fkie_cve-2024-20381
Vulnerability from fkie_nvd
Published
2024-09-11 17:15
Modified
2024-10-08 21:43
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.
This vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2FD2C84-CD64-4C1C-BC38-2F7A2A6EEF45", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "2DE98B34-501B-449A-843A-58F297EDBE1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "86E05C3F-4095-4B9C-8C11-E32567EB14AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "582B1A3D-68F5-4047-98B2-FEC2A9569828", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.25:*:*:*:*:*:*:*", "matchCriteriaId": "EDAABB7C-DD62-418F-9CD3-B868913453AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.26:*:*:*:*:*:*:*", "matchCriteriaId": "DECAACAE-0DFF-43CE-83AF-84FEABAB2CAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.28:*:*:*:*:*:*:*", "matchCriteriaId": "4B9EE8F5-2F17-45E8-91BD-9DB5EE97B0CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.29:*:*:*:*:*:*:*", "matchCriteriaId": "C3C1199B-57C2-4076-A612-5F75AE46B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.31:*:*:*:*:*:*:*", "matchCriteriaId": "6CB20C4D-F8AD-4887-8B73-07495439BA3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.32:*:*:*:*:*:*:*", "matchCriteriaId": "EE3676F8-475D-4C5D-A932-633E55A1C115", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.33:*:*:*:*:*:*:*", "matchCriteriaId": "13E2915D-36F8-4AFE-A2E0-59A8DF87A101", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.90:*:*:*:*:*:*:*", "matchCriteriaId": "2F6FF116-1FFB-4960-942E-A1A16ACEA7F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:*", "matchCriteriaId": "6CFC77F8-4131-42E1-93A4-13149BDCDC1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:*", "matchCriteriaId": "676F3DD0-6081-4C37-8E4F-210BC59C3C09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "54EA6C52-E541-4426-A3DF-2FA88CA28BA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "B8AE8971-5003-4A39-8173-E17CE9C2523F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "36944A2B-E4F5-41DE-AC4D-55BFA603BE5E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "4E6EA55E-05BA-483F-AAE1-DD573D22D6A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "BC51CBC1-3303-43EF-B617-AD0C59E36000", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "C710E576-B368-41C9-88A8-75D88E00F4B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "3DC7F758-5AB7-4A45-A889-BE9DD8D0474E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB06AB15-7F91-4B17-BBBD-AC4E4D1EBF9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1D7FA61-7D81-4FF3-827C-A97D35AB541B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "870B498C-3358-4EC0-B75A-B9A5D1DD40DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "95BB2A02-11B4-48C1-97D7-25A9DF28ABB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.7.35:*:*:*:*:*:*:*", "matchCriteriaId": "A5CEC350-6245-453D-BB6D-79D444E1A5FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "004286E0-375F-4385-87EB-0C74BD9CAF6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "1B255442-4F12-41A1-8050-B805AAE65947", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "89FBA2B4-490F-4A00-8967-063F91F197E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:6.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "93125F1D-0CE5-423F-A73E-46F2A91E5FC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "00D33162-F298-4B99-A3D4-283A2A4FA091", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82AF763B-9299-4EDC-B42D-B83736839CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F70AB37-3C0B-40A8-BC37-5A79DA5F45F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "921B3622-76A3-4D9F-936C-25A965CE1A0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "56092600-ABD2-4703-BA00-9DD0AE09B46D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C4B7EEF2-9B6A-43FC-8DBE-F82B8E01BCAE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "2E5C0909-27D8-4B6E-A644-9B8ADFA24266", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E90BEFD1-AAA5-4D39-A180-4B5ED3427AFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8B842317-A5DB-4890-948A-DD26B7AE2540", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "00EA89C8-AAE8-48F1-91E4-7AE46083A802", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "48928FFF-871C-4C07-8352-8C802FAD8F53", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "06FDB11D-C54D-4654-8142-B50D306A6A28", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "84BABFE7-1350-4FB0-B9ED-5F08E386BC40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B7FE3667-1B5E-48FB-B3BB-1C1854FFEE72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B0370A9-E422-4109-81A3-DE2118A20827", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "3E20F814-87D4-41A5-B0A0-30AC6C6F2BB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "82CD7F68-9569-43F4-88ED-96F9A15C065D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2C4C062-F816-41FE-ADAD-F994F4FA4A07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A07E9C56-D143-45FA-99FF-30F54A828BF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "F406EAA7-0607-419F-97E3-7ACEC8A3FA5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "DB9D0641-28F8-4CCB-AEC3-205409D1704A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "1ECA7B4C-8FDD-4053-B37B-E5E0969C0CB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:*", "matchCriteriaId": "D21DEFD5-EC43-496B-BBE1-C71C6055BC04", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.16:*:*:*:*:*:*:*", "matchCriteriaId": "83150BDE-63B7-4B36-8584-E2E950E878CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.3.27:*:*:*:*:*:*:*", "matchCriteriaId": "8511927B-4297-47BA-BC02-6250BC40DF2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "40C6D7C4-A5D9-4365-9664-EF35586925AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC41A004-2029-4E22-A88F-2B93D9786B6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "2E19F529-B25B-4B4B-879B-872D45C7C3B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "D501F5A6-4E23-4A9F-A550-37BB94691687", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "57F7D7FD-24A8-4DD4-8280-A18244059F34", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "7A7448D1-BC19-45AB-BF6F-3434F8CA2CC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "7A057808-1BCA-4C7C-A2D9-0BD5B09D20F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "A7D09FC0-73C5-4F7A-8013-0B0E5CC834FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DFA4A8AF-348D-4F90-B1CB-AE784E0A6EBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "23A66FF7-9BAB-40DA-8B90-C3C271D7E893", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.5.52:*:*:*:*:*:*:*", "matchCriteriaId": "88776859-57A0-4422-8D23-A09D64E72F63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "6C95648D-A37A-446B-B106-12612C00A34D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DF31489-C029-4D4C-8401-26873FC469E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "2F79CAFA-73B0-4589-9938-B7898071279C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "43AA14EF-3240-442E-935A-DF455FB107D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "1807BE16-BAA9-4BC6-B98A-13D584A12821", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "375746CB-695E-4019-89C9-42ED37A5E958", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*", "matchCriteriaId": "CE7D05C0-4065-448B-AAC6-F29E379F3DA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8ADA2B1-FD5A-4900-953B-30951C8EF9AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B4C7223-3EFB-48C2-BE22-941F60826D0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "9A14959D-63E1-4B5A-BB7F-A9A2AF3F1137", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*", "matchCriteriaId": "4EE83701-C0B7-4ED2-866B-44B7F54FCA0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "164B241C-397A-4921-BC5B-F928A21E91C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "FAD3875D-D283-4961-BE31-750FDF9CDF56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*", "matchCriteriaId": "87EF9DC5-4BE2-429D-B9BA-EF9F29E7E0F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAEC28C0-8091-49F9-88D1-CB96234BF52A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "E1ED2B72-A65C-47E4-87B3-D83F29428396", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "8904CAA5-4E01-462C-AE57-067902CD95FC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "7750EA99-EC55-4F94-8730-18583647BBBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BCE8E968-111F-4F57-93D3-E509AB540B87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B342A550-8600-45CF-8B9A-530770C9A0F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D64E1C4D-46B0-4A18-B8EE-BEA732CBF1F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "11288A28-F0CF-4FEC-A0B7-3D93866F01FE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "E443700B-7420-4959-8781-29A961DE3144", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "6A41FC95-2C56-41FE-9C1B-853E7D685024", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "C41EF180-BDD5-459B-A3FA-3A34E34A8672", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:4.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "2714BDA1-C8C6-46FB-9467-8AE2E4545753", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E525F90-EC23-4625-9A9F-0A924D0C4D6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "F07294F0-BDB0-426B-8C37-737C9EB4E605", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "4DF1323A-CD68-4CD9-A8D8-7966399DB432", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3E2331E2-7ED7-49A4-93DE-A7D3D5E63CA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4FC7C531-EB15-48CB-B38E-2BA17D6637FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A6BCD116-1AE8-4DA4-9B64-B552EFF23C2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "413626AE-64BD-4A3D-8D59-ADD65EFCCA44", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A71B27F-1A89-4E35-BA75-695DE524B4C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C6E8040D-FA4A-44BD-BD20-2A76CC6507AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "765BBD25-32E8-486B-8380-67A5424E4943", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6CCEB57-23E8-455F-A2EC-2C4478E1CCE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "F53CA675-2B6A-4AF0-B47A-9CF131914D08", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "F1F1E3B6-75B4-4A65-A94C-14A5BE5D646E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "F91B24FC-A609-4EE9-8D34-CD1B299E7B31", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "8F4C10EB-D35C-4A89-98A8-91AE7294A704", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "802BC39C-C12B-457F-9146-6714EB3A6B65", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA6BBC9B-3CF2-4FCC-B05E-9CCFEAEB0444", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2DF3DDC-D4DE-4C57-A268-3F76D5C187AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "82400920-83E5-4CEA-B82C-3565F51A8AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "2D60C892-4637-4C1D-A409-D387293148E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A58DBD73-7EB9-4037-9958-AB86B1B89FF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B54847A-2DDA-4732-83CA-A7C5B712F8D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9B8EDA7A-2225-434C-92FB-46811B86E8AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "156A30C4-43FE-4FEB-B02E-091D52219FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CD917986-623C-40F0-9259-7C1C8DAB7FE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "A252665A-9552-4E5A-8E2D-91367935243A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "6EEC76C9-943E-493D-8CB3-52CFF1A72B33", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "06CAC133-30EF-46B7-891A-A9BB491A28BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "5F0610DF-ED6B-4CE0-B370-BBB0E304F4EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4B0392BF-9CE5-4100-B693-63396A0B4B43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "AEBF62D1-DF1B-4AF6-BC49-AB9466308EB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF057C73-364F-4F2D-962B-2AA1D85ED7AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8DBC58D-9DCD-42A5-99D6-07D3596795A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.4.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "B8E6BA26-1B17-4E73-A296-F54961B0ACF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "9F85FA2F-AEBF-4E2C-957E-DE7A9A1C02EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB4824C6-B348-44B9-A8AD-CAC1F6A563CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "3ABACE44-9BAE-4095-9295-91C07DBE595D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "64EB1AD9-9113-4B16-AE62-C0F0DFBEB018", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "23CE49FB-254A-4E44-B517-6C288B711F2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "DF11B736-689B-4C7F-A1F3-CD97A094F43F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "C5D3D6E8-5143-4628-84FA-848621ADEC63", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9A2E2B31-CB8A-4951-AF08-CFA80E8B27FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "AC7116FF-1330-4A46-AF91-2C5D27B1318D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "AC7154C5-A846-4886-81FF-64214FED7D4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "295C0732-456E-4F07-8A38-5957948817EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "403FE9A9-E2A3-433E-B548-8D95651E7C3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "C835D3D2-E6AD-440E-A2F5-082F4C99153B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "58F8CDAD-EAEC-4797-A21D-8ABF16B32475", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "4A1B0F01-0271-4BBD-9889-DEE18BAD5AF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "B3F66603-F8EF-4CA1-9879-42E99C210BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "309CA68A-C1F4-439A-98D3-741935B8CC3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "DCA46058-3BE0-4BC1-82CA-0AE53A80F3FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "144C1FCD-2447-4E07-BD2B-871EC06354F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "87EFD8DD-FD2B-4E0A-8303-17DB29E7F5B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "D0FA1FB8-C19E-43D6-84A7-F897160C26A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B71D5A54-601E-42A0-AB91-D1E761E0744E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "3C6998BB-36BA-4810-9B71-ECA7F33E0016", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "1F3ACECC-02D8-4BC3-B078-1BADA71E1DE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "6BA03D9B-31BC-45F5-990A-874AE3DCAA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "BCA19CDA-271E-4595-AD80-770B4538BA40", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "0D050B2A-27E4-44BF-93B5-0E6BB468D7DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "70FC4BAB-3B19-4BCA-9D42-1B98F9838152", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "C84A3BFC-6EB7-4033-98DA-29AEBD99CC8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "C093AC95-6AF3-4DC0-908F-ADF772E4F666", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6E5028C-382E-4A03-9A43-F7209BD97539", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "72232584-47D2-4F3F-BFB8-1095E6724C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "E9443CC5-E05C-4A18-ACD9-C19B6E6418BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA243285-5232-4A98-B9BE-B12CD3587FF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "FB01732E-6DB7-412B-A637-48E0172E6C96", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "55B68999-C474-4B21-9111-3260E0F18BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "932CCBCA-DF46-452F-ABCB-C5C3175FA85F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1D92B9DB-E9C5-4001-8447-5C2472688194", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "91C0DDE0-E180-4AE2-940A-0C89EF7DB4B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BC224D85-8E47-4A58-A4C9-5D41DDB9D73A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "199C8B23-6D39-492C-993E-6225286A0A34", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "A9399BB6-714F-4DEA-8ECC-2D0893B672DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "98602BBC-C114-418B-B88D-D4AD339B290A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "4CBD78F0-B77C-4148-A3B2-0C6016930939", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "B4F05686-485D-439C-BEA9-926FAB21F12E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "73C8D395-56A0-4566-847B-7D5C4B2C42B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.6.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "D92EC730-B1F6-4EAC-BBEF-B5D9C4C85E49", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7:*:*:*:*:*:*:*", "matchCriteriaId": "1145978F-E24C-47ED-84FC-2AFFBC272DD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF994951-C059-4EE9-8591-0695A96A0BF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CDEC30FD-F737-4E66-9C01-95BA35514568", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1CA4D17C-F749-4EB5-8286-E0E4AA44493A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "391047D2-AF48-422D-972E-F223291ABD68", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A49A79FA-8AEF-44C3-8699-4CEC4D766904", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "19AE4D74-EC42-4B22-A797-61BDBCADF924", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "4BF753CA-96BE-48AD-B270-759B5A18DAF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "9F189855-3A32-41EB-9443-FDDE4A89F5A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "1025F731-68B9-45AD-A241-5D1495A29BE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "800E3600-ADCA-4E34-9577-C72D16A2066E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "705000A2-856C-4D55-8110-2CBFF703C8D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "7C68D55F-DA33-4399-9B7D-9554BFAB406C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "8B622A5A-E399-41D8-8793-AFBB8EE75B99", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "90BA565B-2CA1-450C-B70A-674E0ADDF064", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D70D77E-525B-4BC6-B3AE-F8A44FEC61AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "918BA5DD-7471-435D-B63B-502EB376F85C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "A0317414-CCA7-4FAC-913D-F4C00705EA57", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "2E065BC8-435E-4839-9567-E5FDBF661205", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C4FCC3F-F93C-42B2-B8D2-99BCF4DEB635", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "179C0976-C7FC-42C7-83E5-86EC9B5D532C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "8DCE317C-C735-42E2-9DB3-BD196BA76D78", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "3AC45034-E4BE-4F06-8309-E549E0D9B562", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "E05877D6-C2C6-41CD-A991-744D118D3002", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "C166F45B-D549-4923-AB36-92B3CA62CBB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "C9F97DD8-908D-463E-A450-6C779654F000", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "15E92D58-E51B-4342-964F-C000BD71BF69", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "C0BE2AA5-4CF8-4D0A-B352-BE14726F3BB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "DAF61782-327C-4318-A4D1-DCB18CD835B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2E8DD03-132C-4817-B933-2407B5E0AD7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "85101BB8-0B1C-4427-8036-9010D1ECE540", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "496BA920-9C48-421C-A57F-BE9D915AD579", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "68C9ADE2-55B2-4DF0-8260-442FE5A9793E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "9B88C8BB-4F6A-46A8-A497-9C60ECEE1007", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "CE403468-28B3-4D77-A9D7-1EE6D76CE471", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "AF76BE52-F087-4CA5-8C24-8BC2F1C97095", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "D4AA8354-B5EF-4531-BAD5-DD93B2B3D4AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "C21305D6-69A0-404F-89DC-A0E86F80E697", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.9:*:*:*:*:*:*:*", "matchCriteriaId": "CE99795F-00D9-42F4-815D-19E521082BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.10:*:*:*:*:*:*:*", "matchCriteriaId": "45C6B391-8090-4497-9EC9-4FD94AAC68DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.11:*:*:*:*:*:*:*", "matchCriteriaId": "151E7ABB-C721-4D6A-B3BD-68940759E82C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "FDAA2184-FAEF-4922-9BAB-852877668DBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:5.8.13:*:*:*:*:*:*:*", "matchCriteriaId": "1C051D85-8C16-491B-85A9-0FC1E145C26C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "12372956-7A20-41A8-99AC-681CEAF3CDC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "068388B1-70D0-4564-A522-674DC5841A8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "30FAE307-7F0B-4EE2-952C-ECC8BA23182D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "44965AAD-ED9A-4B36-B3BD-BE7847F4B792", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9AB064EC-1DFE-4867-996A-07B5A79DCF23", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "68BF41E7-5FDF-4CC6-8FF0-CFE38F6389CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0F4EABC1-BBBD-4071-B2CA-907B6308860E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "A75324A4-4D55-4BB6-9339-A03043180792", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "219EC420-2380-4F9D-B82F-5CFA269775A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "990B90E2-10A8-42EA-B4EB-F732DED56228", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "32CF825B-3833-4C72-B184-7A632EDBD44F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "BA216821-8CBB-4516-8A14-D2BCF5788370", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "1579B285-C10F-41AB-A1AD-EC5F90B20B7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "63F2B96F-260C-4B52-B13A-062829EC9606", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "E5D03E31-1D49-4E2C-B4D1-36C5FDEB49A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC39C270-F394-45D7-AEF1-90B0BD79196F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "61F637D6-B3E9-4360-BF15-4DF0578FB44E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "49E7F783-AB7E-4AAC-AB55-2A583F12F304", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "88604B7A-5229-4AE0-A9CE-26807EE8462F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF72DE28-B9B9-4610-9134-815F9ECA91B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "CF9E6216-ABF2-423C-AF6A-8CA2A59C727F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "33CE392E-4967-4642-8684-255D3F1495A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "7278073E-4120-4F18-B1F2-BB7CD3906036", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "D43C8648-6252-4F46-83F6-2AB426B9EE0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A0DC561-807C-403D-8411-10D29452B556", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "A9F82F88-BF9E-46F6-89EE-EF40A52AC3DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2BAB7B15-928C-46EE-9492-5A90F90B2AEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "11EA9560-627B-481F-9D4A-50D3405EECD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D3F11CA7-FDA9-4619-8348-6D64AE7F0B6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "90A9E632-E565-495C-9320-B60C0453255E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AF233BA-F8C3-42A4-8B4A-4B8E30D8BFA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "88FEF411-FBD1-4325-80B7-7332404E394D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "96648453-E5C8-4918-8F41-96D42E1BFFD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "450ADE1F-34F3-4D70-9751-2F5B218E4DFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:network_services_orchestrator:6.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A48EF6BA-EAA4-4003-AEE9-022640F2DE17", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.00.29:*:*:*:*:*:*:*", "matchCriteriaId": "786614DB-8964-4884-9E0A-193C89D417D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.00.33:*:*:*:*:*:*:*", "matchCriteriaId": "36B965F4-8FB6-407C-9B88-53FE29DEF602", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.01.16:*:*:*:*:*:*:*", "matchCriteriaId": "AD660011-2247-4F85-BA11-1DB838506AAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.01.17:*:*:*:*:*:*:*", "matchCriteriaId": "01EFE926-5578-40D7-851D-001F16CE28A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.01.18:*:*:*:*:*:*:*", "matchCriteriaId": "743F3329-FAB7-482C-BD92-5C0C619BA53E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.01.20:*:*:*:*:*:*:*", "matchCriteriaId": "12716096-EB28-4677-AAA9-53F522450BBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.02.16:*:*:*:*:*:*:*", "matchCriteriaId": "4BB289D6-3B6F-4390-A48D-1585C4D17771", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.15:*:*:*:*:*:*:*", "matchCriteriaId": "FE174F74-9CA2-4099-9C36-62F442F17EFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.16:*:*:*:*:*:*:*", "matchCriteriaId": "C2A8DA1B-25AC-4720-A9F2-0F0C20FB064B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.17:*:*:*:*:*:*:*", "matchCriteriaId": "F21E0381-D214-42C2-824D-140DC25961F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.18:*:*:*:*:*:*:*", "matchCriteriaId": "058A5EA8-4B92-4FC9-B7A2-2C0AD98E86F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.19:*:*:*:*:*:*:*", "matchCriteriaId": "4CFAA7D9-44BC-4E66-8E5C-C09077A6B9B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.20:*:*:*:*:*:*:*", "matchCriteriaId": "543D0D44-2738-4879-A175-B062B6DD4F49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.21:*:*:*:*:*:*:*", "matchCriteriaId": "29D4A2D7-7FE7-48D5-A851-AC4A182A4C74", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.22:*:*:*:*:*:*:*", "matchCriteriaId": "74B7A5F1-31FA-4E38-BCB4-4BBA3EA043E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.24:*:*:*:*:*:*:*", "matchCriteriaId": "61782FA1-1755-4EDE-AEF1-242576D42D5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.26:*:*:*:*:*:*:*", "matchCriteriaId": "DB56C4B6-49B4-4F2D-8C9A-A2C2CEE6B08E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.27:*:*:*:*:*:*:*", "matchCriteriaId": "2BABC34E-7579-4ABF-A67C-15E781400A9E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.28:*:*:*:*:*:*:*", "matchCriteriaId": "274BDB13-1477-44BB-A71E-965491FE63A1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:small_business_rv_series_router_firmware:1.0.03.29:*:*:*:*:*:*:*", "matchCriteriaId": "E6D6D4EA-3873-4A3E-8226-0B2FBD91D85F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.\u0026nbsp;\r\n\r\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system." }, { "lang": "es", "value": "Una vulnerabilidad en la funci\u00f3n API JSON-RPC en ConfD que utilizan las interfaces de administraci\u00f3n basadas en web de Cisco Crosswork Network Services Orchestrator (NSO), Cisco Optical Site Manager y Cisco RV340 Dual WAN Gigabit VPN Routers podr\u00eda permitir que un atacante remoto autenticado modifique la configuraci\u00f3n de una aplicaci\u00f3n o dispositivo afectado. Esta vulnerabilidad se debe a comprobaciones de autorizaci\u00f3n incorrectas en la API. Un atacante con privilegios suficientes para acceder a la aplicaci\u00f3n o dispositivo afectado podr\u00eda explotar esta vulnerabilidad enviando solicitudes maliciosas a la API JSON-RPC. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante realizar modificaciones no autorizadas a la configuraci\u00f3n de la aplicaci\u00f3n o dispositivo afectado, incluida la creaci\u00f3n de nuevas cuentas de usuario o la elevaci\u00f3n de sus propios privilegios en un sistema afectado." } ], "id": "CVE-2024-20381", "lastModified": "2024-10-08T21:43:28.757", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-11T17:15:12.403", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nso-auth-bypass-QnTEesp" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.