "name": "3.4.1SG", "product": { "name": "3.4.1SG", "product_id": "CSAFPID-196288" } }, { "category": "service_pack", "name": "3.4.3SG", "product": { "name": "3.4.3SG", "product_id": "CSAFPID-206165" } }, { "category": "service_pack", "name": "3.4.4SG", "product": { "name": "3.4.4SG", "product_id": "CSAFPID-206166" } }, { "category": "service_pack", "name": "3.4.5SG", "product": { "name": "3.4.5SG", "product_id": "CSAFPID-206167" } }, { "category": "service_pack", "name": "3.4.6SG", "product": { "name": "3.4.6SG", "product_id": "CSAFPID-210070" } }, { "category": "service_pack", "name": "3.4.7SG", "product": { "name": "3.4.7SG", "product_id": "CSAFPID-213785" } }, { "category": "service_pack", "name": "3.4.8SG", "product": { "name": "3.4.8SG", "product_id": "CSAFPID-221185" } } ], "category": "product_version", "name": "3.4SG" }, { "branches": [ { "category": "service_pack", "name": "3.5.0E", "product": { "name": "3.5.0E", "product_id": "CSAFPID-197145" } }, { "category": "service_pack", "name": "3.5.1E", "product": { "name": "3.5.1E", "product_id": "CSAFPID-206168" } }, { "category": "service_pack", "name": "3.5.2E", "product": { "name": "3.5.2E", "product_id": "CSAFPID-206169" } }, { "category": "service_pack", "name": "3.5.3E", "product": { "name": "3.5.3E", "product_id": "CSAFPID-206170" } } ], "category": "product_version", "name": "3.5E" }, { "branches": [ { "category": "service_pack", "name": "3.12.0aS", "product": { "name": "3.12.0aS", "product_id": "CSAFPID-213473" } } ], "category": "product_version", "name": "3.12S" }, { "branches": [ { "category": "service_pack", "name": "3.6.0E", "product": { "name": "3.6.0E", "product_id": "CSAFPID-206172" } }, { "category": "service_pack", "name": "3.6.1E", "product": { "name": "3.6.1E", "product_id": "CSAFPID-206173" } }, { "category": "service_pack", "name": "3.6.0aE", "product": { "name": "3.6.0aE", "product_id": "CSAFPID-210073" } }, { "category": "service_pack", "name": "3.6.0bE", "product": { "name": "3.6.0bE", "product_id": "CSAFPID-210074" } }, { "category": "service_pack", "name": "3.6.2aE", "product": { "name": "3.6.2aE", "product_id": "CSAFPID-210075" } }, { "category": "service_pack", "name": "3.6.3E", "product": { "name": "3.6.3E", "product_id": "CSAFPID-212674" } }, { "category": "service_pack", "name": "3.6.4E", "product": { "name": "3.6.4E", "product_id": "CSAFPID-213790" } }, { "category": "service_pack", "name": "3.6.5E", "product": { "name": "3.6.5E", "product_id": "CSAFPID-217279" } }, { "category": "service_pack", "name": "3.6.6E", "product": { "name": "3.6.6E", "product_id": "CSAFPID-220357" } }, { "category": "service_pack", "name": "3.6.5aE", "product": { "name": "3.6.5aE", "product_id": "CSAFPID-221108" } }, { "category": "service_pack", "name": "3.6.5bE", "product": { "name": "3.6.5bE", "product_id": "CSAFPID-222435" } } ], "category": "product_version", "name": "3.6E" }, { "branches": [ { "category": "service_pack", "name": "3.3.0SQ", "product": { "name": "3.3.0SQ", "product_id": "CSAFPID-206205" } }, { "category": "service_pack", "name": "3.3.1SQ", "product": { "name": "3.3.1SQ", "product_id": "CSAFPID-206206" } } ], "category": "product_version", "name": "3.3SQ" }, { "branches": [ { "category": "service_pack", "name": "3.4.0SQ", "product": { "name": "3.4.0SQ", "product_id": "CSAFPID-206208" } }, { "category": "service_pack", "name": "3.4.1SQ", "product": { "name": "3.4.1SQ", "product_id": "CSAFPID-206209" } } ], "category": "product_version", "name": "3.4SQ" }, { "branches": [ { "category": "service_pack", "name": "3.7.0E", "product": { "name": "3.7.0E", "product_id": "CSAFPID-206211" } }, { "category": "service_pack", "name": "3.7.1E", "product": { "name": "3.7.1E", "product_id": "CSAFPID-210076" } }, { "category": "service_pack", "name": "3.7.2E", "product": { "name": "3.7.2E", "product_id": "CSAFPID-210077" } }, { "category": "service_pack", "name": "3.7.3E", "product": { "name": "3.7.3E", "product_id": "CSAFPID-213797" } }, { "category": "service_pack", "name": "3.7.4E", "product": { "name": "3.7.4E", "product_id": "CSAFPID-217280" } }, { "category": "service_pack", "name": "3.7.5E", "product": { "name": "3.7.5E", "product_id": "CSAFPID-220290" } } ], "category": "product_version", "name": "3.7E" }, { "branches": [ { "category": "service_pack", "name": "3.5.0SQ", "product": { "name": "3.5.0SQ", "product_id": "CSAFPID-210072" } }, { "category": "service_pack", "name": "3.5.1SQ", "product": { "name": "3.5.1SQ", "product_id": "CSAFPID-213786" } }, { "category": "service_pack", "name": "3.5.2SQ", "product": { "name": "3.5.2SQ", "product_id": "CSAFPID-213787" } }, { "category": "service_pack", "name": "3.5.3SQ", "product": { "name": "3.5.3SQ", "product_id": "CSAFPID-217278" } }, { "category": "service_pack", "name": "3.5.4SQ", "product": { "name": "3.5.4SQ", "product_id": "CSAFPID-220671" } }, { "category": "service_pack", "name": "3.5.5SQ", "product": { "name": "3.5.5SQ", "product_id": "CSAFPID-225360" } } ], "category": "product_version", "name": "3.5SQ" }, { "branches": [ { "category": "service_pack", "name": "3.8.0E", "product": { "name": "3.8.0E", "product_id": "CSAFPID-213811" } }, { "category": "service_pack", "name": "3.8.1E", "product": { "name": "3.8.1E", "product_id": "CSAFPID-213812" } }, { "category": "service_pack", "name": "3.8.2E", "product": { "name": "3.8.2E", "product_id": "CSAFPID-217283" } }, { "category": "service_pack", "name": "3.8.3E", "product": { "name": "3.8.3E", "product_id": "CSAFPID-220489" } } ], "category": "product_version", "name": "3.8E" }, { "branches": [ { "category": "service_pack", "name": "3.9.0E", "product": { "name": "3.9.0E", "product_id": "CSAFPID-217282" } }, { "category": "service_pack", "name": "3.9.1E", "product": { "name": "3.9.1E", "product_id": "CSAFPID-222483" } } ], "category": "product_version", "name": "3.9E" } ], "category": "product_family", "name": "Cisco IOS XE Software" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3881", "ids": [ { "system_name": "Cisco Bug ID", "text": "CSCvd48893" } ], "notes": [ { "category": "other", "text": "Complete.", "title": "Affected Product Comprehensiveness" } ], "product_status": { "known_affected": [ "CSAFPID-103473", "CSAFPID-103492", "CSAFPID-103499", "CSAFPID-103559", "CSAFPID-103567", "CSAFPID-103646", "CSAFPID-103648", "CSAFPID-103649", "CSAFPID-103678", "CSAFPID-103684", "CSAFPID-103736", "CSAFPID-103763", "CSAFPID-103766", "CSAFPID-103774", "CSAFPID-103775", "CSAFPID-103776", "CSAFPID-103801", "CSAFPID-103840", "CSAFPID-103921", "CSAFPID-103930", "CSAFPID-103955", "CSAFPID-104035", "CSAFPID-104041", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104091", "CSAFPID-104100", "CSAFPID-104101", "CSAFPID-104153", "CSAFPID-104158", "CSAFPID-104159", "CSAFPID-104191", "CSAFPID-104254", "CSAFPID-104305", "CSAFPID-104313", "CSAFPID-104342", "CSAFPID-104355", "CSAFPID-104376", "CSAFPID-104427", "CSAFPID-104434", "CSAFPID-104467", "CSAFPID-104476", "CSAFPID-104578", "CSAFPID-104591", "CSAFPID-104630", "CSAFPID-104642", "CSAFPID-104662", "CSAFPID-104696", "CSAFPID-104706", "CSAFPID-104719", "CSAFPID-104743", "CSAFPID-104746", "CSAFPID-104806", "CSAFPID-104815", "CSAFPID-104833", "CSAFPID-104855", "CSAFPID-104896", "CSAFPID-104903", "CSAFPID-104970", "CSAFPID-104972", "CSAFPID-105043", "CSAFPID-105058", "CSAFPID-105111", "CSAFPID-105159", "CSAFPID-105183", "CSAFPID-105185", "CSAFPID-105186", "CSAFPID-105216", "CSAFPID-105253", "CSAFPID-105285", "CSAFPID-105290", "CSAFPID-105299", "CSAFPID-105302", "CSAFPID-105328", "CSAFPID-105334", "CSAFPID-105368", "CSAFPID-105392", "CSAFPID-105394", "CSAFPID-105430", "CSAFPID-105444", "CSAFPID-105466", "CSAFPID-105485", "CSAFPID-105492", "CSAFPID-105513", "CSAFPID-105539", "CSAFPID-105550", "CSAFPID-105572", "CSAFPID-105660", "CSAFPID-105689", "CSAFPID-105702", "CSAFPID-105704", "CSAFPID-105741", "CSAFPID-105760", "CSAFPID-105765", "CSAFPID-105780", "CSAFPID-105824", "CSAFPID-105881", "CSAFPID-105923", "CSAFPID-105965", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106029", "CSAFPID-106048", "CSAFPID-106059", "CSAFPID-106071", "CSAFPID-106072", "CSAFPID-106089", "CSAFPID-106107", "CSAFPID-106118", "CSAFPID-106129", "CSAFPID-106130", "CSAFPID-106145", "CSAFPID-106156", "CSAFPID-106163", "CSAFPID-106203", "CSAFPID-106232", "CSAFPID-106247", "CSAFPID-106291", "CSAFPID-106323", "CSAFPID-106401", "CSAFPID-106449", "CSAFPID-106466", "CSAFPID-106496", "CSAFPID-106526", "CSAFPID-106528", "CSAFPID-106540", "CSAFPID-106564", "CSAFPID-106570", "CSAFPID-106606", "CSAFPID-106674", "CSAFPID-106684", "CSAFPID-106686", "CSAFPID-106718", "CSAFPID-106733", "CSAFPID-106746", "CSAFPID-106823", "CSAFPID-106851", "CSAFPID-106886", "CSAFPID-106930", "CSAFPID-106971", "CSAFPID-106997", "CSAFPID-107002", "CSAFPID-107077", "CSAFPID-107094", "CSAFPID-107108", "CSAFPID-107112", "CSAFPID-107135", "CSAFPID-107142", "CSAFPID-107175", "CSAFPID-107181", "CSAFPID-107184", "CSAFPID-107209", "CSAFPID-107283", "CSAFPID-107301", "CSAFPID-107304", "CSAFPID-107308", "CSAFPID-107325", "CSAFPID-107476", "CSAFPID-107481", "CSAFPID-107495", "CSAFPID-107544", "CSAFPID-107591", "CSAFPID-107630", "CSAFPID-107645", "CSAFPID-107650", "CSAFPID-107664", "CSAFPID-107692", "CSAFPID-107832", "CSAFPID-107852", "CSAFPID-108062", "CSAFPID-108172", "CSAFPID-108306", "CSAFPID-109098", "CSAFPID-109242", "CSAFPID-109439", "CSAFPID-109760", "CSAFPID-109808", "CSAFPID-110186", "CSAFPID-111005", "CSAFPID-111010", "CSAFPID-111019", "CSAFPID-111045", "CSAFPID-111384", "CSAFPID-111674", "CSAFPID-112131", "CSAFPID-112141", "CSAFPID-113948", "CSAFPID-113961", "CSAFPID-114093", "CSAFPID-114665", "CSAFPID-115477", "CSAFPID-115688", "CSAFPID-115832", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117196", "CSAFPID-117280", "CSAFPID-117871", "CSAFPID-183811", "CSAFPID-184125", "CSAFPID-184567", "CSAFPID-185274", "CSAFPID-185281", "CSAFPID-187057", "CSAFPID-187233", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-188035", "CSAFPID-188816", "CSAFPID-189064", "CSAFPID-189115", "CSAFPID-189187", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-190637", "CSAFPID-191928", "CSAFPID-191948", "CSAFPID-192163", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-193283", "CSAFPID-194540", "CSAFPID-194649", "CSAFPID-194741", "CSAFPID-194913", "CSAFPID-195469", "CSAFPID-195481", "CSAFPID-195489", "CSAFPID-195770", "CSAFPID-195943", "CSAFPID-197462", "CSAFPID-197465", "CSAFPID-197471", "CSAFPID-197480", "CSAFPID-197481", "CSAFPID-197483", "CSAFPID-197488", "CSAFPID-198060", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200488", "CSAFPID-200496", "CSAFPID-201074", "CSAFPID-201366", "CSAFPID-202716", "CSAFPID-204097", "CSAFPID-204099", "CSAFPID-204102", "CSAFPID-204108", "CSAFPID-204186", "CSAFPID-204187", "CSAFPID-204228", "CSAFPID-204324", "CSAFPID-204818", "CSAFPID-204831", "CSAFPID-205064", "CSAFPID-205672", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209030", "CSAFPID-209031", "CSAFPID-209034", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209060", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209887", "CSAFPID-210203", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210958", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212329", "CSAFPID-213610", "CSAFPID-213788", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214556", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-214992", "CSAFPID-216295", "CSAFPID-217078", "CSAFPID-217805", "CSAFPID-218891", "CSAFPID-218995", "CSAFPID-220038", "CSAFPID-220441", "CSAFPID-220457", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220507", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-221137", "CSAFPID-222342", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222924", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-225160", "CSAFPID-225358", "CSAFPID-226077", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230965", "CSAFPID-241916", "CSAFPID-250628", "CSAFPID-277232", "CSAFPID-280759", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284566", "CSAFPID-284568", "CSAFPID-284785", "CSAFPID-286029", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286844", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-289301", "CSAFPID-289371", "CSAFPID-290557", "CSAFPID-35244", "CSAFPID-50447", "CSAFPID-50448", "CSAFPID-50449", "CSAFPID-59974", "CSAFPID-60292", "CSAFPID-60330", "CSAFPID-60350", "CSAFPID-60351", "CSAFPID-60358", "CSAFPID-60365", "CSAFPID-60367", "CSAFPID-60368", "CSAFPID-60369", "CSAFPID-60399", "CSAFPID-62580", "CSAFPID-62582", "CSAFPID-62587", "CSAFPID-62597", "CSAFPID-62600", "CSAFPID-62601", "CSAFPID-63898", "CSAFPID-63903", "CSAFPID-63905", "CSAFPID-63911", "CSAFPID-63912", "CSAFPID-63913", "CSAFPID-63914", "CSAFPID-63915", "CSAFPID-63916", "CSAFPID-63918", "CSAFPID-63919", "CSAFPID-63920", "CSAFPID-63936", "CSAFPID-69479", "CSAFPID-69801", "CSAFPID-78260", "CSAFPID-95363", "CSAFPID-112457", "CSAFPID-112458", "CSAFPID-188726", "CSAFPID-196224", "CSAFPID-196225", "CSAFPID-196226", "CSAFPID-196227", "CSAFPID-196228", "CSAFPID-196230", "CSAFPID-196231", "CSAFPID-196287", "CSAFPID-196288", "CSAFPID-197145", "CSAFPID-206165", "CSAFPID-206166", "CSAFPID-206167", "CSAFPID-206168", "CSAFPID-206169", "CSAFPID-206170", "CSAFPID-206172", "CSAFPID-206173", "CSAFPID-206195", "CSAFPID-206196", "CSAFPID-206197", "CSAFPID-206198", "CSAFPID-206205", "CSAFPID-206206", "CSAFPID-206208", "CSAFPID-206209", "CSAFPID-206211", "CSAFPID-210068", "CSAFPID-210070", "CSAFPID-210072", "CSAFPID-210073", "CSAFPID-210074", "CSAFPID-210075", "CSAFPID-210076", "CSAFPID-210077", "CSAFPID-212674", "CSAFPID-213473", "CSAFPID-213785", "CSAFPID-213786", "CSAFPID-213787", "CSAFPID-213790", "CSAFPID-213797", "CSAFPID-213811", "CSAFPID-213812", "CSAFPID-213815", "CSAFPID-217278", "CSAFPID-217279", "CSAFPID-217280", "CSAFPID-217282", "CSAFPID-217283", "CSAFPID-220290", "CSAFPID-220357", "CSAFPID-220489", "CSAFPID-220671", "CSAFPID-221108", "CSAFPID-221184", "CSAFPID-221185", "CSAFPID-222435", "CSAFPID-222483", "CSAFPID-225360" ] }, "release_date": "2017-03-17T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "details": "Cisco has released software updates that address this vulnerability.", "product_ids": [ "CSAFPID-112457", "CSAFPID-112458", "CSAFPID-188726", "CSAFPID-196224", "CSAFPID-196225", "CSAFPID-196226", "CSAFPID-196227", "CSAFPID-196228", "CSAFPID-196230", "CSAFPID-196231", "CSAFPID-196287", "CSAFPID-196288", "CSAFPID-197145", "CSAFPID-206165", "CSAFPID-206166", "CSAFPID-206167", "CSAFPID-206168", "CSAFPID-206169", "CSAFPID-206170", "CSAFPID-206172", "CSAFPID-206173", "CSAFPID-206195", "CSAFPID-206196", "CSAFPID-206197", "CSAFPID-206198", "CSAFPID-206205", "CSAFPID-206206", "CSAFPID-206208", "CSAFPID-206209", "CSAFPID-206211", "CSAFPID-210068", "CSAFPID-210070", "CSAFPID-210072", "CSAFPID-210073", "CSAFPID-210074", "CSAFPID-210075", "CSAFPID-210076", "CSAFPID-210077", "CSAFPID-212674", "CSAFPID-213473", "CSAFPID-213785", "CSAFPID-213786", "CSAFPID-213787", "CSAFPID-213790", "CSAFPID-213797", "CSAFPID-213811", "CSAFPID-213812", "CSAFPID-213815", "CSAFPID-217278", "CSAFPID-217279", "CSAFPID-217280", "CSAFPID-217282", "CSAFPID-217283", "CSAFPID-220290", "CSAFPID-220357", "CSAFPID-220489", "CSAFPID-220671", "CSAFPID-221108", "CSAFPID-221184", "CSAFPID-221185", "CSAFPID-222435", "CSAFPID-222483", "CSAFPID-225360", "CSAFPID-103473", "CSAFPID-103492", "CSAFPID-103499", "CSAFPID-103559", "CSAFPID-103567", "CSAFPID-103646", "CSAFPID-103648", "CSAFPID-103649", "CSAFPID-103678", "CSAFPID-103684", "CSAFPID-103736", "CSAFPID-103763", "CSAFPID-103766", "CSAFPID-103774", "CSAFPID-103775", "CSAFPID-103776", "CSAFPID-103801", "CSAFPID-103840", "CSAFPID-103921", "CSAFPID-103930", "CSAFPID-103955", "CSAFPID-104035", "CSAFPID-104041", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104091", "CSAFPID-104100", "CSAFPID-104101", "CSAFPID-104153", "CSAFPID-104158", "CSAFPID-104159", "CSAFPID-104191", "CSAFPID-104254", "CSAFPID-104305", "CSAFPID-104313", "CSAFPID-104342", "CSAFPID-104355", "CSAFPID-104376", "CSAFPID-104427", "CSAFPID-104434", "CSAFPID-104467", "CSAFPID-104476", "CSAFPID-104578", "CSAFPID-104591", "CSAFPID-104630", "CSAFPID-104642", "CSAFPID-104662", "CSAFPID-104696", "CSAFPID-104706", "CSAFPID-104719", "CSAFPID-104743", "CSAFPID-104746", "CSAFPID-104806", "CSAFPID-104815", "CSAFPID-104833", "CSAFPID-104855", "CSAFPID-104896", "CSAFPID-104903", "CSAFPID-104970", "CSAFPID-104972", "CSAFPID-105043", "CSAFPID-105058", "CSAFPID-105111", "CSAFPID-105159", "CSAFPID-105183", "CSAFPID-105185", "CSAFPID-105186", "CSAFPID-105216", "CSAFPID-105253", "CSAFPID-105285", "CSAFPID-105290", "CSAFPID-105299", "CSAFPID-105302", "CSAFPID-105328", "CSAFPID-105334", "CSAFPID-105368", "CSAFPID-105392", "CSAFPID-105394", "CSAFPID-105430", "CSAFPID-105444", "CSAFPID-105466", "CSAFPID-105485", "CSAFPID-105492", "CSAFPID-105513", "CSAFPID-105539", "CSAFPID-105550", "CSAFPID-105572", "CSAFPID-105660", "CSAFPID-105689", "CSAFPID-105702", "CSAFPID-105704", "CSAFPID-105741", "CSAFPID-105760", "CSAFPID-105765", "CSAFPID-105780", "CSAFPID-105824", "CSAFPID-105881", "CSAFPID-105923", "CSAFPID-105965", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106029", "CSAFPID-106048", "CSAFPID-106059", "CSAFPID-106071", "CSAFPID-106072", "CSAFPID-106089", "CSAFPID-106107", "CSAFPID-106118", "CSAFPID-106129", "CSAFPID-106130", "CSAFPID-106145", "CSAFPID-106156", "CSAFPID-106163", "CSAFPID-106203", "CSAFPID-106232", "CSAFPID-106247", "CSAFPID-106291", "CSAFPID-106323", "CSAFPID-106401", "CSAFPID-106449", "CSAFPID-106466", "CSAFPID-106496", "CSAFPID-106526", "CSAFPID-106528", "CSAFPID-106540", "CSAFPID-106564", "CSAFPID-106570", "CSAFPID-106606", "CSAFPID-106674", "CSAFPID-106684", "CSAFPID-106686", "CSAFPID-106718", "CSAFPID-106733", "CSAFPID-106746", "CSAFPID-106823", "CSAFPID-106851", "CSAFPID-106886", "CSAFPID-106930", "CSAFPID-106971", "CSAFPID-106997", "CSAFPID-107002", "CSAFPID-107077", "CSAFPID-107094", "CSAFPID-107108", "CSAFPID-107112", "CSAFPID-107135", "CSAFPID-107142", "CSAFPID-107175", "CSAFPID-107181", "CSAFPID-107184", "CSAFPID-107209", "CSAFPID-107283", "CSAFPID-107301", "CSAFPID-107304", "CSAFPID-107308", "CSAFPID-107325", "CSAFPID-107476", "CSAFPID-107481", "CSAFPID-107495", "CSAFPID-107544", "CSAFPID-107591", "CSAFPID-107630", "CSAFPID-107645", "CSAFPID-107650", "CSAFPID-107664", "CSAFPID-107692", "CSAFPID-107832", "CSAFPID-107852", "CSAFPID-108062", "CSAFPID-108172", "CSAFPID-108306", "CSAFPID-109098", "CSAFPID-109242", "CSAFPID-109439", "CSAFPID-109760", "CSAFPID-109808", "CSAFPID-110186", "CSAFPID-111005", "CSAFPID-111010", "CSAFPID-111019", "CSAFPID-111045", "CSAFPID-111384", "CSAFPID-111674", "CSAFPID-112131", "CSAFPID-112141", "CSAFPID-113948", "CSAFPID-113961", "CSAFPID-114093", "CSAFPID-114665", "CSAFPID-115477", "CSAFPID-115688", "CSAFPID-115832", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117196", "CSAFPID-117280", "CSAFPID-117871", "CSAFPID-183811", "CSAFPID-184125", "CSAFPID-184567", "CSAFPID-185274", "CSAFPID-185281", "CSAFPID-187057", "CSAFPID-187233", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-188035", "CSAFPID-188816", "CSAFPID-189064", "CSAFPID-189115", "CSAFPID-189187", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-190637", "CSAFPID-191928", "CSAFPID-191948", "CSAFPID-192163", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-193283", "CSAFPID-194540", "CSAFPID-194649", "CSAFPID-194741", "CSAFPID-194913", "CSAFPID-195469", "CSAFPID-195481", "CSAFPID-195489", "CSAFPID-195770", "CSAFPID-195943", "CSAFPID-197462", "CSAFPID-197465", "CSAFPID-197471", "CSAFPID-197480", "CSAFPID-197481", "CSAFPID-197483", "CSAFPID-197488", "CSAFPID-198060", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200488", "CSAFPID-200496", "CSAFPID-201074", "CSAFPID-201366", "CSAFPID-202716", "CSAFPID-204097", "CSAFPID-204099", "CSAFPID-204102", "CSAFPID-204108", "CSAFPID-204186", "CSAFPID-204187", "CSAFPID-204228", "CSAFPID-204324", "CSAFPID-204818", "CSAFPID-204831", "CSAFPID-205064", "CSAFPID-205672", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209030", "CSAFPID-209031", "CSAFPID-209034", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209060", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209887", "CSAFPID-210203", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210958", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212329", "CSAFPID-213610", "CSAFPID-213788", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214556", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-214992", "CSAFPID-216295", "CSAFPID-217078", "CSAFPID-217805", "CSAFPID-218891", "CSAFPID-218995", "CSAFPID-220038", "CSAFPID-220441", "CSAFPID-220457", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220507", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-221137", "CSAFPID-222342", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222924", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-225160", "CSAFPID-225358", "CSAFPID-226077", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230965", "CSAFPID-241916", "CSAFPID-250628", "CSAFPID-277232", "CSAFPID-280759", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284566", "CSAFPID-284568", "CSAFPID-284785", "CSAFPID-286029", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286844", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-289301", "CSAFPID-289371", "CSAFPID-290557", "CSAFPID-35244", "CSAFPID-50447", "CSAFPID-50448", "CSAFPID-50449", "CSAFPID-59974", "CSAFPID-60292", "CSAFPID-60330", "CSAFPID-60350", "CSAFPID-60351", "CSAFPID-60358", "CSAFPID-60365", "CSAFPID-60367", "CSAFPID-60368", "CSAFPID-60369", "CSAFPID-60399", "CSAFPID-62580", "CSAFPID-62582", "CSAFPID-62587", "CSAFPID-62597", "CSAFPID-62600", "CSAFPID-62601", "CSAFPID-63898", "CSAFPID-63903", "CSAFPID-63905", "CSAFPID-63911", "CSAFPID-63912", "CSAFPID-63913", "CSAFPID-63914", "CSAFPID-63915", "CSAFPID-63916", "CSAFPID-63918", "CSAFPID-63919", "CSAFPID-63920", "CSAFPID-63936", "CSAFPID-69479", "CSAFPID-69801", "CSAFPID-78260", "CSAFPID-95363" ], "url": "https://software.cisco.com" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-103473", "CSAFPID-103492", "CSAFPID-103499", "CSAFPID-103559", "CSAFPID-103567", "CSAFPID-103646", "CSAFPID-103648", "CSAFPID-103649", "CSAFPID-103678", "CSAFPID-103684", "CSAFPID-103736", "CSAFPID-103763", "CSAFPID-103766", "CSAFPID-103774", "CSAFPID-103775", "CSAFPID-103776", "CSAFPID-103801", "CSAFPID-103840", "CSAFPID-103921", "CSAFPID-103930", "CSAFPID-103955", "CSAFPID-104035", "CSAFPID-104041", "CSAFPID-104061", "CSAFPID-104089", "CSAFPID-104091", "CSAFPID-104100", "CSAFPID-104101", "CSAFPID-104153", "CSAFPID-104158", "CSAFPID-104159", "CSAFPID-104191", "CSAFPID-104254", "CSAFPID-104305", "CSAFPID-104313", "CSAFPID-104342", "CSAFPID-104355", "CSAFPID-104376", "CSAFPID-104427", "CSAFPID-104434", "CSAFPID-104467", "CSAFPID-104476", "CSAFPID-104578", "CSAFPID-104591", "CSAFPID-104630", "CSAFPID-104642", "CSAFPID-104662", "CSAFPID-104696", "CSAFPID-104706", "CSAFPID-104719", "CSAFPID-104743", "CSAFPID-104746", "CSAFPID-104806", "CSAFPID-104815", "CSAFPID-104833", "CSAFPID-104855", "CSAFPID-104896", "CSAFPID-104903", "CSAFPID-104970", "CSAFPID-104972", "CSAFPID-105043", "CSAFPID-105058", "CSAFPID-105111", "CSAFPID-105159", "CSAFPID-105183", "CSAFPID-105185", "CSAFPID-105186", "CSAFPID-105216", "CSAFPID-105253", "CSAFPID-105285", "CSAFPID-105290", "CSAFPID-105299", "CSAFPID-105302", "CSAFPID-105328", "CSAFPID-105334", "CSAFPID-105368", "CSAFPID-105392", "CSAFPID-105394", "CSAFPID-105430", "CSAFPID-105444", "CSAFPID-105466", "CSAFPID-105485", "CSAFPID-105492", "CSAFPID-105513", "CSAFPID-105539", "CSAFPID-105550", "CSAFPID-105572", "CSAFPID-105660", "CSAFPID-105689", "CSAFPID-105702", "CSAFPID-105704", "CSAFPID-105741", "CSAFPID-105760", "CSAFPID-105765", "CSAFPID-105780", "CSAFPID-105824", "CSAFPID-105881", "CSAFPID-105923", "CSAFPID-105965", "CSAFPID-105973", "CSAFPID-105987", "CSAFPID-106016", "CSAFPID-106029", "CSAFPID-106048", "CSAFPID-106059", "CSAFPID-106071", "CSAFPID-106072", "CSAFPID-106089", "CSAFPID-106107", "CSAFPID-106118", "CSAFPID-106129", "CSAFPID-106130", "CSAFPID-106145", "CSAFPID-106156", "CSAFPID-106163", "CSAFPID-106203", "CSAFPID-106232", "CSAFPID-106247", "CSAFPID-106291", "CSAFPID-106323", "CSAFPID-106401", "CSAFPID-106449", "CSAFPID-106466", "CSAFPID-106496", "CSAFPID-106526", "CSAFPID-106528", "CSAFPID-106540", "CSAFPID-106564", "CSAFPID-106570", "CSAFPID-106606", "CSAFPID-106674", "CSAFPID-106684", "CSAFPID-106686", "CSAFPID-106718", "CSAFPID-106733", "CSAFPID-106746", "CSAFPID-106823", "CSAFPID-106851", "CSAFPID-106886", "CSAFPID-106930", "CSAFPID-106971", "CSAFPID-106997", "CSAFPID-107002", "CSAFPID-107077", "CSAFPID-107094", "CSAFPID-107108", "CSAFPID-107112", "CSAFPID-107135", "CSAFPID-107142", "CSAFPID-107175", "CSAFPID-107181", "CSAFPID-107184", "CSAFPID-107209", "CSAFPID-107283", "CSAFPID-107301", "CSAFPID-107304", "CSAFPID-107308", "CSAFPID-107325", "CSAFPID-107476", "CSAFPID-107481", "CSAFPID-107495", "CSAFPID-107544", "CSAFPID-107591", "CSAFPID-107630", "CSAFPID-107645", "CSAFPID-107650", "CSAFPID-107664", "CSAFPID-107692", "CSAFPID-107832", "CSAFPID-107852", "CSAFPID-108062", "CSAFPID-108172", "CSAFPID-108306", "CSAFPID-109098", "CSAFPID-109242", "CSAFPID-109439", "CSAFPID-109760", "CSAFPID-109808", "CSAFPID-110186", "CSAFPID-111005", "CSAFPID-111010", "CSAFPID-111019", "CSAFPID-111045", "CSAFPID-111384", "CSAFPID-111674", "CSAFPID-112131", "CSAFPID-112141", "CSAFPID-113948", "CSAFPID-113961", "CSAFPID-114093", "CSAFPID-114665", "CSAFPID-115477", "CSAFPID-115688", "CSAFPID-115832", "CSAFPID-115939", "CSAFPID-115969", "CSAFPID-116083", "CSAFPID-117196", "CSAFPID-117280", "CSAFPID-117871", "CSAFPID-183811", "CSAFPID-184125", "CSAFPID-184567", "CSAFPID-185274", "CSAFPID-185281", "CSAFPID-187057", "CSAFPID-187233", "CSAFPID-187269", "CSAFPID-187932", "CSAFPID-188035", "CSAFPID-188816", "CSAFPID-189064", "CSAFPID-189115", "CSAFPID-189187", "CSAFPID-189455", "CSAFPID-190250", "CSAFPID-190635", "CSAFPID-190637", "CSAFPID-191928", "CSAFPID-191948", "CSAFPID-192163", "CSAFPID-192706", "CSAFPID-192831", "CSAFPID-192910", "CSAFPID-192911", "CSAFPID-193033", "CSAFPID-193283", "CSAFPID-194540", "CSAFPID-194649", "CSAFPID-194741", "CSAFPID-194913", "CSAFPID-195469", "CSAFPID-195481", "CSAFPID-195489", "CSAFPID-195770", "CSAFPID-195943", "CSAFPID-197462", "CSAFPID-197465", "CSAFPID-197471", "CSAFPID-197480", "CSAFPID-197481", "CSAFPID-197483", "CSAFPID-197488", "CSAFPID-198060", "CSAFPID-198063", "CSAFPID-198542", "CSAFPID-200488", "CSAFPID-200496", "CSAFPID-201074", "CSAFPID-201366", "CSAFPID-202716", "CSAFPID-204097", "CSAFPID-204099", "CSAFPID-204102", "CSAFPID-204108", "CSAFPID-204186", "CSAFPID-204187", "CSAFPID-204228", "CSAFPID-204324", "CSAFPID-204818", "CSAFPID-204831", "CSAFPID-205064", "CSAFPID-205672", "CSAFPID-209028", "CSAFPID-209029", "CSAFPID-209030", "CSAFPID-209031", "CSAFPID-209034", "CSAFPID-209045", "CSAFPID-209046", "CSAFPID-209047", "CSAFPID-209049", "CSAFPID-209050", "CSAFPID-209051", "CSAFPID-209060", "CSAFPID-209358", "CSAFPID-209359", "CSAFPID-209628", "CSAFPID-209839", "CSAFPID-209887", "CSAFPID-210203", "CSAFPID-210732", "CSAFPID-210766", "CSAFPID-210958", "CSAFPID-211290", "CSAFPID-211296", "CSAFPID-211570", "CSAFPID-212329", "CSAFPID-213610", "CSAFPID-213788", "CSAFPID-214072", "CSAFPID-214078", "CSAFPID-214217", "CSAFPID-214218", "CSAFPID-214556", "CSAFPID-214797", "CSAFPID-214965", "CSAFPID-214992", "CSAFPID-216295", "CSAFPID-217078", "CSAFPID-217805", "CSAFPID-218891", "CSAFPID-218995", "CSAFPID-220038", "CSAFPID-220441", "CSAFPID-220457", "CSAFPID-220460", "CSAFPID-220461", "CSAFPID-220507", "CSAFPID-220664", "CSAFPID-220670", "CSAFPID-220689", "CSAFPID-221033", "CSAFPID-221137", "CSAFPID-222342", "CSAFPID-222419", "CSAFPID-222436", "CSAFPID-222500", "CSAFPID-222924", "CSAFPID-223086", "CSAFPID-223143", "CSAFPID-225160", "CSAFPID-225358", "CSAFPID-226077", "CSAFPID-230588", "CSAFPID-230589", "CSAFPID-230590", "CSAFPID-230965", "CSAFPID-241916", "CSAFPID-250628", "CSAFPID-277232", "CSAFPID-280759", "CSAFPID-283833", "CSAFPID-284291", "CSAFPID-284341", "CSAFPID-284566", "CSAFPID-284568", "CSAFPID-284785", "CSAFPID-286029", "CSAFPID-286399", "CSAFPID-286400", "CSAFPID-286451", "CSAFPID-286844", "CSAFPID-286927", "CSAFPID-286940", "CSAFPID-289301", "CSAFPID-289371", "CSAFPID-290557", "CSAFPID-35244", "CSAFPID-50447", "CSAFPID-50448", "CSAFPID-50449", "CSAFPID-59974", "CSAFPID-60292", "CSAFPID-60330", "CSAFPID-60350", "CSAFPID-60351", "CSAFPID-60358", "CSAFPID-60365", "CSAFPID-60367", "CSAFPID-60368", "CSAFPID-60369", "CSAFPID-60399", "CSAFPID-62580", "CSAFPID-62582", "CSAFPID-62587", "CSAFPID-62597", "CSAFPID-62600", "CSAFPID-62601", "CSAFPID-63898", "CSAFPID-63903", "CSAFPID-63905", "CSAFPID-63911", "CSAFPID-63912", "CSAFPID-63913", "CSAFPID-63914", "CSAFPID-63915", "CSAFPID-63916", "CSAFPID-63918", "CSAFPID-63919", "CSAFPID-63920", "CSAFPID-63936", "CSAFPID-69479", "CSAFPID-69801", "CSAFPID-78260", "CSAFPID-95363", "CSAFPID-112457", "CSAFPID-112458", "CSAFPID-188726", "CSAFPID-196224", "CSAFPID-196225", "CSAFPID-196226", "CSAFPID-196227", "CSAFPID-196228", "CSAFPID-196230", "CSAFPID-196231", "CSAFPID-196287", "CSAFPID-196288", "CSAFPID-197145", "CSAFPID-206165", "CSAFPID-206166", "CSAFPID-206167", "CSAFPID-206168", "CSAFPID-206169", "CSAFPID-206170", "CSAFPID-206172", "CSAFPID-206173", "CSAFPID-206195", "CSAFPID-206196", "CSAFPID-206197", "CSAFPID-206198", "CSAFPID-206205", "CSAFPID-206206", "CSAFPID-206208", "CSAFPID-206209", "CSAFPID-206211", "CSAFPID-210068", "CSAFPID-210070", "CSAFPID-210072", "CSAFPID-210073", "CSAFPID-210074", "CSAFPID-210075", "CSAFPID-210076", "CSAFPID-210077", "CSAFPID-212674", "CSAFPID-213473", "CSAFPID-213785", "CSAFPID-213786", "CSAFPID-213787", "CSAFPID-213790", "CSAFPID-213797", "CSAFPID-213811", "CSAFPID-213812", "CSAFPID-213815", "CSAFPID-217278", "CSAFPID-217279", "CSAFPID-217280", "CSAFPID-217282", "CSAFPID-217283", "CSAFPID-220290", "CSAFPID-220357", "CSAFPID-220489", "CSAFPID-220671", "CSAFPID-221108", "CSAFPID-221184", "CSAFPID-221185", "CSAFPID-222435", "CSAFPID-222483", "CSAFPID-225360" ] } ], "title": "Cluster Management Protocol Remote Code Execution Vulnerability" } ] }
ghsa-g37w-qg7v-7fjq
Vulnerability from github
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
{ "affected": [], "aliases": [ "CVE-2017-3881" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-03-17T22:59:00Z", "severity": "CRITICAL" }, "details": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.", "id": "GHSA-g37w-qg7v-7fjq", "modified": "2025-01-27T21:30:41Z", "published": "2022-05-13T01:24:13Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3881" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/41872" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/41874" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/96960" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/97391" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1038059" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2017-3881
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-3881", "description": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.", "id": "GSD-2017-3881", "references": [ "https://packetstormsecurity.com/files/cve/CVE-2017-3881" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-3881" ], "details": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.", "id": "GSD-2017-3881", "modified": "2023-12-13T01:21:16.536440Z", "schema_version": "1.4.0" } }, "namespaces": { "cisa.gov": { "cveID": "CVE-2017-3881", "dateAdded": "2022-03-25", "dueDate": "2022-04-15", "product": "IOS and IOS XE", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.", "vendorProject": "Cisco", "vulnerabilityName": "Cisco IOS and IOS XE Remote Code Execution Vulnerability" }, "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-3881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE Software", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE Software" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "41872", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41872/" }, { "name": "41874", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/41874/" }, { "name": "97391", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97391" }, { "name": "96960", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96960" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "name": "1038059", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038059" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "15.1\\(3\\)svs", "versionStartIncluding": "12.2s", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.9e", "versionStartIncluding": "3.2sg", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960pd-8tt-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2970g-24t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2970g-24ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_2975:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_12g:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_12t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_dc_smi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_emi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_fx_smi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_pwr:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_24_smi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_48_emi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3550_48_smi:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-12pc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-24ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-24ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-48ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-48ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560-8pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-12d-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-12d-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-12sd-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-12sd-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-24pd-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-24pd-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-24td-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-24td-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48pd-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48pd-ef:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48pd-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48pd-sf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48td-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560e-48td-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560g-24ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560g-24ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560g-48ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560g-48ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-24dc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-24ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-24ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-48ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560v2-48ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-24fs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-24ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-24ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-48ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750-48ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750_metro_24-ac:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750_metro_24-dc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-24pd-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-24pd-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-24td-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-24td-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48pd-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48pd-ef:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48pd-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48pd-sf:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48td-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750e-48td-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-12s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-12s-sd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-16td:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-24ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-24t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-24ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-24ts-1u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-48ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750g-48ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-24fs:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-24ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-24ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-48ps:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750v2-48ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_i:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_iv:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus-ts:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_iv:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v-10ge:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500_supervisor_ii-plus-10ge:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4500e_supervisor_engine_8-e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4928_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4948:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4948_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4948e-f_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_4948e_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3030:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3032:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3040:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_blade_switch_3130:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_switch_module_3012:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_switch_module_3110:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:catalyst_switch_module_3110x:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:enhanced_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:enhanced_layer_2_etherswitch_service_module:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:gigabit_ethernet_switch_module_\\(cgesm\\):-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-5000-12s12p-10g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie-5000-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_2000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_3000-4tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:ie_3000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:me_4924-10ge:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:rf_gateway_10:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:cisco:sm-x_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-3881" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "name": "96960", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96960" }, { "name": "97391", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/97391" }, { "name": "1038059", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038059" }, { "name": "41874", "refsource": "EXPLOIT-DB", "tags": [ "Broken Link" ], "url": "https://www.exploit-db.com/exploits/41874/" }, { "name": "41872", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/41872/" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2020-08-07T20:08Z", "publishedDate": "2017-03-17T22:59Z" } } }
var-201703-0892
Vulnerability from variot
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893. Vendors have confirmed this vulnerability Bug ID CSCvd48893 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. Multiple Rockwell Automation products are prone to a remote code-execution vulnerability. Successful exploits will result in the execution of arbitrary code with elevated privileges. Failed exploit attempts may result in a denial-of-service condition. The following products are vulnerable: Allen-Bradley Stratix 5400 Industrial Ethernet Switches versions 15.2(5)EA.fc4 and prior. Allen-Bradley Stratix 5410 Industrial Distribution Switches versions 15.2(5)EA.fc4 and prior. Allen-Bradley Stratix 5700 Industrial Managed Ethernet Switches versions 15.2(5)EA.fc4 and prior. Allen-Bradley ArmorStratix 5700 Industrial Managed Ethernet Switches versions 15.2(5)EA.fc4 and prior. Allen-Bradley Stratix 8300 Modular Managed Industrial Ethernet Switches versions 15.2(4a)EA5 and prior. Cisco Catalyst Switches are all switch products of Cisco (Cisco).
Cisco will release software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"]
-----BEGIN PGP SIGNATURE-----
iQKBBAEBAgBrBQJYzAjfZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHm3jRAAzLR1b6oQbXCkv0yQ GpiGyo0l97V74L+99IvzJzibQrNr/7oFNVc0Sm0SWtGJwhBdIFWKKp7tpfxLFUYw QpgpmOQHfu70kajINv5hshpKReIT2lnUhmAiK0VQzxp8QY/3WboSTjEYLOTmFHHh xb3dNWmvGYiT9tuSvQ70AkMnl2EfU+P+pkucjcku4Vi5Jri7BIIIPjz1by16Juh+ tIB5elmrFOFF/WGRERLo/a3anNlnoszoJxu+m57uS8CYICTnqJKeDEinpm64j0IB 7dWi1qqDTx9973zsmcqUZqeY9kSwierDJW5cii49GrOFOHUeJ9eWCOogEnE1+U4G iz7cJHsQ4qqBF39PBTMlxtY6xjhgGJDkRf3dzJBONH9EfoTpQOFMlO9220/2wlMe SquIU+SY31pW/xHcRfD8NoALZQ5EqrOkbbRXPGe/LwSUcXiFSBL0iMaE/jOPIRRs q6c7lbQr2kay0hTUMovhCvkVUlIC4eJAjwES3vau0EynKlumoYUb2Z7kSAq9QRqU vjHX1Iq+wrh+pM/+GFpx12yJzaDtIrBQSNtB/Jf8p0kNqlja/4Z90DDtwTCTaalR 7hGFyGWo3X3dPBxEL4OcASAaf2uC/J0ozprd0xCS8rsiMfn3rBYWtE6taK88njda 6UdaqFK+zmUBK8rQV0Lu6mOFpOo= =Ql/1 -----END PGP SIGNATURE-----
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "ios xe", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "3.9e" }, { "_id": null, "model": "ios", "scope": "lte", "trust": 1.0, "vendor": "cisco", "version": "15.1\\(3\\)svs" }, { "_id": null, "model": "ios", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "12.2s" }, { "_id": null, "model": "ios xe", "scope": "gte", "trust": 1.0, "vendor": "cisco", "version": "3.2sg" }, { "_id": null, "model": "ios", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "_id": null, "model": "ios xe", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "_id": null, "model": "automation allen-bradley stratix modular managed industrial ethernet s 15.2 ea.fc4", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "8000" }, { "_id": null, "model": "automation allen-bradley stratix industrial managed ethernet switches 15.2 ea.fc4", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "5700" }, { "_id": null, "model": "automation allen-bradley stratix industrial distribution switches 15.2 ea.fc4", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "5410" }, { "_id": null, "model": "automation allen-bradley stratix industrial ethernet switches 15.2 ea.fc4", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "5400" }, { "_id": null, "model": "automation allen-bradley armorstratix industrial managed ethernet swit 15.2 ea.fc4", "scope": "eq", "trust": 0.6, "vendor": "rockwell", "version": "5700" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.0\\(2\\)sqd2" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.0\\(2\\)sqd3" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.2\\(4\\)ec1" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.2\\(4\\)ec" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": null }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.0\\(2\\)sqd" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.0\\(2\\)sqd5" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.0\\(2\\)sqd4" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.2\\(4\\)ec2" }, { "_id": null, "model": "ios", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "15.0\\(2\\)sqd1" }, { "_id": null, "model": "sm-x layer etherswitch service module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2/30" }, { "_id": null, "model": "rf gateway", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "100" }, { "_id": null, "model": "me 4924-10ge switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ios xe 15.0 se10", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "_id": null, "model": "ios 15.0 se10", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "_id": null, "model": "ie-5000-16s12p industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-5000-12s12p-10g industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4010-4s24p industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4010-16s12p industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-8t4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-8s4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-8gt8gp4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-8gt4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-8gs4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-4tc4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-4t4p4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-4s8p4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-4gs8gp4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-4gc4gp4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-16t4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-4000-16gt4g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-3010-24tc industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie-3010-16s-8pc industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 3000-8tc industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 3000-4tc industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-8tc-g-n industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-8tc-g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-8tc-g industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-8tc industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-8t67p industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-8t67 industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-4ts-g industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-4ts industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-4t-g industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-4t industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-4s-ts-g industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-24t67 industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-16tc-g-x industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-16tc-g-n industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-16tc-g-e industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-16tc-g industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-16tc industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-16t67p industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-16t67 industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ie 2000-16ptc-g industrial ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "gigabit ethernet switch module for hp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "enhanced layer etherswitch service module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2/30" }, { "_id": null, "model": "enhanced layer etherswitch service module", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20" }, { "_id": null, "model": "embedded service ncp switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20200" }, { "_id": null, "model": "embedded service ncp b switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20200" }, { "_id": null, "model": "embedded service con switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20200" }, { "_id": null, "model": "embedded service con b switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20200" }, { "_id": null, "model": "embedded service 24tc ncp switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20200" }, { "_id": null, "model": "embedded service 24tc ncp b switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20200" }, { "_id": null, "model": "embedded service 24tc con switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20200" }, { "_id": null, "model": "embedded service 24tc con b switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "20200" }, { "_id": null, "model": "catalyst switch module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3110x0" }, { "_id": null, "model": "catalyst switch module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "31100" }, { "_id": null, "model": "catalyst switch module for ibm bladecenter", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30120" }, { "_id": null, "model": "catalyst c2928-48tc-c switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst c2928-24lt-c switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst blade switch for dell m1000e", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "31300" }, { "_id": null, "model": "catalyst blade switch for hp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3120x0" }, { "_id": null, "model": "catalyst blade switch for hp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "31200" }, { "_id": null, "model": "catalyst blade switch for fsc", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30400" }, { "_id": null, "model": "catalyst blade switch for dell m1000e", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30320" }, { "_id": null, "model": "catalyst blade switch for dell", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30300" }, { "_id": null, "model": "catalyst blade switch for hp", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "30200" }, { "_id": null, "model": "catalyst 4948e-f ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 4948e ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "49480" }, { "_id": null, "model": "catalyst gigabit ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4948100" }, { "_id": null, "model": "catalyst gigabit ethernet switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4928100" }, { "_id": null, "model": "catalyst 4900m switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst supervisor engine 6l-e", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "45000" }, { "_id": null, "model": "catalyst supervisor engine 6-e", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "45000" }, { "_id": null, "model": "catalyst series supervisor ii-plus-10ge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "45000" }, { "_id": null, "model": "catalyst series supervisor engine v-10ge", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "45000" }, { "_id": null, "model": "catalyst series supervisor engine ii-plus-ts", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "45000" }, { "_id": null, "model": "catalyst series supervisor engine ii-plus", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "45000" }, { "_id": null, "model": "catalyst supervisor engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4000/4500v0" }, { "_id": null, "model": "catalyst supervisor engine iv", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4000/45000" }, { "_id": null, "model": "catalyst supervisor engine i", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "40000" }, { "_id": null, "model": "catalyst 3750x-48u-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48u-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48u-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48t-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48t-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48t-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48pf-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48pf-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48pf-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48p-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48p-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-48p-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24u-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24u-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24u-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24t-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24t-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24t-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24s-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24s-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24p-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24p-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-24p-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-12s-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750x-12s-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750v2-48ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750v2-48ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750v2-24ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750v2-24ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750v2-24fs switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-48ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-48ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-24ts-1u switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-24ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-24t switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-24ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-16td switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-12s-sd switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750g-12s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-48td-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-48td-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-48pd-sf switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-48pd-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-48pd-ef switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-48pd-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-24td-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-24td-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-24pd-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750e-24pd-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750-48ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750-48ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750-24ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750-24ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3750-24fs switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst metro 24-dc switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "37500" }, { "_id": null, "model": "catalyst metro 24-ac switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "37500" }, { "_id": null, "model": "catalyst 3560x-48u-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48u-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48u-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48t-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48t-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48t-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48pf-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48pf-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48pf-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48p-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48p-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-48p-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24u-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24u-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24u-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24t-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24t-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24t-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24p-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24p-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560x-24p-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560v2-48ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560v2-48ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560v2-24ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560v2-24ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560v2-24dc switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560g-48ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560g-48ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560g-24ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560g-24ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-48td-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-48td-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-48pd-sf switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-48pd-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-48pd-ef switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-48pd-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-24td-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-24td-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-24pd-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-24pd-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-12sd-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-12sd-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-12d-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560e-12d-e switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cx-8xpd-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cx-8tc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cx-8pt-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cx-8pc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cx-12tc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cx-12pd-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cx-12pc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cpd-8pt-s compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cg-8tc-s compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560cg-8pc-s compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560c-8pc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560c-12pc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560-8pc compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560-48ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560-48ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560-24ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560-24ps switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 3560-12pc-s compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst smi switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3550480" }, { "_id": null, "model": "catalyst emi switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3550480" }, { "_id": null, "model": "catalyst smi switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3550240" }, { "_id": null, "model": "catalyst pwr switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3550240" }, { "_id": null, "model": "catalyst fx smi switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3550240" }, { "_id": null, "model": "catalyst emi switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3550240" }, { "_id": null, "model": "catalyst dc smi switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3550240" }, { "_id": null, "model": "catalyst 12t switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "35500" }, { "_id": null, "model": "catalyst 12g switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "35500" }, { "_id": null, "model": "catalyst switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "29750" }, { "_id": null, "model": "catalyst 2970g-24ts switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2970g-24t switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48ts-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48ts-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48td-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48td-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48lps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48lps-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48lpd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48lpd-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48fps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48fps-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48fpd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-48fpd-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-24ts-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-24ts-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-24td-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-24td-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-24ps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-24ps-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-24pd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960xr-24pd-i switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-48ts-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-48ts-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-48td-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-48lps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-48lpd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-48fps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-48fpd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-24ts-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-24ts-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-24td-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-24psq-l cool switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-24ps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960x-24pd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-f48ts-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-f48ts-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-f48lps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-f48fps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-f24ts-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-f24ts-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-f24ps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-48ts-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-48ts-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-48td-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-48lps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-48lpd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-48fps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-48fpd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-24ts-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-24ts-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-24td-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-24ps-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960s-24pd-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960pd-8tt-l compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960l-8ts-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960l-8ps-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960l-48ts-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960l-48ps-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960l-24ts-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960l-24ps-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960l-16ts-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960l-16ps-ll switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960g-8tc-l compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960g-48tc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960g-24tc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960cx-8tc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960cx-8pc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960cpd-8tt-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960cpd-8pt-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960cg-8tc-l compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960c-8tc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960c-8tc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960c-8pc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960c-12pc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 48tc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 48tc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 48pst-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 48pst-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 24tc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 24tc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 24pc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 24pc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 24lc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-plus 24lc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-8tc-s compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-8tc-l compact switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-48tt-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-48tt-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-48tc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-48tc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-48pst-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-48pst-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-24tt-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-24tc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-24tc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-24pc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-24pc-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-24lt-l switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-24lc-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2960-24-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2928-24tc-c switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2918-48tt-c switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2918-48tc-c switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2918-24tt-c switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2918-24tc-c switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2360-48td-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2350-48td-sd switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "catalyst 2350-48td-s switch", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "_id": null, "model": "ios xe 15.2 e2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "_id": null, "model": "ios 15.2 e2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null } ], "sources": [ { "db": "BID", "id": "96960" }, { "db": "BID", "id": "97391" }, { "db": "JVNDB", "id": "JVNDB-2017-002736" }, { "db": "CNNVD", "id": "CNNVD-201703-840" }, { "db": "NVD", "id": "CVE-2017-3881" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:cisco:ios", "vulnerable": true }, { "cpe22Uri": "cpe:/o:cisco:ios_xe", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002736" } ] }, "credits": { "_id": null, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "96960" }, { "db": "BID", "id": "97391" } ], "trust": 0.6 }, "cve": "CVE-2017-3881", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2017-3881", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-112084", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-3881", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-3881", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-3881", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2017-3881", "trust": 0.8, "value": "Critical" }, { "author": "CNNVD", "id": "CNNVD-201703-840", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-112084", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2017-3881", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-112084" }, { "db": "VULMON", "id": "CVE-2017-3881" }, { "db": "JVNDB", "id": "JVNDB-2017-002736" }, { "db": "CNNVD", "id": "CNNVD-201703-840" }, { "db": "NVD", "id": "CVE-2017-3881" } ] }, "description": { "_id": null, "data": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893. Vendors have confirmed this vulnerability Bug ID CSCvd48893 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. Multiple Rockwell Automation products are prone to a remote code-execution vulnerability. \nSuccessful exploits will result in the execution of arbitrary code with elevated privileges. Failed exploit attempts may result in a denial-of-service condition. \nThe following products are vulnerable:\nAllen-Bradley Stratix 5400 Industrial Ethernet Switches versions 15.2(5)EA.fc4 and prior. \nAllen-Bradley Stratix 5410 Industrial Distribution Switches versions 15.2(5)EA.fc4 and prior. \nAllen-Bradley Stratix 5700 Industrial Managed Ethernet Switches versions 15.2(5)EA.fc4 and prior. \nAllen-Bradley ArmorStratix 5700 Industrial Managed Ethernet Switches versions 15.2(5)EA.fc4 and prior. \nAllen-Bradley Stratix 8300 Modular Managed Industrial Ethernet Switches versions 15.2(4a)EA5 and prior. Cisco Catalyst Switches are all switch products of Cisco (Cisco). \n\nCisco will release software updates that address this vulnerability. There are no workarounds that address this vulnerability. \n\nThis advisory is available at the following link:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp [\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp\"]\n\n-----BEGIN PGP SIGNATURE-----\n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\n6UdaqFK+zmUBK8rQV0Lu6mOFpOo=\n=Ql/1\n-----END PGP SIGNATURE-----\n\n", "sources": [ { "db": "NVD", "id": "CVE-2017-3881" }, { "db": "JVNDB", "id": "JVNDB-2017-002736" }, { "db": "BID", "id": "96960" }, { "db": "BID", "id": "97391" }, { "db": "VULHUB", "id": "VHN-112084" }, { "db": "VULMON", "id": "CVE-2017-3881" }, { "db": "PACKETSTORM", "id": "141687" } ], "trust": 2.43 }, "exploit_availability": { "_id": null, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=42122", "trust": 0.2, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-112084", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-112084" }, { "db": "VULMON", "id": "CVE-2017-3881" } ] }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2017-3881", "trust": 3.0 }, { "db": "BID", "id": "96960", "trust": 2.1 }, { "db": "BID", "id": "97391", "trust": 2.1 }, { "db": "EXPLOIT-DB", "id": "41872", "trust": 1.8 }, { "db": "EXPLOIT-DB", "id": "41874", "trust": 1.8 }, { "db": "SECTRACK", "id": "1038059", "trust": 1.8 }, { "db": "ICS CERT", "id": "ICSA-17-094-03", "trust": 1.5 }, { "db": "JVNDB", "id": "JVNDB-2017-002736", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201703-840", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "42122", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "141687", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "142132", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "142121", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-92932", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-112084", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-3881", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-112084" }, { "db": "VULMON", "id": "CVE-2017-3881" }, { "db": "BID", "id": "96960" }, { "db": "BID", "id": "97391" }, { "db": "JVNDB", "id": "JVNDB-2017-002736" }, { "db": "PACKETSTORM", "id": "141687" }, { "db": "CNNVD", "id": "CNNVD-201703-840" }, { "db": "NVD", "id": "CVE-2017-3881" } ] }, "id": "VAR-201703-0892", "iot": { "_id": null, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-112084" } ], "trust": 0.7944444333333334 }, "last_update_date": "2024-11-23T22:56:15.134000Z", "patch": { "_id": null, "data": [ { "title": "cisco-sa-20170317-cmp", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp" }, { "title": "Multiple Cisco product IOS and IOS XE Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68634" }, { "title": "Cisco: Cisco IOS and IOS XE Software Cluster Management Protocol Remote Code Execution Vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20170317-cmp" }, { "title": "easy_linux_pwn", "trust": 0.1, "url": "https://github.com/Phantomn/easy_linux_pwn " }, { "title": "easy-linux-pwn", "trust": 0.1, "url": "https://github.com/xairy/easy-linux-pwn " }, { "title": "CVE-2017-3881", "trust": 0.1, "url": "https://github.com/1337g/CVE-2017-3881 " }, { "title": "CVE-2017-3881-Cisco", "trust": 0.1, "url": "https://github.com/homjxi0e/CVE-2017-3881-Cisco " }, { "title": "PoC-CVE-2017-3881", "trust": 0.1, "url": "https://github.com/zakybstrd21215/PoC-CVE-2017-3881 " }, { "title": "kenzer-templates", "trust": 0.1, "url": "https://github.com/Elsfa7-110/kenzer-templates " }, { "title": "kenzer-templates", "trust": 0.1, "url": "https://github.com/ARPSyndicate/kenzer-templates " }, { "title": "Exp101tsArchiv30thers", "trust": 0.1, "url": "https://github.com/nu11secur1ty/Exp101tsArchiv30thers " }, { "title": "awesome-cve-poc_qazbnm456", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " }, { "title": "PoC-in-GitHub", "trust": 0.1, "url": "https://github.com/nomi-sec/PoC-in-GitHub " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patch-asr-9000-routers/143895/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2019/04/17/sea_turtle_dns/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-patches-ios-xe-vulnerability-leaked-in-vault-7-dump/125568/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2017/05/09/cisco_switches_patch_telnet_command/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/cisco-warns-of-critical-vulnerability-revealed-in-vault-7-data-dump/124414/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/ciscos-investigation-into-vault-7-leak-uncovers-0-day-affecting-318-products/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-3881" }, { "db": "JVNDB", "id": "JVNDB-2017-002736" }, { "db": "CNNVD", "id": "CNNVD-201703-840" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-112084" }, { "db": "JVNDB", "id": "JVNDB-2017-002736" }, { "db": "NVD", "id": "CVE-2017-3881" } ] }, "references": { "_id": null, "data": [ { "trust": 2.9, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170317-cmp" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/96960" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/97391" }, { "trust": 1.8, "url": "https://www.exploit-db.com/exploits/41872/" }, { "trust": 1.8, "url": "https://www.exploit-db.com/exploits/41874/" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1038059" }, { "trust": 1.5, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-094-03" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3881" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3881" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.rockwellautomation.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://github.com/phantomn/easy_linux_pwn" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/42122/" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170317-cmp\"]" } ], "sources": [ { "db": "VULHUB", "id": "VHN-112084" }, { "db": "VULMON", "id": "CVE-2017-3881" }, { "db": "BID", "id": "96960" }, { "db": "BID", "id": "97391" }, { "db": "JVNDB", "id": "JVNDB-2017-002736" }, { "db": "PACKETSTORM", "id": "141687" }, { "db": "CNNVD", "id": "CNNVD-201703-840" }, { "db": "NVD", "id": "CVE-2017-3881" } ] }, "sources": { "_id": null, "data": [ { "db": "VULHUB", "id": "VHN-112084", "ident": null }, { "db": "VULMON", "id": "CVE-2017-3881", "ident": null }, { "db": "BID", "id": "96960", "ident": null }, { "db": "BID", "id": "97391", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2017-002736", "ident": null }, { "db": "PACKETSTORM", "id": "141687", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201703-840", "ident": null }, { "db": "NVD", "id": "CVE-2017-3881", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2017-03-17T00:00:00", "db": "VULHUB", "id": "VHN-112084", "ident": null }, { "date": "2017-03-17T00:00:00", "db": "VULMON", "id": "CVE-2017-3881", "ident": null }, { "date": "2017-03-17T00:00:00", "db": "BID", "id": "96960", "ident": null }, { "date": "2017-04-04T00:00:00", "db": "BID", "id": "97391", "ident": null }, { "date": "2017-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-002736", "ident": null }, { "date": "2017-03-17T10:10:00", "db": "PACKETSTORM", "id": "141687", "ident": null }, { "date": "2017-03-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-840", "ident": null }, { "date": "2017-03-17T22:59:00.640000", "db": "NVD", "id": "CVE-2017-3881", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2020-08-07T00:00:00", "db": "VULHUB", "id": "VHN-112084", "ident": null }, { "date": "2020-08-07T00:00:00", "db": "VULMON", "id": "CVE-2017-3881", "ident": null }, { "date": "2017-06-05T18:01:00", "db": "BID", "id": "96960", "ident": null }, { "date": "2017-05-23T16:23:00", "db": "BID", "id": "97391", "ident": null }, { "date": "2017-04-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-002736", "ident": null }, { "date": "2020-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201703-840", "ident": null }, { "date": "2024-11-21T03:26:18.337000", "db": "NVD", "id": "CVE-2017-3881", "ident": null } ] }, "threat_type": { "_id": null, "data": "network", "sources": [ { "db": "BID", "id": "96960" }, { "db": "BID", "id": "97391" } ], "trust": 0.6 }, "title": { "_id": null, "data": "Cisco IOS and Cisco IOS XE of Cisco Cluster Management Protocol Input code vulnerability in processing code", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-002736" } ], "trust": 0.8 }, "type": { "_id": null, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "97391" }, { "db": "CNNVD", "id": "CNNVD-201703-840" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.