Vulnerabilites related to cisco - catalyst_2960x-24psq-l_cool
CVE-2018-0156 (GCVE-0-2018-0156)
Vulnerability from cvelistv5
Published
2018-03-28 22:00
Modified
2025-07-30 01:46
Severity ?
CWE
Summary
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
Impacted products
Vendor Product Version
n/a Cisco IOS and IOS XE Version: Cisco IOS and IOS XE
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T03:14:16.905Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
          },
          {
            "name": "1040596",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1040596"
          },
          {
            "name": "103569",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/103569"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-0156",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T17:27:51.944144Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-03-03",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0156"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-30T01:46:17.925Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "timeline": [
          {
            "lang": "en",
            "time": "2022-03-03T00:00:00+00:00",
            "value": "CVE-2018-0156 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS and IOS XE",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco IOS and IOS XE"
            }
          ]
        }
      ],
      "datePublic": "2018-03-28T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-399",
              "description": "CWE-399",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-19T13:57:01.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
        },
        {
          "name": "1040596",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1040596"
        },
        {
          "name": "103569",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/103569"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2018-0156",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS and IOS XE",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco IOS and IOS XE"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-399"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04"
            },
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
            },
            {
              "name": "1040596",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1040596"
            },
            {
              "name": "103569",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/103569"
            },
            {
              "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05",
              "refsource": "MISC",
              "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2018-0156",
    "datePublished": "2018-03-28T22:00:00.000Z",
    "dateReserved": "2017-11-27T00:00:00.000Z",
    "dateUpdated": "2025-07-30T01:46:17.925Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-20181 (GCVE-0-2025-20181)
Vulnerability from cvelistv5
Published
2025-05-07 17:35
Modified
2025-05-07 19:45
CWE
  • CWE-347 - Improper Verification of Cryptographic Signature
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
Impacted products
Vendor Product Version
Cisco IOS Version: 15.0(1)XO1
Version: 15.0(1)XO
Version: 15.0(2)XO
Version: 15.0(1)EY
Version: 15.0(1)EY1
Version: 15.0(1)EY2
Version: 15.0(2)SE8
Version: 15.0(1)EX
Version: 15.0(2)EX
Version: 15.0(2)EX1
Version: 15.0(2)EX2
Version: 15.0(2)EX3
Version: 15.0(2)EX4
Version: 15.0(2)EX5
Version: 15.0(2)EX8
Version: 15.0(2a)EX5
Version: 15.0(2)EX10
Version: 15.0(2)EX11
Version: 15.0(2)EX13
Version: 15.0(2)EX12
Version: 15.2(2)E
Version: 15.2(3)E
Version: 15.2(2)E1
Version: 15.2(4)E
Version: 15.2(3)E1
Version: 15.2(2)E2
Version: 15.2(2a)E1
Version: 15.2(2)E3
Version: 15.2(2a)E2
Version: 15.2(3)E2
Version: 15.2(3a)E
Version: 15.2(3)E3
Version: 15.2(4)E1
Version: 15.2(2)E4
Version: 15.2(2)E5
Version: 15.2(4)E2
Version: 15.2(3)E4
Version: 15.2(5)E
Version: 15.2(4)E3
Version: 15.2(2)E6
Version: 15.2(5)E1
Version: 15.2(5b)E
Version: 15.2(2)E5a
Version: 15.2(2)E5b
Version: 15.2(4)E4
Version: 15.2(2)E7
Version: 15.2(5)E2
Version: 15.2(6)E
Version: 15.2(4)E5
Version: 15.2(2)E8
Version: 15.2(6)E0a
Version: 15.2(6)E1
Version: 15.2(6)E0c
Version: 15.2(4)E6
Version: 15.2(6)E2
Version: 15.2(2)E9
Version: 15.2(4)E7
Version: 15.2(7)E
Version: 15.2(2)E10
Version: 15.2(4)E8
Version: 15.2(6)E2a
Version: 15.2(6)E2b
Version: 15.2(7)E1
Version: 15.2(7)E0a
Version: 15.2(7)E0b
Version: 15.2(7)E0s
Version: 15.2(6)E3
Version: 15.2(4)E9
Version: 15.2(7)E2
Version: 15.2(7a)E0b
Version: 15.2(4)E10
Version: 15.2(7)E3
Version: 15.2(7)E1a
Version: 15.2(7b)E0b
Version: 15.2(7)E2a
Version: 15.2(4)E10a
Version: 15.2(7)E4
Version: 15.2(7)E3k
Version: 15.2(8)E
Version: 15.2(8)E1
Version: 15.2(7)E5
Version: 15.2(7)E6
Version: 15.2(8)E2
Version: 15.2(4)E10d
Version: 15.2(7)E7
Version: 15.2(8)E3
Version: 15.2(7)E8
Version: 15.2(8)E4
Version: 15.2(7)E9
Version: 15.2(8)E5
Version: 15.2(8)E6
Version: 15.2(7)E10
Version: 15.2(6)EB
Version: 15.2(4)EA7
Version: 15.2(4)EA8
Version: 15.2(4)EA9
Version: 15.2(4)EA9a
Version: 15.0(2)SQD
Version: 15.0(2)SQD1
Version: 15.0(2)SQD2
Version: 15.0(2)SQD3
Version: 15.0(2)SQD4
Version: 15.0(2)SQD5
Version: 15.0(2)SQD6
Version: 15.0(2)SQD7
Version: 15.0(2)SQD8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20181",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-07T18:56:17.739877Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-07T19:45:02.742Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "IOS",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "15.0(1)XO1"
            },
            {
              "status": "affected",
              "version": "15.0(1)XO"
            },
            {
              "status": "affected",
              "version": "15.0(2)XO"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY1"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE8"
            },
            {
              "status": "affected",
              "version": "15.0(1)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX1"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX2"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX3"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX4"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX5"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX8"
            },
            {
              "status": "affected",
              "version": "15.0(2a)EX5"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX10"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX11"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX13"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX12"
            },
            {
              "status": "affected",
              "version": "15.2(2)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E1"
            },
            {
              "status": "affected",
              "version": "15.2(4)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3a)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5"
            },
            {
              "status": "affected",
              "version": "15.2(4)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E4"
            },
            {
              "status": "affected",
              "version": "15.2(5)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2)E6"
            },
            {
              "status": "affected",
              "version": "15.2(5)E1"
            },
            {
              "status": "affected",
              "version": "15.2(5b)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5a"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E7"
            },
            {
              "status": "affected",
              "version": "15.2(5)E2"
            },
            {
              "status": "affected",
              "version": "15.2(6)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E5"
            },
            {
              "status": "affected",
              "version": "15.2(2)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E1"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0c"
            },
            {
              "status": "affected",
              "version": "15.2(4)E6"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2)E9"
            },
            {
              "status": "affected",
              "version": "15.2(4)E7"
            },
            {
              "status": "affected",
              "version": "15.2(7)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E10"
            },
            {
              "status": "affected",
              "version": "15.2(4)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0s"
            },
            {
              "status": "affected",
              "version": "15.2(6)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E9"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2"
            },
            {
              "status": "affected",
              "version": "15.2(7a)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1a"
            },
            {
              "status": "affected",
              "version": "15.2(7b)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3k"
            },
            {
              "status": "affected",
              "version": "15.2(8)E"
            },
            {
              "status": "affected",
              "version": "15.2(8)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E5"
            },
            {
              "status": "affected",
              "version": "15.2(7)E6"
            },
            {
              "status": "affected",
              "version": "15.2(8)E2"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10d"
            },
            {
              "status": "affected",
              "version": "15.2(7)E7"
            },
            {
              "status": "affected",
              "version": "15.2(8)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E8"
            },
            {
              "status": "affected",
              "version": "15.2(8)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E9"
            },
            {
              "status": "affected",
              "version": "15.2(8)E5"
            },
            {
              "status": "affected",
              "version": "15.2(8)E6"
            },
            {
              "status": "affected",
              "version": "15.2(7)E10"
            },
            {
              "status": "affected",
              "version": "15.2(6)EB"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA7"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA8"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9a"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "cvssV3_0"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-347",
              "description": "Improper Verification of Cryptographic Signature",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-07T17:35:31.850Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
        }
      ],
      "source": {
        "advisory": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
        "defects": [
          "CSCvd75918"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20181",
    "datePublished": "2025-05-07T17:35:31.850Z",
    "dateReserved": "2024-10-10T19:15:13.225Z",
    "dateUpdated": "2025-05-07T19:45:02.742Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2018-03-28 22:29
Modified
2025-01-27 20:10
Summary
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
Impacted products
Vendor Product Version
cisco ios 15.2\(2\)e4
cisco ios 15.2\(2a\)ja
cisco catalyst_2960-plus_24lc-l -
cisco catalyst_2960-plus_24lc-s -
cisco catalyst_2960-plus_24pc-l -
cisco catalyst_2960-plus_24pc-s -
cisco catalyst_2960-plus_24tc-l -
cisco catalyst_2960-plus_24tc-s -
cisco catalyst_2960-plus_48pst-l -
cisco catalyst_2960-plus_48pst-s -
cisco catalyst_2960-plus_48tc-l -
cisco catalyst_2960-plus_48tc-s -
cisco catalyst_2960c-12pc-l -
cisco catalyst_2960c-8pc-l -
cisco catalyst_2960c-8tc-l -
cisco catalyst_2960c-8tc-s -
cisco catalyst_2960cg-8tc-l -
cisco catalyst_2960cpd-8pt-l -
cisco catalyst_2960cpd-8tt-l -
cisco catalyst_2960s-24pd-l -
cisco catalyst_2960s-24ps-l -
cisco catalyst_2960s-24td-l -
cisco catalyst_2960s-24ts-l -
cisco catalyst_2960s-24ts-s -
cisco catalyst_2960s-48fpd-l -
cisco catalyst_2960s-48fps-l -
cisco catalyst_2960s-48lpd-l -
cisco catalyst_2960s-48lps-l -
cisco catalyst_2960s-48td-l -
cisco catalyst_2960s-48ts-l -
cisco catalyst_2960s-48ts-s -
cisco catalyst_2960s-f24ps-l -
cisco catalyst_2960s-f24ts-l -
cisco catalyst_2960s-f24ts-s -
cisco catalyst_2960s-f48fps-l -
cisco catalyst_2960s-f48lps-l -
cisco catalyst_2960s-f48ts-l -
cisco catalyst_2960s-f48ts-s -
cisco catalyst_2960x-24pd-l -
cisco catalyst_2960x-24ps-l -
cisco catalyst_2960x-24psq-l_cool -
cisco catalyst_2960x-24td-l -
cisco catalyst_2960x-24ts-l -
cisco catalyst_2960x-24ts-ll -
cisco catalyst_2960x-48fpd-l -
cisco catalyst_2960x-48fps-l -
cisco catalyst_2960x-48lpd-l -
cisco catalyst_2960x-48lps-l -
cisco catalyst_2960x-48td-l -
cisco catalyst_2960x-48ts-l -
cisco catalyst_2960x-48ts-ll -
cisco catalyst_2960xr-24pd-i -
cisco catalyst_2960xr-24ps-i -
cisco catalyst_2960xr-24td-i -
cisco catalyst_2960xr-24ts-i -
cisco catalyst_2960xr-48fpd-i -
cisco catalyst_2960xr-48fps-i -
cisco catalyst_2960xr-48lpd-i -
cisco catalyst_2960xr-48lps-i -
cisco catalyst_2960xr-48td-i -
cisco catalyst_2960xr-48ts-i -
cisco catalyst_3560c-12pc-s -
cisco catalyst_3560c-8pc-s -
cisco catalyst_3560cg-8pc-s -
cisco catalyst_3560cg-8tc-s -
cisco catalyst_3560cpd-8pt-s -
cisco catalyst_3560x-24p-e -
cisco catalyst_3560x-24p-l -
cisco catalyst_3560x-24p-s -
cisco catalyst_3560x-24t-e -
cisco catalyst_3560x-24t-l -
cisco catalyst_3560x-24t-s -
cisco catalyst_3560x-24u-e -
cisco catalyst_3560x-24u-l -
cisco catalyst_3560x-24u-s -
cisco catalyst_3560x-48p-e -
cisco catalyst_3560x-48p-l -
cisco catalyst_3560x-48p-s -
cisco catalyst_3560x-48pf-e -
cisco catalyst_3560x-48pf-l -
cisco catalyst_3560x-48pf-s -
cisco catalyst_3560x-48t-e -
cisco catalyst_3560x-48t-l -
cisco catalyst_3560x-48t-s -
cisco catalyst_3560x-48u-e -
cisco catalyst_3560x-48u-l -
cisco catalyst_3560x-48u-s -
cisco catalyst_3750x-12s-e -
cisco catalyst_3750x-12s-s -
cisco catalyst_3750x-24p-e -
cisco catalyst_3750x-24p-l -
cisco catalyst_3750x-24p-s -
cisco catalyst_3750x-24s-e -
cisco catalyst_3750x-24s-s -
cisco catalyst_3750x-24t-e -
cisco catalyst_3750x-24t-l -
cisco catalyst_3750x-24t-s -
cisco catalyst_3750x-24u-e -
cisco catalyst_3750x-24u-l -
cisco catalyst_3750x-24u-s -
cisco catalyst_3750x-48p-e -
cisco catalyst_3750x-48p-l -
cisco catalyst_3750x-48p-s -
cisco catalyst_3750x-48pf-e -
cisco catalyst_3750x-48pf-l -
cisco catalyst_3750x-48pf-s -
cisco catalyst_3750x-48t-e -
cisco catalyst_3750x-48t-l -
cisco catalyst_3750x-48t-s -
cisco catalyst_3750x-48u-e -
cisco catalyst_3750x-48u-l -
cisco catalyst_3750x-48u-s -
cisco catalyst_4500_supervisor_engine_6-e -
cisco catalyst_4500_supervisor_engine_6l-e -
cisco catalyst_4900m -
cisco catalyst_4948e -
cisco catalyst_4948e-f -
cisco embedded_service_2020_24tc_con -
cisco embedded_service_2020_24tc_con_b -
cisco embedded_service_2020_24tc_ncp -
cisco embedded_service_2020_24tc_ncp_b -
cisco embedded_service_2020_con -
cisco embedded_service_2020_con_b -
cisco embedded_service_2020_ncp -
cisco embedded_service_2020_ncp_b -
cisco ie-3010-16s-8pc -
cisco ie-3010-24tc -
cisco ie_2000-16ptc-g -
cisco ie_2000-16t67 -
cisco ie_2000-16t67p -
cisco ie_2000-16tc -
cisco ie_2000-16tc-g -
cisco ie_2000-16tc-g-e -
cisco ie_2000-16tc-g-n -
cisco ie_2000-16tc-g-x -
cisco ie_2000-24t67 -
cisco ie_2000-4s-ts-g -
cisco ie_2000-4t -
cisco ie_2000-4t-g -
cisco ie_2000-4ts -
cisco ie_2000-4ts-g -
cisco ie_2000-8t67 -
cisco ie_2000-8t67p -
cisco ie_2000-8tc -
cisco ie_2000-8tc-g -
cisco ie_2000-8tc-g-e -
cisco ie_2000-8tc-g-n -
cisco ie_3000-4tc -
cisco ie_3000-8tc -
cisco ios_xe 15.2\(2\)e4
cisco ios_xe 15.2\(2a\)ja
cisco catalyst_2960-plus_24lc-l -
cisco catalyst_2960-plus_24lc-s -
cisco catalyst_2960-plus_24pc-l -
cisco catalyst_2960-plus_24pc-s -
cisco catalyst_2960-plus_24tc-l -
cisco catalyst_2960-plus_24tc-s -
cisco catalyst_2960-plus_48pst-l -
cisco catalyst_2960-plus_48pst-s -
cisco catalyst_2960-plus_48tc-l -
cisco catalyst_2960-plus_48tc-s -
cisco catalyst_2960c-12pc-l -
cisco catalyst_2960c-8pc-l -
cisco catalyst_2960c-8tc-l -
cisco catalyst_2960c-8tc-s -
cisco catalyst_2960cg-8tc-l -
cisco catalyst_2960cpd-8pt-l -
cisco catalyst_2960cpd-8tt-l -
cisco catalyst_2960s-24pd-l -
cisco catalyst_2960s-24ps-l -
cisco catalyst_2960s-24td-l -
cisco catalyst_2960s-24ts-l -
cisco catalyst_2960s-24ts-s -
cisco catalyst_2960s-48fpd-l -
cisco catalyst_2960s-48fps-l -
cisco catalyst_2960s-48lpd-l -
cisco catalyst_2960s-48lps-l -
cisco catalyst_2960s-48td-l -
cisco catalyst_2960s-48ts-l -
cisco catalyst_2960s-48ts-s -
cisco catalyst_2960s-f24ps-l -
cisco catalyst_2960s-f24ts-l -
cisco catalyst_2960s-f24ts-s -
cisco catalyst_2960s-f48fps-l -
cisco catalyst_2960s-f48lps-l -
cisco catalyst_2960s-f48ts-l -
cisco catalyst_2960s-f48ts-s -
cisco catalyst_2960x-24pd-l -
cisco catalyst_2960x-24ps-l -
cisco catalyst_2960x-24psq-l_cool -
cisco catalyst_2960x-24td-l -
cisco catalyst_2960x-24ts-l -
cisco catalyst_2960x-24ts-ll -
cisco catalyst_2960x-48fpd-l -
cisco catalyst_2960x-48fps-l -
cisco catalyst_2960x-48lpd-l -
cisco catalyst_2960x-48lps-l -
cisco catalyst_2960x-48td-l -
cisco catalyst_2960x-48ts-l -
cisco catalyst_2960x-48ts-ll -
cisco catalyst_2960xr-24pd-i -
cisco catalyst_2960xr-24ps-i -
cisco catalyst_2960xr-24td-i -
cisco catalyst_2960xr-24ts-i -
cisco catalyst_2960xr-48fpd-i -
cisco catalyst_2960xr-48fps-i -
cisco catalyst_2960xr-48lpd-i -
cisco catalyst_2960xr-48lps-i -
cisco catalyst_2960xr-48td-i -
cisco catalyst_2960xr-48ts-i -
cisco catalyst_3560c-12pc-s -
cisco catalyst_3560c-8pc-s -
cisco catalyst_3560cg-8pc-s -
cisco catalyst_3560cg-8tc-s -
cisco catalyst_3560cpd-8pt-s -
cisco catalyst_3560x-24p-e -
cisco catalyst_3560x-24p-l -
cisco catalyst_3560x-24p-s -
cisco catalyst_3560x-24t-e -
cisco catalyst_3560x-24t-l -
cisco catalyst_3560x-24t-s -
cisco catalyst_3560x-24u-e -
cisco catalyst_3560x-24u-l -
cisco catalyst_3560x-24u-s -
cisco catalyst_3560x-48p-e -
cisco catalyst_3560x-48p-l -
cisco catalyst_3560x-48p-s -
cisco catalyst_3560x-48pf-e -
cisco catalyst_3560x-48pf-l -
cisco catalyst_3560x-48pf-s -
cisco catalyst_3560x-48t-e -
cisco catalyst_3560x-48t-l -
cisco catalyst_3560x-48t-s -
cisco catalyst_3560x-48u-e -
cisco catalyst_3560x-48u-l -
cisco catalyst_3560x-48u-s -
cisco catalyst_3750x-12s-e -
cisco catalyst_3750x-12s-s -
cisco catalyst_3750x-24p-e -
cisco catalyst_3750x-24p-l -
cisco catalyst_3750x-24p-s -
cisco catalyst_3750x-24s-e -
cisco catalyst_3750x-24s-s -
cisco catalyst_3750x-24t-e -
cisco catalyst_3750x-24t-l -
cisco catalyst_3750x-24t-s -
cisco catalyst_3750x-24u-e -
cisco catalyst_3750x-24u-l -
cisco catalyst_3750x-24u-s -
cisco catalyst_3750x-48p-e -
cisco catalyst_3750x-48p-l -
cisco catalyst_3750x-48p-s -
cisco catalyst_3750x-48pf-e -
cisco catalyst_3750x-48pf-l -
cisco catalyst_3750x-48pf-s -
cisco catalyst_3750x-48t-e -
cisco catalyst_3750x-48t-l -
cisco catalyst_3750x-48t-s -
cisco catalyst_3750x-48u-e -
cisco catalyst_3750x-48u-l -
cisco catalyst_3750x-48u-s -
cisco catalyst_4500_supervisor_engine_6-e -
cisco catalyst_4500_supervisor_engine_6l-e -
cisco catalyst_4900m -
cisco catalyst_4948e -
cisco catalyst_4948e-f -
cisco embedded_service_2020_24tc_con -
cisco embedded_service_2020_24tc_con_b -
cisco embedded_service_2020_24tc_ncp -
cisco embedded_service_2020_24tc_ncp_b -
cisco embedded_service_2020_con -
cisco embedded_service_2020_con_b -
cisco embedded_service_2020_ncp -
cisco embedded_service_2020_ncp_b -
cisco ie-3010-16s-8pc -
cisco ie-3010-24tc -
cisco ie_2000-16ptc-g -
cisco ie_2000-16t67 -
cisco ie_2000-16t67p -
cisco ie_2000-16tc -
cisco ie_2000-16tc-g -
cisco ie_2000-16tc-g-e -
cisco ie_2000-16tc-g-n -
cisco ie_2000-16tc-g-x -
cisco ie_2000-24t67 -
cisco ie_2000-4s-ts-g -
cisco ie_2000-4t -
cisco ie_2000-4t-g -
cisco ie_2000-4ts -
cisco ie_2000-4ts-g -
cisco ie_2000-8t67 -
cisco ie_2000-8t67p -
cisco ie_2000-8tc -
cisco ie_2000-8tc-g -
cisco ie_2000-8tc-g-e -
cisco ie_2000-8tc-g-n -
cisco ie_3000-4tc -
cisco ie_3000-8tc -



{
  "cisaActionDue": "2022-03-17",
  "cisaExploitAdd": "2022-03-03",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software Smart Install Denial-of-Service Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)ja:*:*:*:*:*:*:*",
              "matchCriteriaId": "6656C57C-E7F2-49AD-9B54-D16C68DF73C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "890B8C3F-2E83-4D8C-BF9B-34B50E228822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE86BD73-E951-44EB-A056-6D7E015B9088",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC12299-2A7B-493C-9585-560E9A110D15",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "190D6DC2-D8C6-4183-B95D-28CDEC1612FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1421F9C5-4A7C-476F-91FF-8108718B6E66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8ACDC1F-60E7-4CA7-B242-25D3F975BECF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED6EA2F-3479-4145-82CF-B65FF24D8F36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5720E0D-2B0E-4C44-AE80-9DBE88F57A93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "948A3F12-1761-4309-BC97-41F5068AA082",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F8FB3BE-77D7-44C7-B41A-4CB4A8766856",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA3F2B4A-5488-4AF1-A67F-BC137312ED93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D0055E-6FC5-42C2-BD7C-C13C54060A35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EDAEA8-7FAA-4D59-A5B9-62B260E5616D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EECCA51-9F60-4FAC-9291-57411441B090",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "261D5183-1A3C-41ED-B196-BB0992FC5BF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F114380-0BB6-414C-9854-77DCEBB6C9BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C5B9D3-BF37-4146-A12E-193EA90C9BE6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4845C2-9710-4CE8-81C3-D81037B7E66B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "379B1CA9-E800-41BD-B50B-5A4A6924E70F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C95186-A63C-40F6-8FAF-F7907BF04907",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F490DCE9-400E-4079-8409-71A17A2F50CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7C5852-9BF9-47E5-A524-CC13894DF470",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CADA2DD-29BD-499E-9E25-C514ABD1AADC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B25DAE-4E68-404B-9E31-6EAE7C3DC105",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E83F7F5E-FDDD-4B8F-9814-149B076ABBE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92FB9DEA-7A55-411D-9702-CCD8FDB0C35D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CCFC05-FE79-4804-AEED-00975FA49EE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83DF239-FEFB-4573-8E41-498A5FC5EB16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "333FA8D5-CEA5-4380-9D7C-1D72B4C98464",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E1CECF-0621-4004-9F6D-A2690BD18273",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D867770-2404-4F51-B120-F170927F65BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1EAFFF-E36A-4BED-99BD-CB16977AF312",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBD36856-FCCB-4FBA-8728-A628CC4F5F2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "134A9D8A-F8AC-4ACF-B558-91A4BF850425",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E344D5-195B-4995-8616-A212A9AE1DBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A94A128-3DDD-44FD-A8DC-1ECBCC38C657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C639B610-F43A-443D-B956-11BE7D34F41D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A74304E-855E-48DF-B8B1-4AB17C772115",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B4D477B-5EB7-4841-90DD-510DD655E288",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63BA8D6-5139-4033-AF52-03E7515A0050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "721A029A-D747-42D9-B91E-A57D91182AC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76E9961-7799-4B86-A05E-9BAD9F5E1BC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB035A6-64B4-4612-9CF6-2DB5EB85DF13",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3088538-99F0-48EE-95EB-608AAAC4D5C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CF3C12-93A6-4539-B3B7-C45B30FC39A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7622A057-11DD-4BCC-BB3C-E97C5C86C21A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3568327-3C97-4F60-B8CD-BD46A4297D29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14E6769-44B6-4258-A8CF-8CDB0FA72F65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0936B75B-CE98-4D30-8B95-D16569D7CAB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17A2728-7627-4550-80D3-4EC228606A7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6540A964-656D-48E2-B7D3-3F4D4B38A785",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05BA9762-0C59-4841-820C-4D30EB30E04F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB4DCCA-EEF2-4999-A977-89046D934292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0859DCB-7572-4E78-A166-766FEF0BDFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "072B2446-904F-4614-B4A6-68396644B9AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E537A35E-F4C1-4A7D-AACF-E80D4E2B3305",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DD7944-66A9-4611-85DE-5F42848ACDB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "944895AA-9E92-45B7-8A31-AA148AF9346B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAEBB446-A86D-4C06-8054-B6C1C0ED7776",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6551B6-85FB-4945-84CA-0E421FE53C3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E27272-07F1-4424-A8B9-5FDAD67DB68A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC60521F-DC3F-46F9-BBC9-4C108D17E7F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F799EEF-3F87-456D-9152-7D44C08D8938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD11F079-2F52-4611-B75E-33B2738501E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43534D4E-3115-4128-8214-06A52273B69A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "539BBD1B-3E1E-4CB1-B016-F20C25C46B9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4947A20-7C21-4071-843B-EB87A77A8DC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4884D54A-E24C-4382-825C-958FBD56C060",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2A6324C-5812-44E9-AC97-0511349E27B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C504F-0C75-428A-8F67-863F3AD31368",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E209DEC3-9A4E-40CF-B19C-B71FF76D29E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3595C29-C1B0-49D5-AF3A-52DACDD3C725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72C5777-7D8D-41E7-BE3A-4DC516BD050B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7FA3259-48DD-41BD-957D-4A98AE99754E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF8023F-C8D7-4B98-9472-6EC365A19D48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B137CB-C12C-47AF-9AF5-05C1B2086351",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A39CB5-8F97-4030-B9CD-D28BF5C811F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "472D57ED-EF56-4429-9341-BEC711215ED3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948e-f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A405EFE7-7E96-47F1-A97D-E27923B8D98C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC6B538-A151-4C6F-AB66-2592335C9412",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBF6124-87FE-4062-9774-3D7B314852FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "172A45CB-9976-4743-B342-460BDF1237E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D354D47-434F-48DB-9415-4B6B650485BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "573BD04B-6601-4F8A-BA6E-3B5769002B6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "230828B3-36C5-4183-824F-A0D2C8811AF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0961D3-060C-415F-8721-6035BD813EC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-3010-16s-8pc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFE137A-B652-4873-803F-44EF535D8E4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-3010-24tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADAF91A-1D6B-4BD1-816B-4F10B67837AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16ptc-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3C54BC-F0C3-4CD5-A828-950F1E537764",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16t67:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB95A76-4C4B-4B31-9B95-073315EA1661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16t67p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7574BA-5131-4ADA-80BB-A684C7857592",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0697A184-5E5D-4E55-88CE-BDBED39778AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA858B6-806D-4F75-8035-A6D85214A820",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3995F5C-6BE8-482E-927A-C4236EF56923",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52F5B73-81F0-468E-A063-A800D810DD19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FEA8EC5-E06E-40E5-9214-1F4740566260",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-24t67:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB945A1-8A7D-4CF8-BCD1-2D337AE5677C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4s-ts-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB251F55-3D7B-43D2-BE92-FDBD69A901D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0EAB6F-34A3-4C45-805C-D78FD2EA1D57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4t-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C158ED3F-3B4A-4A31-9095-C0BDD0DB157E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6732AE6D-4C6D-4EE5-B75A-69EB00C05DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4ts-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EDC4022-27F1-4A76-8216-88B8F06DAB36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8t67:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F068C426-6566-451A-AEF0-D6EDE4ACD883",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8t67p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC6AD5E-F50F-4390-8AC7-20AE626EA83B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB5C278-0255-4D46-A2AE-692164EB31C0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B0B225B-2517-4464-9E96-7A3D6CF9D502",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9EDB59-4D01-4A94-9096-21E77F8A4118",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F24E44C-7982-4706-90CA-1BE7EECCD6A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_3000-4tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FBFFB8-086A-46FA-B4FE-7431D3D311FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_3000-8tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B745F11-2A23-4C7D-978E-322C147B16CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:15.2\\(2\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0EDB54B-24F6-4E1B-9D68-904E3FCE3622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:15.2\\(2a\\)ja:*:*:*:*:*:*:*",
              "matchCriteriaId": "7514CD44-1542-48B4-94A7-366C5020E43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "890B8C3F-2E83-4D8C-BF9B-34B50E228822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE86BD73-E951-44EB-A056-6D7E015B9088",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC12299-2A7B-493C-9585-560E9A110D15",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "190D6DC2-D8C6-4183-B95D-28CDEC1612FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1421F9C5-4A7C-476F-91FF-8108718B6E66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8ACDC1F-60E7-4CA7-B242-25D3F975BECF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED6EA2F-3479-4145-82CF-B65FF24D8F36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5720E0D-2B0E-4C44-AE80-9DBE88F57A93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "948A3F12-1761-4309-BC97-41F5068AA082",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F8FB3BE-77D7-44C7-B41A-4CB4A8766856",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA3F2B4A-5488-4AF1-A67F-BC137312ED93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D0055E-6FC5-42C2-BD7C-C13C54060A35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EDAEA8-7FAA-4D59-A5B9-62B260E5616D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EECCA51-9F60-4FAC-9291-57411441B090",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "261D5183-1A3C-41ED-B196-BB0992FC5BF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F114380-0BB6-414C-9854-77DCEBB6C9BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C5B9D3-BF37-4146-A12E-193EA90C9BE6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4845C2-9710-4CE8-81C3-D81037B7E66B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "379B1CA9-E800-41BD-B50B-5A4A6924E70F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C95186-A63C-40F6-8FAF-F7907BF04907",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F490DCE9-400E-4079-8409-71A17A2F50CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7C5852-9BF9-47E5-A524-CC13894DF470",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CADA2DD-29BD-499E-9E25-C514ABD1AADC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B25DAE-4E68-404B-9E31-6EAE7C3DC105",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E83F7F5E-FDDD-4B8F-9814-149B076ABBE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92FB9DEA-7A55-411D-9702-CCD8FDB0C35D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CCFC05-FE79-4804-AEED-00975FA49EE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83DF239-FEFB-4573-8E41-498A5FC5EB16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "333FA8D5-CEA5-4380-9D7C-1D72B4C98464",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E1CECF-0621-4004-9F6D-A2690BD18273",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D867770-2404-4F51-B120-F170927F65BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1EAFFF-E36A-4BED-99BD-CB16977AF312",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBD36856-FCCB-4FBA-8728-A628CC4F5F2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "134A9D8A-F8AC-4ACF-B558-91A4BF850425",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E344D5-195B-4995-8616-A212A9AE1DBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A94A128-3DDD-44FD-A8DC-1ECBCC38C657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C639B610-F43A-443D-B956-11BE7D34F41D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A74304E-855E-48DF-B8B1-4AB17C772115",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B4D477B-5EB7-4841-90DD-510DD655E288",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63BA8D6-5139-4033-AF52-03E7515A0050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "721A029A-D747-42D9-B91E-A57D91182AC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76E9961-7799-4B86-A05E-9BAD9F5E1BC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB035A6-64B4-4612-9CF6-2DB5EB85DF13",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3088538-99F0-48EE-95EB-608AAAC4D5C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CF3C12-93A6-4539-B3B7-C45B30FC39A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7622A057-11DD-4BCC-BB3C-E97C5C86C21A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3568327-3C97-4F60-B8CD-BD46A4297D29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14E6769-44B6-4258-A8CF-8CDB0FA72F65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0936B75B-CE98-4D30-8B95-D16569D7CAB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17A2728-7627-4550-80D3-4EC228606A7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6540A964-656D-48E2-B7D3-3F4D4B38A785",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05BA9762-0C59-4841-820C-4D30EB30E04F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB4DCCA-EEF2-4999-A977-89046D934292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0859DCB-7572-4E78-A166-766FEF0BDFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "072B2446-904F-4614-B4A6-68396644B9AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E537A35E-F4C1-4A7D-AACF-E80D4E2B3305",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DD7944-66A9-4611-85DE-5F42848ACDB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "944895AA-9E92-45B7-8A31-AA148AF9346B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAEBB446-A86D-4C06-8054-B6C1C0ED7776",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6551B6-85FB-4945-84CA-0E421FE53C3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E27272-07F1-4424-A8B9-5FDAD67DB68A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC60521F-DC3F-46F9-BBC9-4C108D17E7F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F799EEF-3F87-456D-9152-7D44C08D8938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD11F079-2F52-4611-B75E-33B2738501E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43534D4E-3115-4128-8214-06A52273B69A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "539BBD1B-3E1E-4CB1-B016-F20C25C46B9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4947A20-7C21-4071-843B-EB87A77A8DC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4884D54A-E24C-4382-825C-958FBD56C060",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2A6324C-5812-44E9-AC97-0511349E27B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C504F-0C75-428A-8F67-863F3AD31368",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E209DEC3-9A4E-40CF-B19C-B71FF76D29E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3595C29-C1B0-49D5-AF3A-52DACDD3C725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72C5777-7D8D-41E7-BE3A-4DC516BD050B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7FA3259-48DD-41BD-957D-4A98AE99754E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF8023F-C8D7-4B98-9472-6EC365A19D48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B137CB-C12C-47AF-9AF5-05C1B2086351",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A39CB5-8F97-4030-B9CD-D28BF5C811F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "472D57ED-EF56-4429-9341-BEC711215ED3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948e-f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A405EFE7-7E96-47F1-A97D-E27923B8D98C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC6B538-A151-4C6F-AB66-2592335C9412",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBF6124-87FE-4062-9774-3D7B314852FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "172A45CB-9976-4743-B342-460BDF1237E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D354D47-434F-48DB-9415-4B6B650485BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "573BD04B-6601-4F8A-BA6E-3B5769002B6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "230828B3-36C5-4183-824F-A0D2C8811AF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0961D3-060C-415F-8721-6035BD813EC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-3010-16s-8pc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFE137A-B652-4873-803F-44EF535D8E4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-3010-24tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ADAF91A-1D6B-4BD1-816B-4F10B67837AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16ptc-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E3C54BC-F0C3-4CD5-A828-950F1E537764",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16t67:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEB95A76-4C4B-4B31-9B95-073315EA1661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16t67p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7574BA-5131-4ADA-80BB-A684C7857592",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0697A184-5E5D-4E55-88CE-BDBED39778AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EA858B6-806D-4F75-8035-A6D85214A820",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3995F5C-6BE8-482E-927A-C4236EF56923",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A52F5B73-81F0-468E-A063-A800D810DD19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FEA8EC5-E06E-40E5-9214-1F4740566260",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-24t67:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB945A1-8A7D-4CF8-BCD1-2D337AE5677C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4s-ts-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB251F55-3D7B-43D2-BE92-FDBD69A901D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0EAB6F-34A3-4C45-805C-D78FD2EA1D57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4t-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C158ED3F-3B4A-4A31-9095-C0BDD0DB157E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6732AE6D-4C6D-4EE5-B75A-69EB00C05DFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4ts-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EDC4022-27F1-4A76-8216-88B8F06DAB36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8t67:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F068C426-6566-451A-AEF0-D6EDE4ACD883",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8t67p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC6AD5E-F50F-4390-8AC7-20AE626EA83B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB5C278-0255-4D46-A2AE-692164EB31C0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B0B225B-2517-4464-9E96-7A3D6CF9D502",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B9EDB59-4D01-4A94-9096-21E77F8A4118",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F24E44C-7982-4706-90CA-1BE7EECCD6A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_3000-4tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FBFFB8-086A-46FA-B4FE-7431D3D311FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_3000-8tc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B745F11-2A23-4C7D-978E-322C147B16CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la caracter\u00edstica Smart Install de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado provoque el reinicio de un dispositivo afectado. Esto resultar\u00eda en una denegaci\u00f3n de servicio. Esta vulnerabilidad se debe a la validaci\u00f3n incorrecta de datos de paquetes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un paquete manipulado a un dispositivo afectado en TCP puerto 4786. Esto solo afecta a switches clientes de Smart Install. Los dispositivos Cisco que est\u00e1n configurados como un director Smart Install no se ven afectados por esta vulnerabilidad. Cisco Bug IDs: CSCvd40673."
    }
  ],
  "id": "CVE-2018-0156",
  "lastModified": "2025-01-27T20:10:26.267",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-28T22:29:00.467",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103569"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1040596"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103569"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1040596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-05-07 18:15
Modified
2025-08-04 18:51
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
Impacted products
Vendor Product Version
cisco ios 15.0\(1\)ex
cisco ios 15.0\(1\)ey
cisco ios 15.0\(1\)ey1
cisco ios 15.0\(1\)ey2
cisco ios 15.0\(1\)xo
cisco ios 15.0\(1\)xo1
cisco ios 15.0\(2\)ex
cisco ios 15.0\(2\)ex1
cisco ios 15.0\(2\)ex2
cisco ios 15.0\(2\)ex3
cisco ios 15.0\(2\)ex4
cisco ios 15.0\(2\)ex5
cisco ios 15.0\(2\)ex8
cisco ios 15.0\(2\)ex10
cisco ios 15.0\(2\)ex11
cisco ios 15.0\(2\)ex12
cisco ios 15.0\(2\)ex13
cisco ios 15.0\(2\)se8
cisco ios 15.0\(2\)sqd
cisco ios 15.0\(2\)sqd1
cisco ios 15.0\(2\)sqd2
cisco ios 15.0\(2\)sqd3
cisco ios 15.0\(2\)sqd4
cisco ios 15.0\(2\)sqd5
cisco ios 15.0\(2\)sqd6
cisco ios 15.0\(2\)sqd7
cisco ios 15.0\(2\)sqd8
cisco ios 15.0\(2\)xo
cisco ios 15.0\(2a\)ex5
cisco ios 15.2\(2\)e
cisco ios 15.2\(2\)e1
cisco ios 15.2\(2\)e2
cisco ios 15.2\(2\)e3
cisco ios 15.2\(2\)e4
cisco ios 15.2\(2\)e5
cisco ios 15.2\(2\)e5a
cisco ios 15.2\(2\)e5b
cisco ios 15.2\(2\)e6
cisco ios 15.2\(2\)e7
cisco ios 15.2\(2\)e8
cisco ios 15.2\(2\)e9
cisco ios 15.2\(2\)e10
cisco ios 15.2\(2a\)e1
cisco ios 15.2\(2a\)e2
cisco ios 15.2\(3\)e
cisco ios 15.2\(3\)e1
cisco ios 15.2\(3\)e2
cisco ios 15.2\(3\)e3
cisco ios 15.2\(3\)e4
cisco ios 15.2\(3a\)e
cisco ios 15.2\(4\)e
cisco ios 15.2\(4\)e1
cisco ios 15.2\(4\)e2
cisco ios 15.2\(4\)e3
cisco ios 15.2\(4\)e4
cisco ios 15.2\(4\)e5
cisco ios 15.2\(4\)e6
cisco ios 15.2\(4\)e7
cisco ios 15.2\(4\)e8
cisco ios 15.2\(4\)e9
cisco ios 15.2\(4\)e10
cisco ios 15.2\(4\)e10a
cisco ios 15.2\(4\)e10d
cisco ios 15.2\(4\)ea7
cisco ios 15.2\(4\)ea8
cisco ios 15.2\(4\)ea9
cisco ios 15.2\(4\)ea9a
cisco ios 15.2\(5\)e
cisco ios 15.2\(5\)e1
cisco ios 15.2\(5\)e2
cisco ios 15.2\(5b\)e
cisco ios 15.2\(6\)e
cisco ios 15.2\(6\)e0a
cisco ios 15.2\(6\)e0c
cisco ios 15.2\(6\)e1
cisco ios 15.2\(6\)e2
cisco ios 15.2\(6\)e2a
cisco ios 15.2\(6\)e2b
cisco ios 15.2\(6\)e3
cisco ios 15.2\(6\)eb
cisco ios 15.2\(7\)e
cisco ios 15.2\(7\)e0a
cisco ios 15.2\(7\)e0b
cisco ios 15.2\(7\)e0s
cisco ios 15.2\(7\)e1
cisco ios 15.2\(7\)e1a
cisco ios 15.2\(7\)e2
cisco ios 15.2\(7\)e2a
cisco ios 15.2\(7\)e3
cisco ios 15.2\(7\)e3k
cisco ios 15.2\(7\)e4
cisco ios 15.2\(7\)e5
cisco ios 15.2\(7\)e6
cisco ios 15.2\(7\)e7
cisco ios 15.2\(7\)e8
cisco ios 15.2\(7\)e9
cisco ios 15.2\(7\)e10
cisco ios 15.2\(7a\)e0b
cisco ios 15.2\(7b\)e0b
cisco ios 15.2\(8\)e
cisco ios 15.2\(8\)e1
cisco ios 15.2\(8\)e2
cisco ios 15.2\(8\)e3
cisco ios 15.2\(8\)e4
cisco ios 15.2\(8\)e5
cisco ios 15.2\(8\)e6
cisco catalyst_2960cx-8pc-l -
cisco catalyst_2960cx-8tc-l -
cisco catalyst_2960x-24pd-l -
cisco catalyst_2960x-24ps-l -
cisco catalyst_2960x-24psq-l -
cisco catalyst_2960x-24psq-l_cool -
cisco catalyst_2960x-24td-l -
cisco catalyst_2960x-24ts-l -
cisco catalyst_2960x-24ts-ll -
cisco catalyst_2960x-48fpd-l -
cisco catalyst_2960x-48fps-l -
cisco catalyst_2960x-48lpd-l -
cisco catalyst_2960x-48lps-l -
cisco catalyst_2960x-48td-l -
cisco catalyst_2960x-48ts-l -
cisco catalyst_2960x-48ts-ll -
cisco catalyst_2960xr-24pd-i -
cisco catalyst_2960xr-24pd-l -
cisco catalyst_2960xr-24ps-i -
cisco catalyst_2960xr-24ps-l -
cisco catalyst_2960xr-24td-i -
cisco catalyst_2960xr-24td-l -
cisco catalyst_2960xr-24ts-i -
cisco catalyst_2960xr-24ts-l -
cisco catalyst_2960xr-48fpd-i -
cisco catalyst_2960xr-48fpd-l -
cisco catalyst_2960xr-48fps-i -
cisco catalyst_2960xr-48fps-l -
cisco catalyst_2960xr-48lpd-i -
cisco catalyst_2960xr-48lpd-l -
cisco catalyst_2960xr-48lps-i -
cisco catalyst_2960xr-48lps-l -
cisco catalyst_2960xr-48td-i -
cisco catalyst_2960xr-48td-l -
cisco catalyst_2960xr-48ts-i -
cisco catalyst_2960xr-48ts-l -
cisco catalyst_3560cx-12pc-s -
cisco catalyst_3560cx-12pd-s -
cisco catalyst_3560cx-12tc-s -
cisco catalyst_3560cx-8pc-s -
cisco catalyst_3560cx-8pt-s -
cisco catalyst_3560cx-8tc-s -
cisco catalyst_3560cx-8xpd-s -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "189B0C7C-D794-43EB-A6C6-F29C4B9623A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
              "matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
              "matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
              "matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
              "matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
              "matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D00EB0E-92D3-4C5B-B107-730B47BD6E01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7F6A52-9AA9-4441-A137-7EE3470C155C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
              "matchCriteriaId": "92CEEA13-0B40-4203-8BAE-09374C9B1FE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
              "matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
              "matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
              "matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
              "matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2842F6-4CD5-457C-AC75-241A5AB9534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB8C3BBA-4829-4006-B7EB-F552D86922C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F396D6-9B6E-4E6A-B561-9822DB13C7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D3AE0C5-D071-44B4-B820-422296FDC259",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el software Cisco IOS para los switches Cisco Catalyst de las series 2960X, 2960XR, 2960CX y 3560CX podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15, o uno no autenticado con acceso f\u00edsico al dispositivo, ejecute c\u00f3digo persistente durante el arranque y rompa la cadena de confianza. Esta vulnerabilidad se debe a la falta de verificaci\u00f3n de firmas para archivos espec\u00edficos que pueden cargarse durante el arranque del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad colocando un archivo manipulado en una ubicaci\u00f3n espec\u00edfica del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario durante el arranque. Dado que esto permite al atacante eludir una importante funci\u00f3n de seguridad del dispositivo, Cisco ha elevado la calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso de media a alta."
    }
  ],
  "id": "CVE-2025-20181",
  "lastModified": "2025-08-04T18:51:54.673",
  "metrics": {
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-07T18:15:37.973",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-347"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}