fkie_cve-2021-1442
Vulnerability from fkie_nvd
Published
2021-03-24 20:15
Modified
2024-11-21 05:44
Summary
A vulnerability in a diagnostic command for the Plug-and-Play (PnP) subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to the level of an Administrator user (level 15) on an affected device. The vulnerability is due to insufficient protection of sensitive information. An attacker with low privileges could exploit this vulnerability by issuing the diagnostic CLI show pnp profile when a specific PnP listener is enabled on the device. A successful exploit could allow the attacker to obtain a privileged authentication token. This token can be used to send crafted PnP messages and execute privileged commands on the targeted system.
Impacted products
Vendor Product Version
cisco ios_xe 3.6.3e
cisco ios_xe 3.6.4e
cisco ios_xe 3.6.5ae
cisco ios_xe 3.6.5be
cisco ios_xe 3.6.5e
cisco ios_xe 3.6.6e
cisco ios_xe 3.6.7ae
cisco ios_xe 3.6.7be
cisco ios_xe 3.6.7e
cisco ios_xe 3.6.8e
cisco ios_xe 3.6.9ae
cisco ios_xe 3.6.9e
cisco ios_xe 3.6.10e
cisco ios_xe 3.7.3e
cisco ios_xe 3.7.4e
cisco ios_xe 3.7.5e
cisco ios_xe 3.8.0e
cisco ios_xe 3.8.1e
cisco ios_xe 3.8.2e
cisco ios_xe 3.8.3e
cisco ios_xe 3.8.4e
cisco ios_xe 3.8.5ae
cisco ios_xe 3.8.5e
cisco ios_xe 3.8.6e
cisco ios_xe 3.8.7e
cisco ios_xe 3.8.8e
cisco ios_xe 3.8.9e
cisco ios_xe 3.8.10e
cisco ios_xe 3.9.0e
cisco ios_xe 3.9.1e
cisco ios_xe 3.9.2be
cisco ios_xe 3.9.2e
cisco ios_xe 3.10.0ce
cisco ios_xe 3.10.0e
cisco ios_xe 3.10.1ae
cisco ios_xe 3.10.1e
cisco ios_xe 3.10.1se
cisco ios_xe 3.10.2e
cisco ios_xe 3.10.3e
cisco ios_xe 3.11.0e
cisco ios_xe 3.11.1ae
cisco ios_xe 3.11.1e
cisco ios_xe 3.11.2ae
cisco ios_xe 3.11.2e
cisco ios_xe 3.13.8s
cisco ios_xe 3.13.9s
cisco ios_xe 3.13.10s
cisco ios_xe 3.16.0as
cisco ios_xe 3.16.0bs
cisco ios_xe 3.16.0cs
cisco ios_xe 3.16.0s
cisco ios_xe 3.16.1as
cisco ios_xe 3.16.1s
cisco ios_xe 3.16.2as
cisco ios_xe 3.16.2bs
cisco ios_xe 3.16.2s
cisco ios_xe 3.16.3as
cisco ios_xe 3.16.3s
cisco ios_xe 3.16.4as
cisco ios_xe 3.16.4bs
cisco ios_xe 3.16.4cs
cisco ios_xe 3.16.4ds
cisco ios_xe 3.16.4es
cisco ios_xe 3.16.4gs
cisco ios_xe 3.16.4s
cisco ios_xe 3.16.5as
cisco ios_xe 3.16.5bs
cisco ios_xe 3.16.5s
cisco ios_xe 3.16.6bs
cisco ios_xe 3.16.6s
cisco ios_xe 3.16.7as
cisco ios_xe 3.16.7bs
cisco ios_xe 3.16.7s
cisco ios_xe 3.16.8s
cisco ios_xe 3.16.9s
cisco ios_xe 3.16.10as
cisco ios_xe 3.16.10s
cisco ios_xe 3.17.0s
cisco ios_xe 3.17.1as
cisco ios_xe 3.17.1s
cisco ios_xe 3.17.2s
cisco ios_xe 3.17.3s
cisco ios_xe 3.17.4s
cisco ios_xe 3.18.0as
cisco ios_xe 3.18.0s
cisco ios_xe 3.18.0sp
cisco ios_xe 3.18.1asp
cisco ios_xe 3.18.1bsp
cisco ios_xe 3.18.1csp
cisco ios_xe 3.18.1gsp
cisco ios_xe 3.18.1hsp
cisco ios_xe 3.18.1isp
cisco ios_xe 3.18.1s
cisco ios_xe 3.18.1sp
cisco ios_xe 3.18.2asp
cisco ios_xe 3.18.2s
cisco ios_xe 3.18.2sp
cisco ios_xe 3.18.3asp
cisco ios_xe 3.18.3bsp
cisco ios_xe 3.18.3s
cisco ios_xe 3.18.3sp
cisco ios_xe 3.18.4s
cisco ios_xe 3.18.4sp
cisco ios_xe 3.18.5sp
cisco ios_xe 3.18.6sp
cisco ios_xe 3.18.7sp
cisco ios_xe 3.18.8asp
cisco ios_xe 3.18.8sp
cisco ios_xe 16.1.1
cisco ios_xe 16.1.2
cisco ios_xe 16.1.3
cisco ios_xe 16.2.1
cisco ios_xe 16.2.2
cisco ios_xe 16.3.1
cisco ios_xe 16.3.1a
cisco ios_xe 16.3.2
cisco ios_xe 16.3.3
cisco ios_xe 16.3.4
cisco ios_xe 16.3.5
cisco ios_xe 16.3.5b
cisco ios_xe 16.3.6
cisco ios_xe 16.3.7
cisco ios_xe 16.3.8
cisco ios_xe 16.3.9
cisco ios_xe 16.3.10
cisco ios_xe 16.3.11
cisco ios_xe 16.4.1
cisco ios_xe 16.4.2
cisco ios_xe 16.4.3
cisco ios_xe 16.5.1
cisco ios_xe 16.5.1a
cisco ios_xe 16.5.1b
cisco ios_xe 16.5.2
cisco ios_xe 16.5.3
cisco ios_xe 16.6.1
cisco ios_xe 16.6.2
cisco ios_xe 16.6.3
cisco ios_xe 16.6.4
cisco ios_xe 16.6.4a
cisco ios_xe 16.6.4s
cisco ios_xe 16.6.5
cisco ios_xe 16.6.5a
cisco ios_xe 16.6.5b
cisco ios_xe 16.6.6
cisco ios_xe 16.6.7
cisco ios_xe 16.6.7a
cisco ios_xe 16.6.8
cisco ios_xe 16.7.1
cisco ios_xe 16.7.1a
cisco ios_xe 16.7.1b
cisco ios_xe 16.7.2
cisco ios_xe 16.7.3
cisco ios_xe 16.7.4
cisco ios_xe 16.8.1
cisco ios_xe 16.8.1a
cisco ios_xe 16.8.1b
cisco ios_xe 16.8.1c
cisco ios_xe 16.8.1d
cisco ios_xe 16.8.1e
cisco ios_xe 16.8.1s
cisco ios_xe 16.8.2
cisco ios_xe 16.8.3
cisco ios_xe 16.9.1
cisco ios_xe 16.9.1a
cisco ios_xe 16.9.1b
cisco ios_xe 16.9.1c
cisco ios_xe 16.9.1d
cisco ios_xe 16.9.1s
cisco ios_xe 16.9.2
cisco ios_xe 16.9.2a
cisco ios_xe 16.9.2s
cisco ios_xe 16.9.3
cisco ios_xe 16.9.3a
cisco ios_xe 16.9.3h
cisco ios_xe 16.9.3s
cisco ios_xe 16.9.4
cisco ios_xe 16.9.4c
cisco ios_xe 16.9.5
cisco ios_xe 16.9.5f
cisco ios_xe 16.9.6
cisco ios_xe 16.10.1
cisco ios_xe 16.10.1a
cisco ios_xe 16.10.1b
cisco ios_xe 16.10.1c
cisco ios_xe 16.10.1d
cisco ios_xe 16.10.1e
cisco ios_xe 16.10.1f
cisco ios_xe 16.10.1g
cisco ios_xe 16.10.1s
cisco ios_xe 16.10.2
cisco ios_xe 16.10.3
cisco ios_xe 16.11.1
cisco ios_xe 16.11.1a
cisco ios_xe 16.11.1b
cisco ios_xe 16.11.1c
cisco ios_xe 16.11.1s
cisco ios_xe 16.11.2
cisco ios_xe 16.12.1
cisco ios_xe 16.12.1a
cisco ios_xe 16.12.1c
cisco ios_xe 16.12.1s
cisco ios_xe 16.12.1t
cisco ios_xe 16.12.1w
cisco ios_xe 16.12.1x
cisco ios_xe 16.12.1y
cisco ios_xe 16.12.1z
cisco ios_xe 16.12.2
cisco ios_xe 16.12.2a
cisco ios_xe 16.12.2s
cisco ios_xe 16.12.2t
cisco ios_xe 16.12.3
cisco ios_xe 16.12.3a
cisco ios_xe 16.12.3s
cisco ios_xe 16.12.4
cisco ios_xe 16.12.4a
cisco ios_xe 17.1.1
cisco ios_xe 17.1.1a
cisco ios_xe 17.1.1s
cisco ios_xe 17.1.1t
cisco ios_xe 17.1.2
cisco ios_xe 17.2.1
cisco ios_xe 17.2.1a
cisco ios_xe 17.2.1r
cisco ios_xe 17.2.1v



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "E77A9A46-517E-467B-A702-E6F6DD9FCD96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.4e:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD485792-290B-4553-AAB2-DA7427DE7131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB7139C7-3C02-46C9-8F89-CB517A706CC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5be:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0AD00E6-A155-4CCB-B329-7B536BEBC976",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D365DFD-C99B-4F33-9A90-1162C7A4D3EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "671F6847-6855-41BF-A148-944AEEB32A5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "7207B1F1-AF21-4C02-A163-4289503A026C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7be:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7CC0497-24F5-42ED-99A6-4C8642F73F08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.7e:*:*:*:*:*:*:*",
              "matchCriteriaId": "120DA9BF-1153-41C8-B80D-3F99E0E28A8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.8e:*:*:*:*:*:*:*",
              "matchCriteriaId": "89812FA8-230C-4F62-8AA8-7F13FA86B805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "C116A982-58BF-4523-A5B1-83089E8557D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.9e:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D17DB28-2559-4837-8B4B-7CC722D73324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.6.10e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D92991EE-BB4A-499D-8F14-F7D0E32BE31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F481A851-D607-4CEF-87C5-147FFBC97D3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.4e:*:*:*:*:*:*:*",
              "matchCriteriaId": "355F4945-4FFA-469F-A799-815F371C637B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.7.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1432B59F-5A66-4A5A-B3F7-E297700ED9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "013DD522-1561-4468-A350-C872B78FC291",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6907E1FE-760E-4557-A472-1A1F0052B82B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "62291CDD-A775-44B4-85F3-CE1D494F55FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "658EDFE2-6EC8-4DD3-AACA-C168F942712A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.4e:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FCBE369-81ED-4C94-8C44-53C6F4A087CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "90005E78-413A-47D7-82B3-A3011E6B118D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.5e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D764D126-4604-43DD-9A66-BDD32565D893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.6e:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA25E3C0-24C1-479C-8C8F-A6FB9C5002FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.7e:*:*:*:*:*:*:*",
              "matchCriteriaId": "06067D8B-79BD-4982-909F-7C08BE5660C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.8e:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EAFB8DA-F9EC-4A42-A663-1BB4EF8F5E44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.9e:*:*:*:*:*:*:*",
              "matchCriteriaId": "672B77C7-0E6B-496D-9ACC-6AD965319B35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.8.10e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA1D885-2270-4370-9F3F-CA80B0E96DD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9EC727B-AF92-460D-B61D-F45ECEEE5D56",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5604A84-8240-45B6-9027-B03AA549CD5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2be:*:*:*:*:*:*:*",
              "matchCriteriaId": "895DAB3D-5C14-4D0B-94FA-EB7C7C7BB0EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.9.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9846AE-1344-4EE4-9FDF-6CE17D9461FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0ce:*:*:*:*:*:*:*",
              "matchCriteriaId": "3363DF79-8A5A-4BE2-B04C-253A4A3A0ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "25725655-EBDE-4538-8AE1-CF5C81F09C5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "A98F2654-46F3-4C63-A2C2-48B372C655B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4E206B-37BF-4D61-BE90-80BB65C0C582",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.1se:*:*:*:*:*:*:*",
              "matchCriteriaId": "17674BAD-F2F1-4E63-AAE0-FEAC14C37CBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4117E2EC-F58A-4B22-AB72-FC63A0D96E7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.10.3e:*:*:*:*:*:*:*",
              "matchCriteriaId": "20286676-70FF-471C-9612-74E5F0ECB8E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.0e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F327F7D0-93E8-4005-9ECB-44852C16BB4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "27252883-091A-471D-87FC-E07EADBC6FFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF9D58E-CD75-47B1-938C-B5C0A73E28FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2ae:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC3D979-02B2-4EEC-A6C2-A44C9FC694D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.11.2e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7C340CE-7F18-448B-B9BE-BFEB1724C882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.8s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DA6851D-6DC1-403F-A511-EE996FE832F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.9s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7C97617-6574-4EFD-8408-A9E21A56E1AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.13.10s:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB188B71-4CF0-49EA-BA00-10FEDF994D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*",
              "matchCriteriaId": "97410577-A005-49B6-981C-535B3484E72F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*",
              "matchCriteriaId": "5568EABF-8F43-4A87-8DE4-A03E9065BE53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E5BB91-B5E7-4961-87DC-26596E5EDED7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3822447-EB80-4DF2-B7F2-471F55BA99C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA0B441A-3A09-4A58-8A40-D463003A50BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E1A64A-204D-4567-A2DC-EFEB2AE62B54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "970FD986-6D0E-441C-9BF3-C66A25763A7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EEFD3AD-EFA2-4808-801E-B98E4C63AA76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "1826C997-6D5D-480E-A12E-3048B6C61216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D136C95-F837-49AD-82B3-81C25F68D0EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35B3F96-B342-4AFC-A511-7A735B961ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E203E52-0A3A-4910-863D-05FEF537C9B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED2D791-4142-4B9E-8401-6B63357536B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B6442B5-A87E-493B-98D5-F954B5A001BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*",
              "matchCriteriaId": "8794DA1D-9EE8-4139-B8E9-061A73CFD5F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FBEF4B2-EA12-445A-823E-E0E5343A405E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EAC484-1C4F-4CA8-B8E1-6EE0E9497A4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0BC5E30-71D2-4C17-A1BA-0850A9BC7D50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*",
              "matchCriteriaId": "844E7CEC-5CB6-47AE-95F7-75693347C08E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "E50A67CE-EB1C-4BFA-AB40-BCF6CDF168BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*",
              "matchCriteriaId": "147A245E-9A5D-4178-A1AC-5B0D41C3B730",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7as:*:*:*:*:*:*:*",
              "matchCriteriaId": "169D71B3-1CCE-4526-8D91-048212EEDF08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7bs:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F66514-B9C4-422E-B68E-406608302E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.7s:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2438157-4D9C-4E16-9D2A-759A8F6CDDE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.8s:*:*:*:*:*:*:*",
              "matchCriteriaId": "12ECC01E-E59F-4AED-AE51-7EE6B5E717E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.9s:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC524BA-544C-49B9-A9D6-800D25556532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10as:*:*:*:*:*:*:*",
              "matchCriteriaId": "02A07FC8-5649-4A64-8B94-507524FE4551",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.16.10s:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BC99316-75AC-45EB-B6BB-DB014ED08ECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "12793F39-13C4-4DBC-9B78-FE361BDDF89D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AEF94C7-CEE6-4696-9F1D-549639A831C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "876767C7-0196-4226-92B1-DDE851B53655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "0141D67B-632F-48ED-8837-4CC799616C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.17.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE444B39-D025-471B-835E-88671212ACAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE390091-D382-4436-BBB4-D4C33E4F6714",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE81AA43-88D4-4EFC-B8F6-A41EFF437819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "C18E6308-7A34-43E3-9AD8-5FB52B31ACB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*",
              "matchCriteriaId": "A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*",
              "matchCriteriaId": "80EE163D-D9EC-46A1-826A-54F8F3A3FFBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3170E3-0BCC-4C5F-8E6C-5E91E8C4E7A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CCDB353-DD15-4C91-AD2A-73649C012E08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D7DAAE1-BB3F-4FBA-A6ED-3BABC9196C1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BEBCBF7-D1CF-488F-BB3E-F864F901A96A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "06BBE88E-FEFB-4B90-91D1-4F053FA0EA47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8CCA19-1D1C-45C0-A1A0-CED5885AD580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "014224BF-926E-470C-A133-84036D8AD533",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3asp:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B0DE46-C4C4-4DA1-A4CD-9627F13FED3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3bsp:*:*:*:*:*:*:*",
              "matchCriteriaId": "B58E818D-03BB-4FE4-946B-B967E9764DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4063CCF8-19BE-4411-B71B-147BB146700B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.3sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DE8E0D1-E4AD-4648-BCF0-AE11B93D22B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "186ADB50-A4D4-4B32-884D-3195E7770346",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.4sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "334F278A-CFEB-4145-9D8D-EFC36A1BF258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.5sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B76F26E-7B1C-4894-8CDD-4BA1243E4EAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.6sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5FB99D7-CDA9-4C3E-9DBB-3AC1CEBA4D90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.7sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D05DBA-D3F0-492B-9976-54A7E46F315E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8asp:*:*:*:*:*:*:*",
              "matchCriteriaId": "596E09DB-97B1-4DCE-AC5E-18CC9ACCAFB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:3.18.8sp:*:*:*:*:*:*:*",
              "matchCriteriaId": "78224D59-5C86-4090-9645-170B6583C7E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED5527C-A638-4E20-9928-099E32E17743",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A685A9A-235D-4D74-9D6C-AC49E75709CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43052998-0A27-4E83-A884-A94701A3F4CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "89526731-B712-43D3-B451-D7FC503D2D65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "302933FE-4B6A-48A3-97F0-4B943251B717",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "296636F1-9242-429B-8472-90352C056106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "77993343-0394-413F-ABF9-C1215E9AD800",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "283971DD-DD58-4A76-AC2A-F316534ED416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8F324A5-4830-482E-A684-AB3B6594CEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8120196-8648-49D0-8262-CD4C9C90C37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E7CCE2-C685-4019-9B55-B3BECB3E5F76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0699DD6E-BA74-4814-93AB-300329C9D032",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E2D781-2684-45F1-AC52-636572A0DCA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "479FB47B-AF2E-4FCB-8DE0-400BF325666C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF2B4C78-5C31-4F3D-9639-305E15576E79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CB889F-B064-4CAC-99AC-903745ACA566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E8AF15-AB46-4EAB-8872-8C55E8601599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "957318BE-55D4-4585-AA52-C813301D01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F11B703-8A0F-47ED-AA70-951FF78B94A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE7B2557-821D-4E05-B5C3-67192573D97D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE6EC32-51E4-43A3-BFB9-A0D842D08E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "187F699A-AF2F-42B0-B855-27413140C384",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E0B905E-4D92-4FD6-B2FF-41FF1F59A948",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "62EDEC28-661E-42EF-88F0-F62D0220D2E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F821EBD7-91E2-4460-BFAF-18482CF6CB8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E36D2D24-8F63-46DE-AC5F-8DE33332EBC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B825E6-5929-4890-BDBA-4CF4BD2314C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65020120-491D-46CD-8C73-974B6F4C11E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADDCD0A-6168-45A0-A885-76CC70FE2FC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.4s:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F35C623-6043-43A6-BBAA-478E185480CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D83E34F4-F4DD-49CC-9C95-93F9D4D26B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2833EAE-94C8-4279-A244-DDB6E2D15DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B688E46-5BAD-4DEC-8B13-B184B141B169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8F50DB-3A80-4D89-9F7B-86766D37338B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBFC70A2-87BC-4898-BCF3-57F7B1DD5F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F13F583-F645-4DF0-A075-B4F19D71D128",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8DA556-ABF3-48D0-95B8-E57DBE1B5A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "623BF701-ADC9-4F24-93C5-043A6A7FEF5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5311FBE-12BF-41AC-B8C6-D86007834863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "52FB055E-72F9-4CB7-A51D-BF096BD1A55D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FBD681F-7969-42BE-A47E-7C287755DCB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "98255E6F-3056-487D-9157-403836EFB9D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "521ACFB0-4FB2-44DB-AD7B-C27F9059DE66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D4F634-03D5-4D9F-901C-7E9CE45F2F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "4463A1D1-E169-4F0B-91B2-FA126BB444CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "D97F69C3-CAA6-491C-A0B6-6DC12B5AB472",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD58C58-1B0C-4A71-8C02-F555CEF9C253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "96852D16-AF50-4C70-B125-D2349E6765D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "A15B882A-BA60-4932-A55E-F4A798B30EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9C585C-A6EC-4385-B915-046C110BF95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC2EE60-4A07-4D92-B9BC-BF07CF4F2BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DBE4ED-1CD8-4134-9B33-17A91F44F17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "119A964D-ABC8-424D-8097-85B832A833BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "0375BF9E-D04B-4E5B-9051-536806ECA44E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "2266E5A2-B3F6-4389-B8E2-42CB845EC7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A6CF7-9104-4882-9C95-E6D4458AB778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF5214D-9257-498F-A3EB-C4EC18E2FEB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "78DE7780-4E8B-4BB6-BDEB-58032EC65851",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29CEE37-4044-4A3C-9685-C9C021FD346A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC5BB06-100F-42C9-8CEB-CC47FD26DDF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "5292764A-7D1C-4E04-86EF-809CB68EDD25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FDA817-3A50-4B9E-8F4E-F613BDB3E9EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E16D266-108F-4F8A-998D-F1CA25F2EAAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3h:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84AE35F-D016-4B8F-8FE2-C2ACB200DFED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "41D55481-C80E-4400-9C3D-9F6B1F7F13CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BF9829-F80E-4837-A420-39B291C4E17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.4c:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07F9539-CFBE-46F7-9F5E-93A68169797D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5AB80E7-0714-44ED-9671-12C877B36A1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
              "matchCriteriaId": "10182B94-6831-461E-B0FC-9476EAB6EBEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "961F8312-31B9-44E7-8858-EF8E2134F447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D136D2BC-FFB5-4912-A3B1-BD96148CB9A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A22256FE-431C-4AD9-9E7F-7EAC2D81B1B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD5B3AB-27C2-4055-A3B7-0112D089FDA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
              "matchCriteriaId": "04081A51-E08F-4114-9276-584E836181D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADED0D82-2A4D-4235-BFAC-5EE2D862B652",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A46516-CEB7-48D4-879B-341963A1FA31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EF98FA-6DF9-4935-9639-143E08462BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "763664F5-E6CD-4936-B2F8-C5E2D5EA7BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A443E93-6C4B-4F86-BA7C-7C2A929E795A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECEDD9D-6517-44BA-A95F-D1D5488C0E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E91F8704-6DAD-474A-84EA-04E4AF7BB9B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "314C7763-A64D-4023-9F3F-9A821AE4151F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5820D71D-FC93-45AA-BC58-A26A1A39C936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC1C85DD-69CC-4AA8-B219-651D57FC3506",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB26AE0F-85D8-4EAB-B9BD-457DD81FF0FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B53E377A-0296-4D7A-B97C-576B0026543D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD98C9E8-3EA6-4160-970D-37C389576516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8BEFEDA-B01A-480B-B03D-7ED5D08E4B67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "9027A528-2588-4C06-810B-5BB313FE4323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "7745ED34-D59D-49CC-B174-96BCA03B3374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AF4CF3-6E79-4EA3-974D-CD451A192BA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
              "matchCriteriaId": "313BD54C-073C-4F27-82D5-C99EFC3A20F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B96E01-3777-4C33-9225-577B469A6CE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1z:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FC3CC1-CF4F-4A2D-A500-04395AFE8B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5019B59-508E-40B0-9C92-2C26F58E2FBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "443D78BA-A3DA-4D1F-A4DF-2F426DC6B841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
              "matchCriteriaId": "1986DB1F-AD0A-42FE-8EC8-F18BA1AD4F99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.2t:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C6FB4DC-814D-49D2-BBE2-3861AE985A1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5750264-2990-4942-85F4-DB9746C5CA2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "02352FD8-2A7B-41BD-9E4A-F312ABFDF3EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9173AD6-6658-4267-AAA7-D50D0B657528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F02EE9D-45B1-43D6-B05D-6FF19472216B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C1DBBCD-4C5A-43BB-8FB0-6F1AF99ED0D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89369318-2E83-489F-B872-5F2E247BBF8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
              "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
              "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in a diagnostic command for the Plug-and-Play (PnP) subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to the level of an Administrator user (level 15) on an affected device. The vulnerability is due to insufficient protection of sensitive information. An attacker with low privileges could exploit this vulnerability by issuing the diagnostic CLI show pnp profile when a specific PnP listener is enabled on the device. A successful exploit could allow the attacker to obtain a privileged authentication token. This token can be used to send crafted PnP messages and execute privileged commands on the targeted system."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en un comando de diagn\u00f3stico para el subsistema Plug-and-Play (PnP) del Software Cisco IOS XE, podr\u00eda permitir a un atacante local autenticado eleve privilegios al nivel de un usuario administrador (nivel 15) en un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido a una protecci\u00f3n insuficiente de la informaci\u00f3n confidencial.\u0026#xa0;Un atacante con pocos privilegios podr\u00eda explotar esta vulnerabilidad emitiendo el show pnp profile de la CLI de diagn\u00f3stico cuando un oyente PnP espec\u00edfico est\u00e1 habilitado en el dispositivo.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante obtener un token de autenticaci\u00f3n privilegiado.\u0026#xa0;Este token se puede utilizar para enviar mensajes PnP dise\u00f1ados y ejecutar comandos privilegiados en el sistema de destino"
    }
  ],
  "id": "CVE-2021-1442",
  "lastModified": "2024-11-21T05:44:22.433",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-03-24T20:15:15.133",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-pnp-priv-esc-AmG3kuVL"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-pnp-priv-esc-AmG3kuVL"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-532"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.