Vulnerabilites related to cisco - catalyst_2960x-24psq-l_cool
CVE-2018-0156 (GCVE-0-2018-0156)
Vulnerability from cvelistv5
Published
2018-03-28 22:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Cisco IOS and IOS XE |
Version: Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:14:16.905Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi" }, { "name": "1040596", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040596" }, { "name": "103569", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103569" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2018-0156", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:27:51.944144Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-0156" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:17.925Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-03-03T00:00:00+00:00", "value": "CVE-2018-0156 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2018-03-28T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-19T13:57:01.000Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi" }, { "name": "1040596", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040596" }, { "name": "103569", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103569" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2018-0156", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi" }, { "name": "1040596", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040596" }, { "name": "103569", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103569" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2018-0156", "datePublished": "2018-03-28T22:00:00.000Z", "dateReserved": "2017-11-27T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:17.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-20181 (GCVE-0-2025-20181)
Vulnerability from cvelistv5
Published
2025-05-07 17:35
Modified
2025-05-07 19:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.
This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.
Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | IOS |
Version: 15.0(1)XO1 Version: 15.0(1)XO Version: 15.0(2)XO Version: 15.0(1)EY Version: 15.0(1)EY1 Version: 15.0(1)EY2 Version: 15.0(2)SE8 Version: 15.0(1)EX Version: 15.0(2)EX Version: 15.0(2)EX1 Version: 15.0(2)EX2 Version: 15.0(2)EX3 Version: 15.0(2)EX4 Version: 15.0(2)EX5 Version: 15.0(2)EX8 Version: 15.0(2a)EX5 Version: 15.0(2)EX10 Version: 15.0(2)EX11 Version: 15.0(2)EX13 Version: 15.0(2)EX12 Version: 15.2(2)E Version: 15.2(3)E Version: 15.2(2)E1 Version: 15.2(4)E Version: 15.2(3)E1 Version: 15.2(2)E2 Version: 15.2(2a)E1 Version: 15.2(2)E3 Version: 15.2(2a)E2 Version: 15.2(3)E2 Version: 15.2(3a)E Version: 15.2(3)E3 Version: 15.2(4)E1 Version: 15.2(2)E4 Version: 15.2(2)E5 Version: 15.2(4)E2 Version: 15.2(3)E4 Version: 15.2(5)E Version: 15.2(4)E3 Version: 15.2(2)E6 Version: 15.2(5)E1 Version: 15.2(5b)E Version: 15.2(2)E5a Version: 15.2(2)E5b Version: 15.2(4)E4 Version: 15.2(2)E7 Version: 15.2(5)E2 Version: 15.2(6)E Version: 15.2(4)E5 Version: 15.2(2)E8 Version: 15.2(6)E0a Version: 15.2(6)E1 Version: 15.2(6)E0c Version: 15.2(4)E6 Version: 15.2(6)E2 Version: 15.2(2)E9 Version: 15.2(4)E7 Version: 15.2(7)E Version: 15.2(2)E10 Version: 15.2(4)E8 Version: 15.2(6)E2a Version: 15.2(6)E2b Version: 15.2(7)E1 Version: 15.2(7)E0a Version: 15.2(7)E0b Version: 15.2(7)E0s Version: 15.2(6)E3 Version: 15.2(4)E9 Version: 15.2(7)E2 Version: 15.2(7a)E0b Version: 15.2(4)E10 Version: 15.2(7)E3 Version: 15.2(7)E1a Version: 15.2(7b)E0b Version: 15.2(7)E2a Version: 15.2(4)E10a Version: 15.2(7)E4 Version: 15.2(7)E3k Version: 15.2(8)E Version: 15.2(8)E1 Version: 15.2(7)E5 Version: 15.2(7)E6 Version: 15.2(8)E2 Version: 15.2(4)E10d Version: 15.2(7)E7 Version: 15.2(8)E3 Version: 15.2(7)E8 Version: 15.2(8)E4 Version: 15.2(7)E9 Version: 15.2(8)E5 Version: 15.2(8)E6 Version: 15.2(7)E10 Version: 15.2(6)EB Version: 15.2(4)EA7 Version: 15.2(4)EA8 Version: 15.2(4)EA9 Version: 15.2(4)EA9a Version: 15.0(2)SQD Version: 15.0(2)SQD1 Version: 15.0(2)SQD2 Version: 15.0(2)SQD3 Version: 15.0(2)SQD4 Version: 15.0(2)SQD5 Version: 15.0(2)SQD6 Version: 15.0(2)SQD7 Version: 15.0(2)SQD8 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-20181", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-07T18:56:17.739877Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-07T19:45:02.742Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "15.0(1)XO1" }, { "status": "affected", "version": "15.0(1)XO" }, { "status": "affected", "version": "15.0(2)XO" }, { "status": "affected", "version": "15.0(1)EY" }, { "status": "affected", "version": "15.0(1)EY1" }, { "status": "affected", "version": "15.0(1)EY2" }, { "status": "affected", "version": "15.0(2)SE8" }, { "status": "affected", "version": "15.0(1)EX" }, { "status": "affected", "version": "15.0(2)EX" }, { "status": "affected", "version": "15.0(2)EX1" }, { "status": "affected", "version": "15.0(2)EX2" }, { "status": "affected", "version": "15.0(2)EX3" }, { "status": "affected", "version": "15.0(2)EX4" }, { "status": "affected", "version": "15.0(2)EX5" }, { "status": "affected", "version": "15.0(2)EX8" }, { "status": "affected", "version": "15.0(2a)EX5" }, { "status": "affected", "version": "15.0(2)EX10" }, { "status": "affected", "version": "15.0(2)EX11" }, { "status": "affected", "version": "15.0(2)EX13" }, { "status": "affected", "version": "15.0(2)EX12" }, { "status": "affected", "version": "15.2(2)E" }, { "status": "affected", "version": "15.2(3)E" }, { "status": "affected", "version": "15.2(2)E1" }, { "status": "affected", "version": "15.2(4)E" }, { "status": "affected", "version": "15.2(3)E1" }, { "status": "affected", "version": "15.2(2)E2" }, { "status": "affected", "version": "15.2(2a)E1" }, { "status": "affected", "version": "15.2(2)E3" }, { "status": "affected", "version": "15.2(2a)E2" }, { "status": "affected", "version": "15.2(3)E2" }, { "status": "affected", "version": "15.2(3a)E" }, { "status": "affected", "version": "15.2(3)E3" }, { "status": "affected", "version": "15.2(4)E1" }, { "status": "affected", "version": "15.2(2)E4" }, { "status": "affected", "version": "15.2(2)E5" }, { "status": "affected", "version": "15.2(4)E2" }, { "status": "affected", "version": "15.2(3)E4" }, { "status": "affected", "version": "15.2(5)E" }, { "status": "affected", "version": "15.2(4)E3" }, { "status": "affected", "version": "15.2(2)E6" }, { "status": "affected", "version": "15.2(5)E1" }, { "status": "affected", "version": "15.2(5b)E" }, { "status": "affected", "version": "15.2(2)E5a" }, { "status": "affected", "version": "15.2(2)E5b" }, { "status": "affected", "version": "15.2(4)E4" }, { "status": "affected", "version": "15.2(2)E7" }, { "status": "affected", "version": "15.2(5)E2" }, { "status": "affected", "version": "15.2(6)E" }, { "status": "affected", "version": "15.2(4)E5" }, { "status": "affected", "version": "15.2(2)E8" }, { "status": "affected", "version": "15.2(6)E0a" }, { "status": "affected", "version": "15.2(6)E1" }, { "status": "affected", "version": "15.2(6)E0c" }, { "status": "affected", "version": "15.2(4)E6" }, { "status": "affected", "version": "15.2(6)E2" }, { "status": "affected", "version": "15.2(2)E9" }, { "status": "affected", "version": "15.2(4)E7" }, { "status": "affected", "version": "15.2(7)E" }, { "status": "affected", "version": "15.2(2)E10" }, { "status": "affected", "version": "15.2(4)E8" }, { "status": "affected", "version": "15.2(6)E2a" }, { "status": "affected", "version": "15.2(6)E2b" }, { "status": "affected", "version": "15.2(7)E1" }, { "status": "affected", "version": "15.2(7)E0a" }, { "status": "affected", "version": "15.2(7)E0b" }, { "status": "affected", "version": "15.2(7)E0s" }, { "status": "affected", "version": "15.2(6)E3" }, { "status": "affected", "version": "15.2(4)E9" }, { "status": "affected", "version": "15.2(7)E2" }, { "status": "affected", "version": "15.2(7a)E0b" }, { "status": "affected", "version": "15.2(4)E10" }, { "status": "affected", "version": "15.2(7)E3" }, { "status": "affected", "version": "15.2(7)E1a" }, { "status": "affected", "version": "15.2(7b)E0b" }, { "status": "affected", "version": "15.2(7)E2a" }, { "status": "affected", "version": "15.2(4)E10a" }, { "status": "affected", "version": "15.2(7)E4" }, { "status": "affected", "version": "15.2(7)E3k" }, { "status": "affected", "version": "15.2(8)E" }, { "status": "affected", "version": "15.2(8)E1" }, { "status": "affected", "version": "15.2(7)E5" }, { "status": "affected", "version": "15.2(7)E6" }, { "status": "affected", "version": "15.2(8)E2" }, { "status": "affected", "version": "15.2(4)E10d" }, { "status": "affected", "version": "15.2(7)E7" }, { "status": "affected", "version": "15.2(8)E3" }, { "status": "affected", "version": "15.2(7)E8" }, { "status": "affected", "version": "15.2(8)E4" }, { "status": "affected", "version": "15.2(7)E9" }, { "status": "affected", "version": "15.2(8)E5" }, { "status": "affected", "version": "15.2(8)E6" }, { "status": "affected", "version": "15.2(7)E10" }, { "status": "affected", "version": "15.2(6)EB" }, { "status": "affected", "version": "15.2(4)EA7" }, { "status": "affected", "version": "15.2(4)EA8" }, { "status": "affected", "version": "15.2(4)EA9" }, { "status": "affected", "version": "15.2(4)EA9a" }, { "status": "affected", "version": "15.0(2)SQD" }, { "status": "affected", "version": "15.0(2)SQD1" }, { "status": "affected", "version": "15.0(2)SQD2" }, { "status": "affected", "version": "15.0(2)SQD3" }, { "status": "affected", "version": "15.0(2)SQD4" }, { "status": "affected", "version": "15.0(2)SQD5" }, { "status": "affected", "version": "15.0(2)SQD6" }, { "status": "affected", "version": "15.0(2)SQD7" }, { "status": "affected", "version": "15.0(2)SQD8" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "cvssV3_0" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "Improper Verification of Cryptographic Signature", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-07T17:35:31.850Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-c2960-3560-sboot-ZtqADrHq", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq" } ], "source": { "advisory": "cisco-sa-c2960-3560-sboot-ZtqADrHq", "defects": [ "CSCvd75918" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2025-20181", "datePublished": "2025-05-07T17:35:31.850Z", "dateReserved": "2024-10-10T19:15:13.225Z", "dateUpdated": "2025-05-07T19:45:02.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-03-28 22:29
Modified
2025-01-27 20:10
Severity ?
Summary
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
References
Impacted products
{ "cisaActionDue": "2022-03-17", "cisaExploitAdd": "2022-03-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software Smart Install Denial-of-Service Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)ja:*:*:*:*:*:*:*", "matchCriteriaId": "6656C57C-E7F2-49AD-9B54-D16C68DF73C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "890B8C3F-2E83-4D8C-BF9B-34B50E228822", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE86BD73-E951-44EB-A056-6D7E015B9088", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC12299-2A7B-493C-9585-560E9A110D15", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "190D6DC2-D8C6-4183-B95D-28CDEC1612FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "1421F9C5-4A7C-476F-91FF-8108718B6E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8ACDC1F-60E7-4CA7-B242-25D3F975BECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FED6EA2F-3479-4145-82CF-B65FF24D8F36", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5720E0D-2B0E-4C44-AE80-9DBE88F57A93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "948A3F12-1761-4309-BC97-41F5068AA082", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F8FB3BE-77D7-44C7-B41A-4CB4A8766856", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA3F2B4A-5488-4AF1-A67F-BC137312ED93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "57D0055E-6FC5-42C2-BD7C-C13C54060A35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "83EDAEA8-7FAA-4D59-A5B9-62B260E5616D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EECCA51-9F60-4FAC-9291-57411441B090", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "261D5183-1A3C-41ED-B196-BB0992FC5BF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F114380-0BB6-414C-9854-77DCEBB6C9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "90C5B9D3-BF37-4146-A12E-193EA90C9BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D4845C2-9710-4CE8-81C3-D81037B7E66B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "379B1CA9-E800-41BD-B50B-5A4A6924E70F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C95186-A63C-40F6-8FAF-F7907BF04907", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F490DCE9-400E-4079-8409-71A17A2F50CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7C5852-9BF9-47E5-A524-CC13894DF470", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CADA2DD-29BD-499E-9E25-C514ABD1AADC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "24B25DAE-4E68-404B-9E31-6EAE7C3DC105", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E83F7F5E-FDDD-4B8F-9814-149B076ABBE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "92FB9DEA-7A55-411D-9702-CCD8FDB0C35D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*", "matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CCFC05-FE79-4804-AEED-00975FA49EE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A83DF239-FEFB-4573-8E41-498A5FC5EB16", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "333FA8D5-CEA5-4380-9D7C-1D72B4C98464", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "87E1CECF-0621-4004-9F6D-A2690BD18273", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D867770-2404-4F51-B120-F170927F65BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE1EAFFF-E36A-4BED-99BD-CB16977AF312", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBD36856-FCCB-4FBA-8728-A628CC4F5F2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "134A9D8A-F8AC-4ACF-B558-91A4BF850425", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "38E344D5-195B-4995-8616-A212A9AE1DBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A94A128-3DDD-44FD-A8DC-1ECBCC38C657", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C639B610-F43A-443D-B956-11BE7D34F41D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A74304E-855E-48DF-B8B1-4AB17C772115", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B4D477B-5EB7-4841-90DD-510DD655E288", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B63BA8D6-5139-4033-AF52-03E7515A0050", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "721A029A-D747-42D9-B91E-A57D91182AC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76E9961-7799-4B86-A05E-9BAD9F5E1BC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBB035A6-64B4-4612-9CF6-2DB5EB85DF13", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3088538-99F0-48EE-95EB-608AAAC4D5C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CF3C12-93A6-4539-B3B7-C45B30FC39A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7622A057-11DD-4BCC-BB3C-E97C5C86C21A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3568327-3C97-4F60-B8CD-BD46A4297D29", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E6769-44B6-4258-A8CF-8CDB0FA72F65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0936B75B-CE98-4D30-8B95-D16569D7CAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F17A2728-7627-4550-80D3-4EC228606A7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6540A964-656D-48E2-B7D3-3F4D4B38A785", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "05BA9762-0C59-4841-820C-4D30EB30E04F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CB4DCCA-EEF2-4999-A977-89046D934292", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0859DCB-7572-4E78-A166-766FEF0BDFD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "072B2446-904F-4614-B4A6-68396644B9AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E537A35E-F4C1-4A7D-AACF-E80D4E2B3305", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2DD7944-66A9-4611-85DE-5F42848ACDB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "944895AA-9E92-45B7-8A31-AA148AF9346B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAEBB446-A86D-4C06-8054-B6C1C0ED7776", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6551B6-85FB-4945-84CA-0E421FE53C3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0E27272-07F1-4424-A8B9-5FDAD67DB68A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC60521F-DC3F-46F9-BBC9-4C108D17E7F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F799EEF-3F87-456D-9152-7D44C08D8938", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD11F079-2F52-4611-B75E-33B2738501E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "43534D4E-3115-4128-8214-06A52273B69A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "539BBD1B-3E1E-4CB1-B016-F20C25C46B9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4947A20-7C21-4071-843B-EB87A77A8DC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4884D54A-E24C-4382-825C-958FBD56C060", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2A6324C-5812-44E9-AC97-0511349E27B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C504F-0C75-428A-8F67-863F3AD31368", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E209DEC3-9A4E-40CF-B19C-B71FF76D29E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3595C29-C1B0-49D5-AF3A-52DACDD3C725", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E72C5777-7D8D-41E7-BE3A-4DC516BD050B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7FA3259-48DD-41BD-957D-4A98AE99754E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF8023F-C8D7-4B98-9472-6EC365A19D48", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "15B137CB-C12C-47AF-9AF5-05C1B2086351", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*", "matchCriteriaId": "21A39CB5-8F97-4030-B9CD-D28BF5C811F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948e:-:*:*:*:*:*:*:*", "matchCriteriaId": "472D57ED-EF56-4429-9341-BEC711215ED3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948e-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A405EFE7-7E96-47F1-A97D-E27923B8D98C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC6B538-A151-4C6F-AB66-2592335C9412", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FBF6124-87FE-4062-9774-3D7B314852FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*", "matchCriteriaId": "172A45CB-9976-4743-B342-460BDF1237E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D354D47-434F-48DB-9415-4B6B650485BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*", "matchCriteriaId": "573BD04B-6601-4F8A-BA6E-3B5769002B6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "230828B3-36C5-4183-824F-A0D2C8811AF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF0961D3-060C-415F-8721-6035BD813EC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-3010-16s-8pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EFE137A-B652-4873-803F-44EF535D8E4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-3010-24tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ADAF91A-1D6B-4BD1-816B-4F10B67837AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16ptc-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3C54BC-F0C3-4CD5-A828-950F1E537764", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16t67:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB95A76-4C4B-4B31-9B95-073315EA1661", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16t67p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7574BA-5131-4ADA-80BB-A684C7857592", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "0697A184-5E5D-4E55-88CE-BDBED39778AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA858B6-806D-4F75-8035-A6D85214A820", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3995F5C-6BE8-482E-927A-C4236EF56923", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-n:-:*:*:*:*:*:*:*", "matchCriteriaId": "A52F5B73-81F0-468E-A063-A800D810DD19", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FEA8EC5-E06E-40E5-9214-1F4740566260", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-24t67:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB945A1-8A7D-4CF8-BCD1-2D337AE5677C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4s-ts-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB251F55-3D7B-43D2-BE92-FDBD69A901D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0EAB6F-34A3-4C45-805C-D78FD2EA1D57", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4t-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C158ED3F-3B4A-4A31-9095-C0BDD0DB157E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "6732AE6D-4C6D-4EE5-B75A-69EB00C05DFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4ts-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC4022-27F1-4A76-8216-88B8F06DAB36", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8t67:-:*:*:*:*:*:*:*", "matchCriteriaId": "F068C426-6566-451A-AEF0-D6EDE4ACD883", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8t67p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC6AD5E-F50F-4390-8AC7-20AE626EA83B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB5C278-0255-4D46-A2AE-692164EB31C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B0B225B-2517-4464-9E96-7A3D6CF9D502", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9EDB59-4D01-4A94-9096-21E77F8A4118", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-n:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F24E44C-7982-4706-90CA-1BE7EECCD6A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_3000-4tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FBFFB8-086A-46FA-B4FE-7431D3D311FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_3000-8tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B745F11-2A23-4C7D-978E-322C147B16CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:15.2\\(2\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "F0EDB54B-24F6-4E1B-9D68-904E3FCE3622", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:15.2\\(2a\\)ja:*:*:*:*:*:*:*", "matchCriteriaId": "7514CD44-1542-48B4-94A7-366C5020E43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "890B8C3F-2E83-4D8C-BF9B-34B50E228822", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE86BD73-E951-44EB-A056-6D7E015B9088", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC12299-2A7B-493C-9585-560E9A110D15", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "190D6DC2-D8C6-4183-B95D-28CDEC1612FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "1421F9C5-4A7C-476F-91FF-8108718B6E66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8ACDC1F-60E7-4CA7-B242-25D3F975BECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "FED6EA2F-3479-4145-82CF-B65FF24D8F36", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5720E0D-2B0E-4C44-AE80-9DBE88F57A93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "948A3F12-1761-4309-BC97-41F5068AA082", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F8FB3BE-77D7-44C7-B41A-4CB4A8766856", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA3F2B4A-5488-4AF1-A67F-BC137312ED93", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "57D0055E-6FC5-42C2-BD7C-C13C54060A35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "83EDAEA8-7FAA-4D59-A5B9-62B260E5616D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EECCA51-9F60-4FAC-9291-57411441B090", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "261D5183-1A3C-41ED-B196-BB0992FC5BF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F114380-0BB6-414C-9854-77DCEBB6C9BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "90C5B9D3-BF37-4146-A12E-193EA90C9BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D4845C2-9710-4CE8-81C3-D81037B7E66B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "379B1CA9-E800-41BD-B50B-5A4A6924E70F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C95186-A63C-40F6-8FAF-F7907BF04907", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F490DCE9-400E-4079-8409-71A17A2F50CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA7C5852-9BF9-47E5-A524-CC13894DF470", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CADA2DD-29BD-499E-9E25-C514ABD1AADC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "24B25DAE-4E68-404B-9E31-6EAE7C3DC105", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E83F7F5E-FDDD-4B8F-9814-149B076ABBE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "92FB9DEA-7A55-411D-9702-CCD8FDB0C35D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*", "matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CCFC05-FE79-4804-AEED-00975FA49EE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A83DF239-FEFB-4573-8E41-498A5FC5EB16", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "333FA8D5-CEA5-4380-9D7C-1D72B4C98464", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "87E1CECF-0621-4004-9F6D-A2690BD18273", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D867770-2404-4F51-B120-F170927F65BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE1EAFFF-E36A-4BED-99BD-CB16977AF312", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBD36856-FCCB-4FBA-8728-A628CC4F5F2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "134A9D8A-F8AC-4ACF-B558-91A4BF850425", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "38E344D5-195B-4995-8616-A212A9AE1DBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A94A128-3DDD-44FD-A8DC-1ECBCC38C657", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C639B610-F43A-443D-B956-11BE7D34F41D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A74304E-855E-48DF-B8B1-4AB17C772115", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B4D477B-5EB7-4841-90DD-510DD655E288", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B63BA8D6-5139-4033-AF52-03E7515A0050", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "721A029A-D747-42D9-B91E-A57D91182AC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76E9961-7799-4B86-A05E-9BAD9F5E1BC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBB035A6-64B4-4612-9CF6-2DB5EB85DF13", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3088538-99F0-48EE-95EB-608AAAC4D5C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CF3C12-93A6-4539-B3B7-C45B30FC39A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7622A057-11DD-4BCC-BB3C-E97C5C86C21A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3568327-3C97-4F60-B8CD-BD46A4297D29", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14E6769-44B6-4258-A8CF-8CDB0FA72F65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0936B75B-CE98-4D30-8B95-D16569D7CAB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F17A2728-7627-4550-80D3-4EC228606A7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6540A964-656D-48E2-B7D3-3F4D4B38A785", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "05BA9762-0C59-4841-820C-4D30EB30E04F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CB4DCCA-EEF2-4999-A977-89046D934292", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0859DCB-7572-4E78-A166-766FEF0BDFD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "072B2446-904F-4614-B4A6-68396644B9AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E537A35E-F4C1-4A7D-AACF-E80D4E2B3305", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2DD7944-66A9-4611-85DE-5F42848ACDB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "944895AA-9E92-45B7-8A31-AA148AF9346B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAEBB446-A86D-4C06-8054-B6C1C0ED7776", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6551B6-85FB-4945-84CA-0E421FE53C3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0E27272-07F1-4424-A8B9-5FDAD67DB68A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC60521F-DC3F-46F9-BBC9-4C108D17E7F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F799EEF-3F87-456D-9152-7D44C08D8938", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD11F079-2F52-4611-B75E-33B2738501E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "43534D4E-3115-4128-8214-06A52273B69A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "539BBD1B-3E1E-4CB1-B016-F20C25C46B9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4947A20-7C21-4071-843B-EB87A77A8DC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4884D54A-E24C-4382-825C-958FBD56C060", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2A6324C-5812-44E9-AC97-0511349E27B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "266C504F-0C75-428A-8F67-863F3AD31368", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E209DEC3-9A4E-40CF-B19C-B71FF76D29E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3595C29-C1B0-49D5-AF3A-52DACDD3C725", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E72C5777-7D8D-41E7-BE3A-4DC516BD050B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7FA3259-48DD-41BD-957D-4A98AE99754E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EF8023F-C8D7-4B98-9472-6EC365A19D48", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "15B137CB-C12C-47AF-9AF5-05C1B2086351", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*", "matchCriteriaId": "21A39CB5-8F97-4030-B9CD-D28BF5C811F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948e:-:*:*:*:*:*:*:*", "matchCriteriaId": "472D57ED-EF56-4429-9341-BEC711215ED3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_4948e-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A405EFE7-7E96-47F1-A97D-E27923B8D98C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC6B538-A151-4C6F-AB66-2592335C9412", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FBF6124-87FE-4062-9774-3D7B314852FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*", "matchCriteriaId": "172A45CB-9976-4743-B342-460BDF1237E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D354D47-434F-48DB-9415-4B6B650485BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*", "matchCriteriaId": "573BD04B-6601-4F8A-BA6E-3B5769002B6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "230828B3-36C5-4183-824F-A0D2C8811AF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF0961D3-060C-415F-8721-6035BD813EC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-3010-16s-8pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EFE137A-B652-4873-803F-44EF535D8E4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie-3010-24tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ADAF91A-1D6B-4BD1-816B-4F10B67837AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16ptc-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3C54BC-F0C3-4CD5-A828-950F1E537764", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16t67:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB95A76-4C4B-4B31-9B95-073315EA1661", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16t67p:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7574BA-5131-4ADA-80BB-A684C7857592", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "0697A184-5E5D-4E55-88CE-BDBED39778AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EA858B6-806D-4F75-8035-A6D85214A820", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3995F5C-6BE8-482E-927A-C4236EF56923", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-n:-:*:*:*:*:*:*:*", "matchCriteriaId": "A52F5B73-81F0-468E-A063-A800D810DD19", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FEA8EC5-E06E-40E5-9214-1F4740566260", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-24t67:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB945A1-8A7D-4CF8-BCD1-2D337AE5677C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4s-ts-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB251F55-3D7B-43D2-BE92-FDBD69A901D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0EAB6F-34A3-4C45-805C-D78FD2EA1D57", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4t-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C158ED3F-3B4A-4A31-9095-C0BDD0DB157E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "6732AE6D-4C6D-4EE5-B75A-69EB00C05DFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-4ts-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EDC4022-27F1-4A76-8216-88B8F06DAB36", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8t67:-:*:*:*:*:*:*:*", "matchCriteriaId": "F068C426-6566-451A-AEF0-D6EDE4ACD883", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8t67p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC6AD5E-F50F-4390-8AC7-20AE626EA83B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB5C278-0255-4D46-A2AE-692164EB31C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B0B225B-2517-4464-9E96-7A3D6CF9D502", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B9EDB59-4D01-4A94-9096-21E77F8A4118", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-n:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F24E44C-7982-4706-90CA-1BE7EECCD6A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_3000-4tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6FBFFB8-086A-46FA-B4FE-7431D3D311FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ie_3000-8tc:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B745F11-2A23-4C7D-978E-322C147B16CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673." }, { "lang": "es", "value": "Una vulnerabilidad en la caracter\u00edstica Smart Install de Cisco IOS Software y Cisco IOS XE Software podr\u00eda permitir que un atacante remoto no autenticado provoque el reinicio de un dispositivo afectado. Esto resultar\u00eda en una denegaci\u00f3n de servicio. Esta vulnerabilidad se debe a la validaci\u00f3n incorrecta de datos de paquetes. Un atacante podr\u00eda explotar esta vulnerabilidad enviando un paquete manipulado a un dispositivo afectado en TCP puerto 4786. Esto solo afecta a switches clientes de Smart Install. Los dispositivos Cisco que est\u00e1n configurados como un director Smart Install no se ven afectados por esta vulnerabilidad. Cisco Bug IDs: CSCvd40673." } ], "id": "CVE-2018-0156", "lastModified": "2025-01-27T20:10:26.267", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-28T22:29:00.467", "references": [ { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103569" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040596" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05" }, { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-05-07 18:15
Modified
2025-08-04 18:51
Severity ?
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.
This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.
Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ex:*:*:*:*:*:*:*", "matchCriteriaId": "189B0C7C-D794-43EB-A6C6-F29C4B9623A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*", "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*", "matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*", "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*", "matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*", "matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*", "matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*", "matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*", "matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*", "matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*", "matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*", "matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*", "matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*", "matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*", "matchCriteriaId": "7D00EB0E-92D3-4C5B-B107-730B47BD6E01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*", "matchCriteriaId": "CF7F6A52-9AA9-4441-A137-7EE3470C155C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*", "matchCriteriaId": "92CEEA13-0B40-4203-8BAE-09374C9B1FE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*", "matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*", "matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*", "matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*", "matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*", "matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*", "matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*", "matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*", "matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*", "matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*", "matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*", "matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*", "matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*", "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*", "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*", "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*", "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*", "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*", "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*", "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*", "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*", "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*", "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*", "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*", "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*", "matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*", "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*", "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*", "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*", "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*", "matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*", "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*", "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*", "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*", "matchCriteriaId": "FB2842F6-4CD5-457C-AC75-241A5AB9534B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*", "matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*", "matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*", "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*", "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*", "matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*", "matchCriteriaId": "AB8C3BBA-4829-4006-B7EB-F552D86922C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*", "matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*", "matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*", "matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*", "matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*", "matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*", "matchCriteriaId": "58F396D6-9B6E-4E6A-B561-9822DB13C7AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*", "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*", "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*", "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*", "matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*", "matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*", "matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*", "matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*", "matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e6:*:*:*:*:*:*:*", "matchCriteriaId": "8D3AE0C5-D071-44B4-B820-422296FDC259", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*", "matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*", "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*", "matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High." }, { "lang": "es", "value": "Una vulnerabilidad en el software Cisco IOS para los switches Cisco Catalyst de las series 2960X, 2960XR, 2960CX y 3560CX podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15, o uno no autenticado con acceso f\u00edsico al dispositivo, ejecute c\u00f3digo persistente durante el arranque y rompa la cadena de confianza. Esta vulnerabilidad se debe a la falta de verificaci\u00f3n de firmas para archivos espec\u00edficos que pueden cargarse durante el arranque del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad colocando un archivo manipulado en una ubicaci\u00f3n espec\u00edfica del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario durante el arranque. Dado que esto permite al atacante eludir una importante funci\u00f3n de seguridad del dispositivo, Cisco ha elevado la calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso de media a alta." } ], "id": "CVE-2025-20181", "lastModified": "2025-08-04T18:51:54.673", "metrics": { "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "psirt@cisco.com", "type": "Secondary" } ] }, "published": "2025-05-07T18:15:37.973", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "psirt@cisco.com", "type": "Primary" } ] }