Vulnerabilites related to cisco - catalyst_3560cx-8pt-s
CVE-2025-20181 (GCVE-0-2025-20181)
Vulnerability from cvelistv5
Published
2025-05-07 17:35
Modified
2025-05-07 19:45
CWE
  • CWE-347 - Improper Verification of Cryptographic Signature
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
Impacted products
Vendor Product Version
Cisco IOS Version: 15.0(1)XO1
Version: 15.0(1)XO
Version: 15.0(2)XO
Version: 15.0(1)EY
Version: 15.0(1)EY1
Version: 15.0(1)EY2
Version: 15.0(2)SE8
Version: 15.0(1)EX
Version: 15.0(2)EX
Version: 15.0(2)EX1
Version: 15.0(2)EX2
Version: 15.0(2)EX3
Version: 15.0(2)EX4
Version: 15.0(2)EX5
Version: 15.0(2)EX8
Version: 15.0(2a)EX5
Version: 15.0(2)EX10
Version: 15.0(2)EX11
Version: 15.0(2)EX13
Version: 15.0(2)EX12
Version: 15.2(2)E
Version: 15.2(3)E
Version: 15.2(2)E1
Version: 15.2(4)E
Version: 15.2(3)E1
Version: 15.2(2)E2
Version: 15.2(2a)E1
Version: 15.2(2)E3
Version: 15.2(2a)E2
Version: 15.2(3)E2
Version: 15.2(3a)E
Version: 15.2(3)E3
Version: 15.2(4)E1
Version: 15.2(2)E4
Version: 15.2(2)E5
Version: 15.2(4)E2
Version: 15.2(3)E4
Version: 15.2(5)E
Version: 15.2(4)E3
Version: 15.2(2)E6
Version: 15.2(5)E1
Version: 15.2(5b)E
Version: 15.2(2)E5a
Version: 15.2(2)E5b
Version: 15.2(4)E4
Version: 15.2(2)E7
Version: 15.2(5)E2
Version: 15.2(6)E
Version: 15.2(4)E5
Version: 15.2(2)E8
Version: 15.2(6)E0a
Version: 15.2(6)E1
Version: 15.2(6)E0c
Version: 15.2(4)E6
Version: 15.2(6)E2
Version: 15.2(2)E9
Version: 15.2(4)E7
Version: 15.2(7)E
Version: 15.2(2)E10
Version: 15.2(4)E8
Version: 15.2(6)E2a
Version: 15.2(6)E2b
Version: 15.2(7)E1
Version: 15.2(7)E0a
Version: 15.2(7)E0b
Version: 15.2(7)E0s
Version: 15.2(6)E3
Version: 15.2(4)E9
Version: 15.2(7)E2
Version: 15.2(7a)E0b
Version: 15.2(4)E10
Version: 15.2(7)E3
Version: 15.2(7)E1a
Version: 15.2(7b)E0b
Version: 15.2(7)E2a
Version: 15.2(4)E10a
Version: 15.2(7)E4
Version: 15.2(7)E3k
Version: 15.2(8)E
Version: 15.2(8)E1
Version: 15.2(7)E5
Version: 15.2(7)E6
Version: 15.2(8)E2
Version: 15.2(4)E10d
Version: 15.2(7)E7
Version: 15.2(8)E3
Version: 15.2(7)E8
Version: 15.2(8)E4
Version: 15.2(7)E9
Version: 15.2(8)E5
Version: 15.2(8)E6
Version: 15.2(7)E10
Version: 15.2(6)EB
Version: 15.2(4)EA7
Version: 15.2(4)EA8
Version: 15.2(4)EA9
Version: 15.2(4)EA9a
Version: 15.0(2)SQD
Version: 15.0(2)SQD1
Version: 15.0(2)SQD2
Version: 15.0(2)SQD3
Version: 15.0(2)SQD4
Version: 15.0(2)SQD5
Version: 15.0(2)SQD6
Version: 15.0(2)SQD7
Version: 15.0(2)SQD8
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-20181",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-07T18:56:17.739877Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-07T19:45:02.742Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "IOS",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "15.0(1)XO1"
            },
            {
              "status": "affected",
              "version": "15.0(1)XO"
            },
            {
              "status": "affected",
              "version": "15.0(2)XO"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY1"
            },
            {
              "status": "affected",
              "version": "15.0(1)EY2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SE8"
            },
            {
              "status": "affected",
              "version": "15.0(1)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX1"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX2"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX3"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX4"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX5"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX8"
            },
            {
              "status": "affected",
              "version": "15.0(2a)EX5"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX10"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX11"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX13"
            },
            {
              "status": "affected",
              "version": "15.0(2)EX12"
            },
            {
              "status": "affected",
              "version": "15.2(2)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E1"
            },
            {
              "status": "affected",
              "version": "15.2(4)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2a)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3a)E"
            },
            {
              "status": "affected",
              "version": "15.2(3)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E1"
            },
            {
              "status": "affected",
              "version": "15.2(2)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5"
            },
            {
              "status": "affected",
              "version": "15.2(4)E2"
            },
            {
              "status": "affected",
              "version": "15.2(3)E4"
            },
            {
              "status": "affected",
              "version": "15.2(5)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E3"
            },
            {
              "status": "affected",
              "version": "15.2(2)E6"
            },
            {
              "status": "affected",
              "version": "15.2(5)E1"
            },
            {
              "status": "affected",
              "version": "15.2(5b)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5a"
            },
            {
              "status": "affected",
              "version": "15.2(2)E5b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E4"
            },
            {
              "status": "affected",
              "version": "15.2(2)E7"
            },
            {
              "status": "affected",
              "version": "15.2(5)E2"
            },
            {
              "status": "affected",
              "version": "15.2(6)E"
            },
            {
              "status": "affected",
              "version": "15.2(4)E5"
            },
            {
              "status": "affected",
              "version": "15.2(2)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E1"
            },
            {
              "status": "affected",
              "version": "15.2(6)E0c"
            },
            {
              "status": "affected",
              "version": "15.2(4)E6"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2"
            },
            {
              "status": "affected",
              "version": "15.2(2)E9"
            },
            {
              "status": "affected",
              "version": "15.2(4)E7"
            },
            {
              "status": "affected",
              "version": "15.2(7)E"
            },
            {
              "status": "affected",
              "version": "15.2(2)E10"
            },
            {
              "status": "affected",
              "version": "15.2(4)E8"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(6)E2b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E0s"
            },
            {
              "status": "affected",
              "version": "15.2(6)E3"
            },
            {
              "status": "affected",
              "version": "15.2(4)E9"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2"
            },
            {
              "status": "affected",
              "version": "15.2(7a)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E1a"
            },
            {
              "status": "affected",
              "version": "15.2(7b)E0b"
            },
            {
              "status": "affected",
              "version": "15.2(7)E2a"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10a"
            },
            {
              "status": "affected",
              "version": "15.2(7)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E3k"
            },
            {
              "status": "affected",
              "version": "15.2(8)E"
            },
            {
              "status": "affected",
              "version": "15.2(8)E1"
            },
            {
              "status": "affected",
              "version": "15.2(7)E5"
            },
            {
              "status": "affected",
              "version": "15.2(7)E6"
            },
            {
              "status": "affected",
              "version": "15.2(8)E2"
            },
            {
              "status": "affected",
              "version": "15.2(4)E10d"
            },
            {
              "status": "affected",
              "version": "15.2(7)E7"
            },
            {
              "status": "affected",
              "version": "15.2(8)E3"
            },
            {
              "status": "affected",
              "version": "15.2(7)E8"
            },
            {
              "status": "affected",
              "version": "15.2(8)E4"
            },
            {
              "status": "affected",
              "version": "15.2(7)E9"
            },
            {
              "status": "affected",
              "version": "15.2(8)E5"
            },
            {
              "status": "affected",
              "version": "15.2(8)E6"
            },
            {
              "status": "affected",
              "version": "15.2(7)E10"
            },
            {
              "status": "affected",
              "version": "15.2(6)EB"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA7"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA8"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9"
            },
            {
              "status": "affected",
              "version": "15.2(4)EA9a"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD1"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD2"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD3"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD4"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD5"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD6"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD7"
            },
            {
              "status": "affected",
              "version": "15.0(2)SQD8"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "cvssV3_0"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-347",
              "description": "Improper Verification of Cryptographic Signature",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-07T17:35:31.850Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
        }
      ],
      "source": {
        "advisory": "cisco-sa-c2960-3560-sboot-ZtqADrHq",
        "defects": [
          "CSCvd75918"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2025-20181",
    "datePublished": "2025-05-07T17:35:31.850Z",
    "dateReserved": "2024-10-10T19:15:13.225Z",
    "dateUpdated": "2025-05-07T19:45:02.742Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-3881 (GCVE-0-2017-3881)
Vulnerability from cvelistv5
Published
2017-03-17 22:00
Modified
2025-07-30 01:46
Severity ?
CWE
  • Remote Code Execution Vulnerability
Summary
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
References
Impacted products
Vendor Product Version
n/a Cisco IOS and IOS XE Software Version: Cisco IOS and IOS XE Software
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:39:41.294Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41872",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41872/"
          },
          {
            "name": "41874",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41874/"
          },
          {
            "name": "97391",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/97391"
          },
          {
            "name": "96960",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/96960"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
          },
          {
            "name": "1038059",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1038059"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2017-3881",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T16:05:33.301931Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-03-25",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-30T01:46:30.293Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "timeline": [
          {
            "lang": "en",
            "time": "2022-03-25T00:00:00+00:00",
            "value": "CVE-2017-3881 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS and IOS XE Software",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco IOS and IOS XE Software"
            }
          ]
        }
      ],
      "datePublic": "2017-03-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Remote Code Execution Vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-15T09:57:01.000Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "41872",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41872/"
        },
        {
          "name": "41874",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41874/"
        },
        {
          "name": "97391",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/97391"
        },
        {
          "name": "96960",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/96960"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
        },
        {
          "name": "1038059",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1038059"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2017-3881",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS and IOS XE Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco IOS and IOS XE Software"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Remote Code Execution Vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "41872",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41872/"
            },
            {
              "name": "41874",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41874/"
            },
            {
              "name": "97391",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/97391"
            },
            {
              "name": "96960",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/96960"
            },
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
            },
            {
              "name": "1038059",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1038059"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2017-3881",
    "datePublished": "2017-03-17T22:00:00.000Z",
    "dateReserved": "2016-12-21T00:00:00.000Z",
    "dateUpdated": "2025-07-30T01:46:30.293Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2025-05-07 18:15
Modified
2025-08-04 18:51
Summary
A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust. This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time. Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
Impacted products
Vendor Product Version
cisco ios 15.0\(1\)ex
cisco ios 15.0\(1\)ey
cisco ios 15.0\(1\)ey1
cisco ios 15.0\(1\)ey2
cisco ios 15.0\(1\)xo
cisco ios 15.0\(1\)xo1
cisco ios 15.0\(2\)ex
cisco ios 15.0\(2\)ex1
cisco ios 15.0\(2\)ex2
cisco ios 15.0\(2\)ex3
cisco ios 15.0\(2\)ex4
cisco ios 15.0\(2\)ex5
cisco ios 15.0\(2\)ex8
cisco ios 15.0\(2\)ex10
cisco ios 15.0\(2\)ex11
cisco ios 15.0\(2\)ex12
cisco ios 15.0\(2\)ex13
cisco ios 15.0\(2\)se8
cisco ios 15.0\(2\)sqd
cisco ios 15.0\(2\)sqd1
cisco ios 15.0\(2\)sqd2
cisco ios 15.0\(2\)sqd3
cisco ios 15.0\(2\)sqd4
cisco ios 15.0\(2\)sqd5
cisco ios 15.0\(2\)sqd6
cisco ios 15.0\(2\)sqd7
cisco ios 15.0\(2\)sqd8
cisco ios 15.0\(2\)xo
cisco ios 15.0\(2a\)ex5
cisco ios 15.2\(2\)e
cisco ios 15.2\(2\)e1
cisco ios 15.2\(2\)e2
cisco ios 15.2\(2\)e3
cisco ios 15.2\(2\)e4
cisco ios 15.2\(2\)e5
cisco ios 15.2\(2\)e5a
cisco ios 15.2\(2\)e5b
cisco ios 15.2\(2\)e6
cisco ios 15.2\(2\)e7
cisco ios 15.2\(2\)e8
cisco ios 15.2\(2\)e9
cisco ios 15.2\(2\)e10
cisco ios 15.2\(2a\)e1
cisco ios 15.2\(2a\)e2
cisco ios 15.2\(3\)e
cisco ios 15.2\(3\)e1
cisco ios 15.2\(3\)e2
cisco ios 15.2\(3\)e3
cisco ios 15.2\(3\)e4
cisco ios 15.2\(3a\)e
cisco ios 15.2\(4\)e
cisco ios 15.2\(4\)e1
cisco ios 15.2\(4\)e2
cisco ios 15.2\(4\)e3
cisco ios 15.2\(4\)e4
cisco ios 15.2\(4\)e5
cisco ios 15.2\(4\)e6
cisco ios 15.2\(4\)e7
cisco ios 15.2\(4\)e8
cisco ios 15.2\(4\)e9
cisco ios 15.2\(4\)e10
cisco ios 15.2\(4\)e10a
cisco ios 15.2\(4\)e10d
cisco ios 15.2\(4\)ea7
cisco ios 15.2\(4\)ea8
cisco ios 15.2\(4\)ea9
cisco ios 15.2\(4\)ea9a
cisco ios 15.2\(5\)e
cisco ios 15.2\(5\)e1
cisco ios 15.2\(5\)e2
cisco ios 15.2\(5b\)e
cisco ios 15.2\(6\)e
cisco ios 15.2\(6\)e0a
cisco ios 15.2\(6\)e0c
cisco ios 15.2\(6\)e1
cisco ios 15.2\(6\)e2
cisco ios 15.2\(6\)e2a
cisco ios 15.2\(6\)e2b
cisco ios 15.2\(6\)e3
cisco ios 15.2\(6\)eb
cisco ios 15.2\(7\)e
cisco ios 15.2\(7\)e0a
cisco ios 15.2\(7\)e0b
cisco ios 15.2\(7\)e0s
cisco ios 15.2\(7\)e1
cisco ios 15.2\(7\)e1a
cisco ios 15.2\(7\)e2
cisco ios 15.2\(7\)e2a
cisco ios 15.2\(7\)e3
cisco ios 15.2\(7\)e3k
cisco ios 15.2\(7\)e4
cisco ios 15.2\(7\)e5
cisco ios 15.2\(7\)e6
cisco ios 15.2\(7\)e7
cisco ios 15.2\(7\)e8
cisco ios 15.2\(7\)e9
cisco ios 15.2\(7\)e10
cisco ios 15.2\(7a\)e0b
cisco ios 15.2\(7b\)e0b
cisco ios 15.2\(8\)e
cisco ios 15.2\(8\)e1
cisco ios 15.2\(8\)e2
cisco ios 15.2\(8\)e3
cisco ios 15.2\(8\)e4
cisco ios 15.2\(8\)e5
cisco ios 15.2\(8\)e6
cisco catalyst_2960cx-8pc-l -
cisco catalyst_2960cx-8tc-l -
cisco catalyst_2960x-24pd-l -
cisco catalyst_2960x-24ps-l -
cisco catalyst_2960x-24psq-l -
cisco catalyst_2960x-24psq-l_cool -
cisco catalyst_2960x-24td-l -
cisco catalyst_2960x-24ts-l -
cisco catalyst_2960x-24ts-ll -
cisco catalyst_2960x-48fpd-l -
cisco catalyst_2960x-48fps-l -
cisco catalyst_2960x-48lpd-l -
cisco catalyst_2960x-48lps-l -
cisco catalyst_2960x-48td-l -
cisco catalyst_2960x-48ts-l -
cisco catalyst_2960x-48ts-ll -
cisco catalyst_2960xr-24pd-i -
cisco catalyst_2960xr-24pd-l -
cisco catalyst_2960xr-24ps-i -
cisco catalyst_2960xr-24ps-l -
cisco catalyst_2960xr-24td-i -
cisco catalyst_2960xr-24td-l -
cisco catalyst_2960xr-24ts-i -
cisco catalyst_2960xr-24ts-l -
cisco catalyst_2960xr-48fpd-i -
cisco catalyst_2960xr-48fpd-l -
cisco catalyst_2960xr-48fps-i -
cisco catalyst_2960xr-48fps-l -
cisco catalyst_2960xr-48lpd-i -
cisco catalyst_2960xr-48lpd-l -
cisco catalyst_2960xr-48lps-i -
cisco catalyst_2960xr-48lps-l -
cisco catalyst_2960xr-48td-i -
cisco catalyst_2960xr-48td-l -
cisco catalyst_2960xr-48ts-i -
cisco catalyst_2960xr-48ts-l -
cisco catalyst_3560cx-12pc-s -
cisco catalyst_3560cx-12pd-s -
cisco catalyst_3560cx-12tc-s -
cisco catalyst_3560cx-8pc-s -
cisco catalyst_3560cx-8pt-s -
cisco catalyst_3560cx-8tc-s -
cisco catalyst_3560cx-8xpd-s -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "189B0C7C-D794-43EB-A6C6-F29C4B9623A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF55C0A-768F-445A-AF40-2B553363AF18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9E7D5CC-521E-4B2A-B6DB-D2A49D31DE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey2:*:*:*:*:*:*:*",
              "matchCriteriaId": "10D75DC6-D7B1-46D2-ABEF-97D908992FF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo:*:*:*:*:*:*:*",
              "matchCriteriaId": "28722F17-AF23-4435-AF9B-996798ACF2C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
              "matchCriteriaId": "587450DF-77E4-4320-9191-383EBE5A6CB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex:*:*:*:*:*:*:*",
              "matchCriteriaId": "C965E814-7ABE-4C45-8EA8-B6818BC213F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4556022D-5B0C-4F7A-868C-9EC01F716D16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7760B1FF-BC56-49F4-8020-439EA2F53AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex3:*:*:*:*:*:*:*",
              "matchCriteriaId": "49229E8B-19ED-4E5E-AA2E-F699C033F4A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A4AC61-4386-4218-91B7-6CE776D8050B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex5:*:*:*:*:*:*:*",
              "matchCriteriaId": "59403A6B-3488-4F81-BE3C-A06AF1731B99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex8:*:*:*:*:*:*:*",
              "matchCriteriaId": "02ABF12A-78BD-459D-BF53-065A56C385AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D15A929-0C2B-4C3D-99E4-0E7D46217216",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D00EB0E-92D3-4C5B-B107-730B47BD6E01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7F6A52-9AA9-4441-A137-7EE3470C155C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex13:*:*:*:*:*:*:*",
              "matchCriteriaId": "92CEEA13-0B40-4203-8BAE-09374C9B1FE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)se8:*:*:*:*:*:*:*",
              "matchCriteriaId": "611A649F-161B-4683-98D5-4C8150838039",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D39E1ED-2F67-4116-9BF5-44CA8EF9A016",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd1:*:*:*:*:*:*:*",
              "matchCriteriaId": "729613AF-4C56-4514-9ECD-6A466C278E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd2:*:*:*:*:*:*:*",
              "matchCriteriaId": "368F2F9E-FD52-4A74-8378-DF246252B745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E452976-8876-40D7-8880-29197DB5457A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE5C762-5329-47E9-8D0C-C0A546AC24CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5CC49C-34B5-4C8A-8FFC-DACB4B0C76FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D93F335-8058-45BA-8653-9F3E4A5FA28E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6FDABA-6F35-4FAA-9ADF-04E4CD1DCF15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF152F35-32C6-4C2A-BC91-90AAE442F239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2\\)xo:*:*:*:*:*:*:*",
              "matchCriteriaId": "42CEA3E9-2320-40D9-8BC0-4CA631ED2C3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.0\\(2a\\)ex5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD47CBD-A833-4CD0-A62C-22FBB7A4244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A156FE-590E-49DB-819D-4103D629829D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1F6C767-042C-4277-90F4-F81D9AFFF227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D33DB919-4F82-43C6-830A-A9D4FC043B42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "72782F95-948D-489B-A19A-9DAB825DFE4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F904CD0-8609-47F7-988C-613DE26BDBB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3A39FE-69F6-4BB9-A9CE-D516A3802538",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B7058-3467-4CCE-B9A4-71CF8143FEC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
              "matchCriteriaId": "90447919-CC40-4CA5-A488-2FCF0F25ABE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEF74559-F418-48EA-9CA7-A9574CAFC97E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A1ADB8-DF62-4CB6-8075-2F0956BB0126",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB0F2B2A-F273-4166-826F-88B54A480BB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "194D54FC-F399-4C86-AE04-FB3FD828DDA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C85E0E-A920-4501-AC23-0F7534CF88EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C846C74-7644-4DAB-A4B8-B33464EBE92E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(2a\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DDB0B25-95E0-4796-A56F-1A59EF7EA283",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB214EAE-AEB7-4359-AD8C-86CCC080EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "757000B2-A8EB-464A-9A2D-EC4D920A0569",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "102BF855-ED1C-4D26-85D9-74B2BE0E9CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B42618DF-F118-41A7-96E5-24C229DA020E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "26F6FC68-BF4A-4511-8B46-A93C81E349B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(3a\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "260E5F96-48DB-41C4-B45E-5BE0367DD7E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE9B41B-B1B5-45A2-8DBE-775B1CE4F2C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "80114F8D-320D-41FF-ADD3-729E250A8CD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "879C4495-3B26-4370-8708-16F5002E37CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A9DDD1E-201F-42B8-ADC9-9CD2F3ED2C4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8C2BB1F-79DF-4471-B75F-C22CEBB5380F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5A55B3-49E4-4C48-B942-4816504BAA30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "62AADD63-CEA3-461B-94EA-0CDAB4A2ED00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB704746-C27B-4C6B-948C-B8C0A3F40782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F354F8F6-70D3-43EE-BF08-DFB87E83E847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62F908B0-7ECE-40F8-8549-29BD1A070606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "378E67DD-779C-4852-BF29-38C2DFFB1BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9033ACC7-1CCC-44E7-8275-73499C0E6E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)e10d:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFD4AF73-6C03-4978-BC43-857188BF7E4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7785E177-C04E-4170-9C35-B4259D14EA85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea8:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CAE727E-E552-4222-8FF0-6146A813BDEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7850295-C728-4448-ABA7-D01397DBBE5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea9a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C104A47-53EE-47FC-BAE5-21925BEE98E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F112DE64-0042-4FB9-945D-3107468193E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E027FB12-862F-413E-AA2B-4BBD90AE3650",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD28874B-148A-4299-9AA1-67A550B25F8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F29B2E6F-ED6C-4568-9042-7A1BD96A9E07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "199DCF1B-8A1E-47CC-87A6-64E6F21D8886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B78669-3B28-4F1D-993D-85282A7D0E96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD05109E-1183-419D-96A1-9CD5EA5ECC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C73A3A-4B84-476F-AC3C-81DCB527E29A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DEE2C71-C401-43D1-86DC-725FE5FDF87E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "1758F264-96F9-4EE9-9CA9-AD5407885547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2842F6-4CD5-457C-AC75-241A5AB9534B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABE0470-E94A-4CAF-865D-73E2607A0DC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(6\\)eb:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9CCD7E3-C62B-4151-96FF-1175D4896E95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6437E689-A049-4D48-AB7A-49CA7EBDE8B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "110B699D-169E-4932-A480-6EBB90CAE94B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4C12918-E5BB-465E-9DA4-06B7351DD805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
              "matchCriteriaId": "4862C453-8BD7-4D53-B2D6-CE3E44A4915A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C4E1F4-AD64-418C-A308-85501E0F3EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "27EF41C6-A0D0-4149-BC5D-B31C4F5CC6D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "57ED9CDC-FC03-4DA7-A791-CE61D0D8364D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB8C3BBA-4829-4006-B7EB-F552D86922C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F980EFA3-BB92-49D3-8D5F-2804BB44ABB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D6D0AA7-E879-4303-AB2D-4FEF3574B60E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "345C9300-CAC2-4427-A6B4-8DBC72573E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "64BFCF66-DE06-46DA-8F9D-60A446DC0F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BDF6ABA-F0A4-423F-9056-A57C6A074137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*",
              "matchCriteriaId": "956FE25C-3CB8-4479-850D-719827123A3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*",
              "matchCriteriaId": "23ABB581-90EF-4F6C-9778-735932D2B08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC3FD874-5EDF-48E0-A5AC-415A620C1FF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*",
              "matchCriteriaId": "58F396D6-9B6E-4E6A-B561-9822DB13C7AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "1374E243-4EC2-4A81-991C-B5705135CAD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECA6101-94BA-4209-8243-A56AF02963EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF00927-80B0-4BE3-BF7C-E663A5E7763A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9795E31D-A642-4100-A980-CD49C291AB7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*",
              "matchCriteriaId": "83C79479-27C6-4273-BC80-70395D609197",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28ACC494-2B4B-4BCE-9275-B7B10CC69B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BB9098-7C1D-4776-8B1F-EF4A0461CCDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*",
              "matchCriteriaId": "602A88C0-30D1-4B63-A8F7-EF1D35350897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios:15.2\\(8\\)e6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D3AE0C5-D071-44B4-B820-422296FDC259",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l_cool:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2683677D-9FD4-416B-8CFF-D81AF3174B3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in Cisco IOS Software for Cisco Catalyst 2960X, 2960XR, 2960CX, and 3560CX Series Switches could allow an authenticated, local attacker with privilege level 15 or an unauthenticated attacker with physical access to the device to execute persistent code at boot time and break the chain of trust.\r\n\r This vulnerability is due to missing signature verification for specific files that may be loaded during the device boot process. An attacker could exploit this vulnerability by placing a crafted file into a specific location on an affected device. A successful exploit could allow the attacker to execute arbitrary code at boot time.\r\n\r Because this allows the attacker to bypass a major security feature of the device, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el software Cisco IOS para los switches Cisco Catalyst de las series 2960X, 2960XR, 2960CX y 3560CX podr\u00eda permitir que un atacante local autenticado con nivel de privilegio 15, o uno no autenticado con acceso f\u00edsico al dispositivo, ejecute c\u00f3digo persistente durante el arranque y rompa la cadena de confianza. Esta vulnerabilidad se debe a la falta de verificaci\u00f3n de firmas para archivos espec\u00edficos que pueden cargarse durante el arranque del dispositivo. Un atacante podr\u00eda explotar esta vulnerabilidad colocando un archivo manipulado en una ubicaci\u00f3n espec\u00edfica del dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante ejecutar c\u00f3digo arbitrario durante el arranque. Dado que esto permite al atacante eludir una importante funci\u00f3n de seguridad del dispositivo, Cisco ha elevado la calificaci\u00f3n de impacto en la seguridad (SIR) de este aviso de media a alta."
    }
  ],
  "id": "CVE-2025-20181",
  "lastModified": "2025-08-04T18:51:54.673",
  "metrics": {
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 5.9,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-05-07T18:15:37.973",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c2960-3560-sboot-ZtqADrHq"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-347"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-17 22:59
Modified
2025-04-20 01:37
Severity ?
Summary
A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.
Impacted products
Vendor Product Version
cisco ios *
cisco ios_xe *
cisco catalyst_2350-48td-s -
cisco catalyst_2350-48td-sd -
cisco catalyst_2360-48td-s -
cisco catalyst_2918-24tc-c -
cisco catalyst_2918-24tt-c -
cisco catalyst_2918-48tc-c -
cisco catalyst_2918-48tt-c -
cisco catalyst_2928-24tc-c -
cisco catalyst_2960-24-s -
cisco catalyst_2960-24lc-s -
cisco catalyst_2960-24lt-l -
cisco catalyst_2960-24pc-l -
cisco catalyst_2960-24pc-s -
cisco catalyst_2960-24tc-l -
cisco catalyst_2960-24tc-s -
cisco catalyst_2960-24tt-l -
cisco catalyst_2960-48pst-l -
cisco catalyst_2960-48pst-s -
cisco catalyst_2960-48tc-l -
cisco catalyst_2960-48tc-s -
cisco catalyst_2960-48tt-l -
cisco catalyst_2960-48tt-s -
cisco catalyst_2960-8tc-l -
cisco catalyst_2960-8tc-s -
cisco catalyst_2960-plus_24lc-l -
cisco catalyst_2960-plus_24lc-s -
cisco catalyst_2960-plus_24pc-l -
cisco catalyst_2960-plus_24pc-s -
cisco catalyst_2960-plus_24tc-l -
cisco catalyst_2960-plus_24tc-s -
cisco catalyst_2960-plus_48pst-l -
cisco catalyst_2960-plus_48pst-s -
cisco catalyst_2960-plus_48tc-l -
cisco catalyst_2960-plus_48tc-s -
cisco catalyst_2960c-12pc-l -
cisco catalyst_2960c-8pc-l -
cisco catalyst_2960c-8tc-l -
cisco catalyst_2960c-8tc-s -
cisco catalyst_2960cg-8tc-l -
cisco catalyst_2960cpd-8pt-l -
cisco catalyst_2960cpd-8tt-l -
cisco catalyst_2960cx-8pc-l -
cisco catalyst_2960cx-8tc-l -
cisco catalyst_2960g-24tc-l -
cisco catalyst_2960g-48tc-l -
cisco catalyst_2960g-8tc-l -
cisco catalyst_2960l-16ps-ll -
cisco catalyst_2960l-16ts-ll -
cisco catalyst_2960l-24ps-ll -
cisco catalyst_2960l-24ts-ll -
cisco catalyst_2960l-48ps-ll -
cisco catalyst_2960l-48ts-ll -
cisco catalyst_2960l-8ps-ll -
cisco catalyst_2960l-8ts-ll -
cisco catalyst_2960pd-8tt-l -
cisco catalyst_2960s-24pd-l -
cisco catalyst_2960s-24ps-l -
cisco catalyst_2960s-24td-l -
cisco catalyst_2960s-24ts-l -
cisco catalyst_2960s-24ts-s -
cisco catalyst_2960s-48fpd-l -
cisco catalyst_2960s-48fps-l -
cisco catalyst_2960s-48lpd-l -
cisco catalyst_2960s-48lps-l -
cisco catalyst_2960s-48td-l -
cisco catalyst_2960s-48ts-l -
cisco catalyst_2960s-48ts-s -
cisco catalyst_2960s-f24ps-l -
cisco catalyst_2960s-f24ts-l -
cisco catalyst_2960s-f24ts-s -
cisco catalyst_2960s-f48fps-l -
cisco catalyst_2960s-f48lps-l -
cisco catalyst_2960s-f48ts-l -
cisco catalyst_2960s-f48ts-s -
cisco catalyst_2960x-24pd-l -
cisco catalyst_2960x-24ps-l -
cisco catalyst_2960x-24psq-l -
cisco catalyst_2960x-24td-l -
cisco catalyst_2960x-24ts-l -
cisco catalyst_2960x-24ts-ll -
cisco catalyst_2960x-48fpd-l -
cisco catalyst_2960x-48fps-l -
cisco catalyst_2960x-48lpd-l -
cisco catalyst_2960x-48lps-l -
cisco catalyst_2960x-48td-l -
cisco catalyst_2960x-48ts-l -
cisco catalyst_2960x-48ts-ll -
cisco catalyst_2960xr-24pd-i -
cisco catalyst_2960xr-24pd-l -
cisco catalyst_2960xr-24ps-i -
cisco catalyst_2960xr-24ps-l -
cisco catalyst_2960xr-24td-i -
cisco catalyst_2960xr-24td-l -
cisco catalyst_2960xr-24ts-i -
cisco catalyst_2960xr-24ts-l -
cisco catalyst_2960xr-48fpd-i -
cisco catalyst_2960xr-48fpd-l -
cisco catalyst_2960xr-48fps-i -
cisco catalyst_2960xr-48fps-l -
cisco catalyst_2960xr-48lpd-i -
cisco catalyst_2960xr-48lpd-l -
cisco catalyst_2960xr-48lps-i -
cisco catalyst_2960xr-48lps-l -
cisco catalyst_2960xr-48td-i -
cisco catalyst_2960xr-48td-l -
cisco catalyst_2960xr-48ts-i -
cisco catalyst_2960xr-48ts-l -
cisco catalyst_2970g-24t -
cisco catalyst_2970g-24ts -
cisco catalyst_2975 -
cisco catalyst_3550_12g -
cisco catalyst_3550_12t -
cisco catalyst_3550_24_dc_smi -
cisco catalyst_3550_24_emi -
cisco catalyst_3550_24_fx_smi -
cisco catalyst_3550_24_pwr -
cisco catalyst_3550_24_smi -
cisco catalyst_3550_48_emi -
cisco catalyst_3550_48_smi -
cisco catalyst_3560-12pc-s -
cisco catalyst_3560-24ps -
cisco catalyst_3560-24ts -
cisco catalyst_3560-48ps -
cisco catalyst_3560-48ts -
cisco catalyst_3560-8pc -
cisco catalyst_3560c-12pc-s -
cisco catalyst_3560c-8pc-s -
cisco catalyst_3560cg-8pc-s -
cisco catalyst_3560cg-8tc-s -
cisco catalyst_3560cpd-8pt-s -
cisco catalyst_3560cx-12pc-s -
cisco catalyst_3560cx-12pd-s -
cisco catalyst_3560cx-12tc-s -
cisco catalyst_3560cx-8pc-s -
cisco catalyst_3560cx-8pt-s -
cisco catalyst_3560cx-8tc-s -
cisco catalyst_3560cx-8xpd-s -
cisco catalyst_3560e-12d-e -
cisco catalyst_3560e-12d-s -
cisco catalyst_3560e-12sd-e -
cisco catalyst_3560e-12sd-s -
cisco catalyst_3560e-24pd-e -
cisco catalyst_3560e-24pd-s -
cisco catalyst_3560e-24td-e -
cisco catalyst_3560e-24td-s -
cisco catalyst_3560e-48pd-e -
cisco catalyst_3560e-48pd-ef -
cisco catalyst_3560e-48pd-s -
cisco catalyst_3560e-48pd-sf -
cisco catalyst_3560e-48td-e -
cisco catalyst_3560e-48td-s -
cisco catalyst_3560g-24ps -
cisco catalyst_3560g-24ts -
cisco catalyst_3560g-48ps -
cisco catalyst_3560g-48ts -
cisco catalyst_3560v2-24dc -
cisco catalyst_3560v2-24ps -
cisco catalyst_3560v2-24ts -
cisco catalyst_3560v2-48ps -
cisco catalyst_3560v2-48ts -
cisco catalyst_3560x-24p-e -
cisco catalyst_3560x-24p-l -
cisco catalyst_3560x-24p-s -
cisco catalyst_3560x-24t-e -
cisco catalyst_3560x-24t-l -
cisco catalyst_3560x-24t-s -
cisco catalyst_3560x-24u-e -
cisco catalyst_3560x-24u-l -
cisco catalyst_3560x-24u-s -
cisco catalyst_3560x-48p-e -
cisco catalyst_3560x-48p-l -
cisco catalyst_3560x-48p-s -
cisco catalyst_3560x-48pf-e -
cisco catalyst_3560x-48pf-l -
cisco catalyst_3560x-48pf-s -
cisco catalyst_3560x-48t-e -
cisco catalyst_3560x-48t-l -
cisco catalyst_3560x-48t-s -
cisco catalyst_3560x-48u-e -
cisco catalyst_3560x-48u-l -
cisco catalyst_3560x-48u-s -
cisco catalyst_3750-24fs -
cisco catalyst_3750-24ps -
cisco catalyst_3750-24ts -
cisco catalyst_3750-48ps -
cisco catalyst_3750-48ts -
cisco catalyst_3750_metro_24-ac -
cisco catalyst_3750_metro_24-dc -
cisco catalyst_3750e-24pd-e -
cisco catalyst_3750e-24pd-s -
cisco catalyst_3750e-24td-e -
cisco catalyst_3750e-24td-s -
cisco catalyst_3750e-48pd-e -
cisco catalyst_3750e-48pd-ef -
cisco catalyst_3750e-48pd-s -
cisco catalyst_3750e-48pd-sf -
cisco catalyst_3750e-48td-e -
cisco catalyst_3750e-48td-s -
cisco catalyst_3750g-12s -
cisco catalyst_3750g-12s-sd -
cisco catalyst_3750g-16td -
cisco catalyst_3750g-24ps -
cisco catalyst_3750g-24t -
cisco catalyst_3750g-24ts -
cisco catalyst_3750g-24ts-1u -
cisco catalyst_3750g-48ps -
cisco catalyst_3750g-48ts -
cisco catalyst_3750v2-24fs -
cisco catalyst_3750v2-24ps -
cisco catalyst_3750v2-24ts -
cisco catalyst_3750v2-48ps -
cisco catalyst_3750v2-48ts -
cisco catalyst_3750x-12s-e -
cisco catalyst_3750x-12s-s -
cisco catalyst_3750x-24p-e -
cisco catalyst_3750x-24p-l -
cisco catalyst_3750x-24p-s -
cisco catalyst_3750x-24s-e -
cisco catalyst_3750x-24s-s -
cisco catalyst_3750x-24t-e -
cisco catalyst_3750x-24t-l -
cisco catalyst_3750x-24t-s -
cisco catalyst_3750x-24u-e -
cisco catalyst_3750x-24u-l -
cisco catalyst_3750x-24u-s -
cisco catalyst_3750x-48p-e -
cisco catalyst_3750x-48p-l -
cisco catalyst_3750x-48p-s -
cisco catalyst_3750x-48pf-e -
cisco catalyst_3750x-48pf-l -
cisco catalyst_3750x-48pf-s -
cisco catalyst_3750x-48t-e -
cisco catalyst_3750x-48t-l -
cisco catalyst_3750x-48t-s -
cisco catalyst_3750x-48u-e -
cisco catalyst_3750x-48u-l -
cisco catalyst_3750x-48u-s -
cisco catalyst_4000_supervisor_engine_i -
cisco catalyst_4000_supervisor_engine_iv -
cisco catalyst_4000_supervisor_engine_v -
cisco catalyst_4500_supervisor_engine_6-e -
cisco catalyst_4500_supervisor_engine_6l-e -
cisco catalyst_4500_supervisor_engine_ii-plus -
cisco catalyst_4500_supervisor_engine_ii-plus-ts -
cisco catalyst_4500_supervisor_engine_iv -
cisco catalyst_4500_supervisor_engine_v -
cisco catalyst_4500_supervisor_engine_v-10ge -
cisco catalyst_4500_supervisor_ii-plus-10ge -
cisco catalyst_4500e_supervisor_engine_8-e -
cisco catalyst_4900m -
cisco catalyst_4928_10_gigabit_ethernet_switch -
cisco catalyst_4948 -
cisco catalyst_4948_10_gigabit_ethernet_switch -
cisco catalyst_4948e-f_ethernet_switch -
cisco catalyst_4948e_ethernet_switch -
cisco catalyst_blade_switch_3020 -
cisco catalyst_blade_switch_3030 -
cisco catalyst_blade_switch_3032 -
cisco catalyst_blade_switch_3040 -
cisco catalyst_blade_switch_3120 -
cisco catalyst_blade_switch_3120x -
cisco catalyst_blade_switch_3130 -
cisco catalyst_c2928-24lt-c -
cisco catalyst_c2928-48tc-c -
cisco catalyst_switch_module_3012 -
cisco catalyst_switch_module_3110 -
cisco catalyst_switch_module_3110x -
cisco embedded_service_2020_24tc_con -
cisco embedded_service_2020_24tc_con_b -
cisco embedded_service_2020_24tc_ncp -
cisco embedded_service_2020_24tc_ncp_b -
cisco embedded_service_2020_con -
cisco embedded_service_2020_con_b -
cisco embedded_service_2020_ncp -
cisco embedded_service_2020_ncp_b -
cisco enhanced_layer_2\/3_etherswitch_service_module -
cisco enhanced_layer_2_etherswitch_service_module -
cisco gigabit_ethernet_switch_module_\(cgesm\) -
cisco ie-3010-16s-8pc_industrial_ethernet_switch -
cisco ie-3010-24tc_industrial_ethernet_switch -
cisco ie-4000-16gt4g-e_industrial_ethernet_switch -
cisco ie-4000-16t4g-e_industrial_ethernet_switch -
cisco ie-4000-4gc4gp4g-e_industrial_ethernet_switch -
cisco ie-4000-4gs8gp4g-e_industrial_ethernet_switch -
cisco ie-4000-4s8p4g-e_industrial_ethernet_switch -
cisco ie-4000-4t4p4g-e_industrial_ethernet_switch -
cisco ie-4000-4tc4g-e_industrial_ethernet_switch -
cisco ie-4000-8gs4g-e_industrial_ethernet_switch -
cisco ie-4000-8gt4g-e_industrial_ethernet_switch -
cisco ie-4000-8gt8gp4g-e_industrial_ethernet_switch -
cisco ie-4000-8s4g-e_industrial_ethernet_switch -
cisco ie-4000-8t4g-e_industrial_ethernet_switch -
cisco ie-4010-16s12p_industrial_ethernet_switch -
cisco ie-4010-4s24p_industrial_ethernet_switch -
cisco ie-5000-12s12p-10g_industrial_ethernet_switch -
cisco ie-5000-16s12p_industrial_ethernet_switch -
cisco ie_2000-16ptc-g_industrial_ethernet_switch -
cisco ie_2000-16t67_industrial_ethernet_switch -
cisco ie_2000-16t67p_industrial_ethernet_switch -
cisco ie_2000-16tc-g-e_industrial_ethernet_switch -
cisco ie_2000-16tc-g-n_industrial_ethernet_switch -
cisco ie_2000-16tc-g-x_industrial_ethernet_switch -
cisco ie_2000-16tc-g_industrial_ethernet_switch -
cisco ie_2000-16tc_industrial_ethernet_switch -
cisco ie_2000-24t67_industrial_ethernet_switch -
cisco ie_2000-4s-ts-g_industrial_ethernet_switch -
cisco ie_2000-4t-g_industrial_ethernet_switch -
cisco ie_2000-4t_industrial_ethernet_switch -
cisco ie_2000-4ts-g_industrial_ethernet_switch -
cisco ie_2000-4ts_industrial_ethernet_switch -
cisco ie_2000-8t67_industrial_ethernet_switch -
cisco ie_2000-8t67p_industrial_ethernet_switch -
cisco ie_2000-8tc-g-e_industrial_ethernet_switch -
cisco ie_2000-8tc-g-n_industrial_ethernet_switch -
cisco ie_2000-8tc-g_industrial_ethernet_switch -
cisco ie_2000-8tc_industrial_ethernet_switch -
cisco ie_3000-4tc_industrial_ethernet_switch -
cisco ie_3000-8tc_industrial_ethernet_switch -
cisco me_4924-10ge -
cisco rf_gateway_10 -
cisco sm-x_layer_2\/3_etherswitch_service_module -



{
  "cisaActionDue": "2022-04-15",
  "cisaExploitAdd": "2022-03-25",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Cisco IOS and IOS XE Remote Code Execution Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F6546FC-F719-4FC2-ACB1-E558687769EC",
              "versionEndIncluding": "15.1\\(3\\)svs",
              "versionStartIncluding": "12.2s",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3588833B-3B46-4968-8710-C244AB2C7BB6",
              "versionEndIncluding": "3.9e",
              "versionStartIncluding": "3.2sg",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7301CDF-48BB-4E4B-862A-28B2A742D67B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "409044EC-4B25-4C7F-B20F-26CD79EEE49F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4533989C-CCDC-464A-AB68-29A752FA0759",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487A1994-9FF2-4F15-9F38-C5B5218221DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "234DD8AF-D938-4E20-89FE-E34F54EFF2F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A546FA79-654C-4CE9-9F6B-8F49255500F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E8F619-55BA-45E4-B75E-A64E9452F7AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23CE5551-B4ED-4554-9012-09A7CF7A5D88",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69384D20-0270-4CD5-95D0-7EA93CBDE78E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07F566D-BCAC-44EC-AB37-6FA870D4AEDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63946130-E5AB-476A-98AB-3BB49B7EBD1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A9D08FF-DD21-4AAE-ABB5-561CD80D52AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C594EB3-FECD-4E88-8945-B9CD5EF6CA66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E79AB1-9C7D-4E72-8038-60B62D3F771B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "784EF30F-54A7-46D8-B9E5-8CA2883563DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E6061A1-706D-4129-B99B-318EACB7AB3D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3FFD5C-1AC5-4D1D-9A66-9167F72E4C6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF8E6604-7F57-4147-A4D9-7A37B415D794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28218B4-23E0-4319-BE93-F09FB552F7D7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "042A0AA5-FC1B-451E-92A4-1E3C309B0C00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8D63435-4DC4-4597-AADE-89BCF470B109",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D51A01-A213-4BB1-84C5-7D29D28A81CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D562C004-24DE-4B9D-A323-C3D2EA32A173",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D86BAF5-681F-4867-A657-D4724F748707",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC92813C-8F6D-4D21-ACC7-1C1B1AE1A8DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "11C2CDD4-F92B-4FCE-BFDC-F3A2BEF08EA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "890B8C3F-2E83-4D8C-BF9B-34B50E228822",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE86BD73-E951-44EB-A056-6D7E015B9088",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBC12299-2A7B-493C-9585-560E9A110D15",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13EA3F96-D65B-46B6-ACDB-B4A2BDC7DAFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "190D6DC2-D8C6-4183-B95D-28CDEC1612FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1421F9C5-4A7C-476F-91FF-8108718B6E66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8ACDC1F-60E7-4CA7-B242-25D3F975BECF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED6EA2F-3479-4145-82CF-B65FF24D8F36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB4BBD2-EFBE-432C-8B4A-F58FEDA769AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5720E0D-2B0E-4C44-AE80-9DBE88F57A93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "948A3F12-1761-4309-BC97-41F5068AA082",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F8FB3BE-77D7-44C7-B41A-4CB4A8766856",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA3F2B4A-5488-4AF1-A67F-BC137312ED93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D0055E-6FC5-42C2-BD7C-C13C54060A35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EDAEA8-7FAA-4D59-A5B9-62B260E5616D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5B6046-6377-471B-9639-D7F635B08190",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFCF1E00-1C43-486E-A64E-14F5BEF82362",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AD8E261-E81F-4E09-8006-3D878EF61E0F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAF5C54-CCFB-48E4-9384-A01867948BA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0CC74-2523-4F85-B54C-C46455613064",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "923B1623-2A33-497B-9238-3F4699E8E4AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "762B1BA4-69FC-4977-A0A8-9323660674A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F249629F-1A5C-4C12-B956-552A2526A836",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9AF097-09D6-4388-85EA-5954BD40D6B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "949533D3-6500-49BA-BE55-42E1506D3DD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E5B561-02A2-4F79-8E28-E6A2B5C4F09D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EBE7411-BD02-47A8-99BC-6B701B60A61B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96195B6B-C869-4DEF-AB5D-704B3D2FC76E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960pd-8tt-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9CB655-99FB-42F3-A2BB-2A297B02EC2B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D2C8C2-8D3B-46D0-A1EA-BC0C65CD93F9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EECCA51-9F60-4FAC-9291-57411441B090",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "261D5183-1A3C-41ED-B196-BB0992FC5BF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F114380-0BB6-414C-9854-77DCEBB6C9BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-24ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90C5B9D3-BF37-4146-A12E-193EA90C9BE6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49073FBC-9DF8-4A5C-8BD5-FBC2B1923D35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4845C2-9710-4CE8-81C3-D81037B7E66B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DAA8FE4-F6BF-46C9-B94D-C423AC27FFCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "379B1CA9-E800-41BD-B50B-5A4A6924E70F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C95186-A63C-40F6-8FAF-F7907BF04907",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F490DCE9-400E-4079-8409-71A17A2F50CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-48ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECFD06FB-FDAA-4208-8BF2-27DE6EEA1C39",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA7C5852-9BF9-47E5-A524-CC13894DF470",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CADA2DD-29BD-499E-9E25-C514ABD1AADC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f24ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B25DAE-4E68-404B-9E31-6EAE7C3DC105",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E83F7F5E-FDDD-4B8F-9814-149B076ABBE2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9BC9B19-8C1E-4DB5-9C4D-E94253E4B753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0387EC8E-3A09-4D8B-8FFE-9EEE52498AD0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960s-f48ts-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92FB9DEA-7A55-411D-9702-CCD8FDB0C35D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D76048CE-58D5-4F67-8679-9C863D41F15E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7DC221-0BA1-4051-8643-1180C9EA682A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24psq-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00CEE576-6C55-4BD4-B9F2-33E40483437B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "548B1FAF-946A-446B-8248-10BC194496B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3531645A-C4FB-4F6D-BBD2-D2852AA13509",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-24ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46984315-BF1E-4146-9960-328AEFA73D54",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5FC6D2F-0B4A-4D12-BF34-8D91C948CD23",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927762E0-6EE5-48C9-A7EE-8824BEBED08A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F1CA06-D540-4CDB-BACB-5D528C830753",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53A6E90-DA02-420A-B4A7-BC6D73C4B95A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B48837AB-F3DB-4246-90E2-6D8CD8BCF658",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B888C8-9E13-4353-A8D8-96900726AE77",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960x-48ts-ll:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA35A21E-9FB8-4694-B46D-E9381CB3D0C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1BD40B3-2AD6-42D3-AE79-2E66A4CDF79E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24pd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F5F1600-30A5-4B31-A518-7B84BFE16883",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E03D0B73-B854-4385-9AD2-EAC7B041558D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "868B074C-2A14-4242-829A-202095A2CFF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C990D9F-42F4-4722-AF6E-2933E5872C17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C76EA7-969F-4A5F-B045-995C9445B415",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "567757A5-74CB-4FB6-9BDA-FA4F51A02998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-24ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7794B87E-C70E-4DA3-9FC8-0170A0898557",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEB1267-B23F-4001-B6E2-49894CF6EC38",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "845DDB35-3BB6-41CB-8304-340F444B6FE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DAC629E-531F-4B99-9A07-15E113169FCA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48fps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A63DC2E4-83AB-487E-80D5-036723D930F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6DD7CDE-C7E1-466C-A6E3-33AA30F9CDEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lpd-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F543085-A2E2-4D7E-96EC-E9C6B964AED2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64C85B3-D227-4BE7-BE7B-B05F86FE0583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48lps-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC9AD1E-3FE7-42D2-9A8D-F71694EF9BAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A153EAF3-C3DC-49C5-BBBA-7459850B1F57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48td-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2000D5-E0C0-4488-8213-DC3079301050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63AF0F69-A0E0-4AAC-B96B-1C1B59D76669",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2960xr-48ts-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "179F9893-1C6B-468E-84F3-1CAAAE0A7671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2970g-24t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "909A8DAE-5397-4B9B-8CDA-9B00712D6D6B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2970g-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5193F631-B2A8-48D2-8DC7-AE2365FA2DEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_2975:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B842CBE4-C180-4C72-AC61-E8FD522C902F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_12g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0BB74CE-1822-48B4-BB5B-131794A2BC14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_12t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FBA8D-0CA3-49A9-B703-4CDF1E8DFAE3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_dc_smi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A19A8A62-4FCF-43D4-B266-CB00A8217449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_emi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06DC2757-2107-477A-B4D1-C6D2419DFBD3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_fx_smi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D79CF40-2070-48E3-8135-F9893226D400",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_pwr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E7A2E1-D356-470F-9D04-C743BE70B6E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_24_smi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5237B60-ACF2-473F-B822-27792A07CBC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_48_emi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C4C143-1CF6-4429-8BA0-7BE782032D30",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3550_48_smi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FA8BBAA-E651-4626-B31D-39EA4F04D6BF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DACEA494-E9DC-4F74-A252-259CC93E2741",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB7E87CD-D6B7-4C7C-8627-BADB993A6D72",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299DC29B-A5DC-4137-A95A-DCC85E9C59B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F482285C-D0C6-4BA3-8ACF-8461B91FDF82",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E02CA96-ED16-410B-B51A-AA29B6E5667E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560-8pc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61467987-235B-4D06-83D2-5DF5A51E4DE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560c-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CCFC05-FE79-4804-AEED-00975FA49EE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560c-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A83DF239-FEFB-4573-8E41-498A5FC5EB16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "333FA8D5-CEA5-4380-9D7C-1D72B4C98464",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cg-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E1CECF-0621-4004-9F6D-A2690BD18273",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cpd-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D867770-2404-4F51-B120-F170927F65BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2ABDF97F-B703-40A0-B510-D73859139E87",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6637D9D4-14CE-48D2-90D4-19EF761F4193",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-12tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BE430A-2446-4F29-88D8-D452D1022B02",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09DF34EC-7BC3-44DC-B7B1-94162245CBBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8pt-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06EEDB4F-BD1E-4914-AF79-64D42643683D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8tc-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54BFFB02-7C84-4569-8129-74B84A5E7310",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560cx-8xpd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12A3197-0CE2-44F4-B310-DE8D4A72B00D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12d-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A0E46E6-C885-4184-8EA9-C7323A482A19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12d-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C7EA43F-8B3A-4636-B2BF-010E141C5710",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12sd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49D8ACB8-850C-4967-9D42-B8F162259FF3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-12sd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6E14120-1B3E-4A70-B875-4EE5B979711B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24pd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "188AE176-297C-4EB6-B048-B2743864A454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74A09201-D66C-482D-950C-8B13B6BE69A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24td-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A9CFC23-8C33-43F9-B5DE-1FA4D7CB2A0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-24td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DED5868-C623-48B7-8D04-BA5442B772BD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2C33A-A76D-4600-9A7E-F5E5C93FB71E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-ef:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF53A7E-9933-4AE8-B5A5-7A4657DF17A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "207E453A-F004-486A-A36A-4B120647E3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48pd-sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5403BF-948F-493C-AB10-4C5239DDA975",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48td-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0EBD95-F0EB-4AE5-8C11-987C3DA5F6AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560e-48td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE73686A-5BDB-407B-99DB-2FC7107EA2ED",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560g-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15EFDB4-AB6B-4194-A8DA-47EFC5435A9E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560g-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A11434F-D3CD-4F88-888B-82262837B752",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560g-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABFA401A-8C8C-4DD8-9795-5F38977D2D90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560g-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F56B4661-3FF4-4610-9DA9-8A2E87C059B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71BB343B-D016-46BB-8520-3F29A639C183",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BDEFF5D-40DC-410A-A781-44981DE9A3CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DCABE7A-783A-4E93-A762-520E653E161E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D69F868-A419-48EA-8F99-A62CDEFA483D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560v2-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F070996F-B01C-42F3-9CE7-8ACAB89ACD70",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE1EAFFF-E36A-4BED-99BD-CB16977AF312",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBD36856-FCCB-4FBA-8728-A628CC4F5F2E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "134A9D8A-F8AC-4ACF-B558-91A4BF850425",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E344D5-195B-4995-8616-A212A9AE1DBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A94A128-3DDD-44FD-A8DC-1ECBCC38C657",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C639B610-F43A-443D-B956-11BE7D34F41D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA269A5-5E49-461B-9FD3-ADAC8E58FF8C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A74304E-855E-48DF-B8B1-4AB17C772115",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-24u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B4D477B-5EB7-4841-90DD-510DD655E288",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B63BA8D6-5139-4033-AF52-03E7515A0050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "721A029A-D747-42D9-B91E-A57D91182AC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F76E9961-7799-4B86-A05E-9BAD9F5E1BC6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB035A6-64B4-4612-9CF6-2DB5EB85DF13",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACDDFBDC-DCA9-4DD6-BBF3-AB65AD5A7BB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48pf-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3088538-99F0-48EE-95EB-608AAAC4D5C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67CF3C12-93A6-4539-B3B7-C45B30FC39A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F2B3C1C-AC54-455B-969C-FB9D19B1FD5D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7622A057-11DD-4BCC-BB3C-E97C5C86C21A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3568327-3C97-4F60-B8CD-BD46A4297D29",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14E6769-44B6-4258-A8CF-8CDB0FA72F65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3560x-48u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0936B75B-CE98-4D30-8B95-D16569D7CAB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-24fs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB109071-3FE4-4610-A9FF-2E7FEEF23E0C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1821EB-F2F9-4293-A92C-70C4627623D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F123F41-1B78-45F2-98EE-3BF74CBD8112",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8C6BCE4-6D58-4CA1-810A-4427E4235DB9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D922479-A8F4-4419-A450-AE1A97C480DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro_24-ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C15A3C-07C0-4385-BC5E-A7FB3D4B7B4D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750_metro_24-dc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D306E3-6D0A-4B53-BD70-AE3D4CDD6DCC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24pd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27A4BFC9-BA3D-43FF-8E8B-CBA87D9FED4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC8425C-509A-43BB-865E-EB5DDE007222",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24td-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "787CB67C-F5C1-4508-9817-CA25A5D12EEC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-24td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93B55075-2EB6-4511-9ADC-70F2314D7C98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331FED4B-B014-4B2F-B2F4-A82CB18F60B5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-ef:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "098C6C37-0785-4224-92D5-A8E1AB4A24F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B91443C6-40C3-4EB1-93C5-1F25E99C7346",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48pd-sf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A018451F-D2C4-40C1-A277-4D7A873F31F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48td-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A640842-EC2A-4603-BFC0-3F42EF01D3D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750e-48td-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2C71306-AA1F-4CC0-8E36-57F5EE374414",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-12s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F5C6319-C780-4C9D-971D-762BE23F3D92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-12s-sd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9609F0A2-E891-46C8-A293-C4EC5093DA2D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-16td:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB2A727-4B95-4B2A-9B0F-90259330BFDD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9601405-1541-4C8F-B388-85C73765D75C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24t:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D063818B-56EE-415B-89EF-C6C707637269",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A7CF840-3C7B-4765-AFBE-84AA11E91956",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-24ts-1u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB69810E-900E-45BC-BD43-B7CA1DE722D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CA05EEE-9039-430F-92DF-B3E4A52A18F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750g-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3CDFEB-8B08-4912-896A-72F1BAFD47A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24fs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AB18A03-6D49-489B-9F27-DF19D3AC0DAB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13A75271-D05C-4C91-A99A-C03BE49C9110",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-24ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45931DC1-552D-44F2-9327-8490A9B45BF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-48ps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED46E2B-6398-435C-ABC0-7C6B226FB55D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750v2-48ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA5D6BBD-C589-44DD-9C14-12CBCC716610",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17A2728-7627-4550-80D3-4EC228606A7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-12s-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6540A964-656D-48E2-B7D3-3F4D4B38A785",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05BA9762-0C59-4841-820C-4D30EB30E04F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CB4DCCA-EEF2-4999-A977-89046D934292",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0859DCB-7572-4E78-A166-766FEF0BDFD6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "072B2446-904F-4614-B4A6-68396644B9AE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24s-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E537A35E-F4C1-4A7D-AACF-E80D4E2B3305",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2DD7944-66A9-4611-85DE-5F42848ACDB0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "944895AA-9E92-45B7-8A31-AA148AF9346B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAEBB446-A86D-4C06-8054-B6C1C0ED7776",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6551B6-85FB-4945-84CA-0E421FE53C3B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E27272-07F1-4424-A8B9-5FDAD67DB68A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-24u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC60521F-DC3F-46F9-BBC9-4C108D17E7F8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F799EEF-3F87-456D-9152-7D44C08D8938",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD11F079-2F52-4611-B75E-33B2738501E9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48p-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43534D4E-3115-4128-8214-06A52273B69A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "539BBD1B-3E1E-4CB1-B016-F20C25C46B9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4947A20-7C21-4071-843B-EB87A77A8DC0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48pf-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4884D54A-E24C-4382-825C-958FBD56C060",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2A6324C-5812-44E9-AC97-0511349E27B4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "266C504F-0C75-428A-8F67-863F3AD31368",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48t-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E209DEC3-9A4E-40CF-B19C-B71FF76D29E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3595C29-C1B0-49D5-AF3A-52DACDD3C725",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E72C5777-7D8D-41E7-BE3A-4DC516BD050B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_3750x-48u-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7FA3259-48DD-41BD-957D-4A98AE99754E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBFCA2CC-2F4A-4489-A3D6-3174350EB879",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_iv:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2EEF9CF-19AE-4A21-88D5-06A45B972651",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4000_supervisor_engine_v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D817D90-A7BA-4CA8-BA5C-FA82CA31F620",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF8023F-C8D7-4B98-9472-6EC365A19D48",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15B137CB-C12C-47AF-9AF5-05C1B2086351",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAD2F469-8E06-43D3-B458-0437352D5F47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_ii-plus-ts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73E711BA-BBF0-4E1A-B84C-2449E4CB8BA3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_iv:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED3981C-C68B-4697-9AB3-A9BD6249B1E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A7E1F3-AB1E-452C-9FA4-DD24680F65D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_engine_v-10ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24CD713C-BF36-4BCA-8BC6-55418E038136",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500_supervisor_ii-plus-10ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C402FF8B-6EA1-406B-9DB7-E2D8939CFFFF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4500e_supervisor_engine_8-e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C30EF3-A63D-4022-A032-77C376AD9DA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A39CB5-8F97-4030-B9CD-D28BF5C811F6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4928_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C36E5D-F471-4002-854B-93DFFFEF471C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12B41FC2-D482-4CF7-ADAC-720CCD4C5648",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948_10_gigabit_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40C98C14-96EB-4AF5-9090-842234BB0855",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948e-f_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E725C592-4ADF-4C06-958D-4BC725A0EA19",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_4948e_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EC2EE0-F838-497D-92FD-1FD830564811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4EBA036-A69E-40FE-B8A2-6D99C0AB9F35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3030:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2937EE-0566-465E-9AE7-0BC97D02676E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3032:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0527FC9C-08FB-4AA5-AD59-9EEFBEFF6F53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3040:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0799AF-3CBB-4749-9314-9DF3A93C7D44",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEDE0913-7E59-4741-B0D9-EC6C90C5E21C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3120x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808DEBC5-0249-491C-9607-9263F781BCDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_blade_switch_3130:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15AF91D-A937-4F0B-88F9-B0EDEE7CE9EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_c2928-24lt-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEB558C8-826C-486A-B7CF-1E0EC0A7A106",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_c2928-48tc-c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC95D92-296F-4671-9191-29CED1C38070",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B334CAF-50A9-4214-AA09-71617C1235A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3110:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65AA2DC-C7FC-48F9-B481-920793CCD004",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:catalyst_switch_module_3110x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB7D6BCA-376D-40DE-88AF-358A23AEB25C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BC6B538-A151-4C6F-AB66-2592335C9412",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_con_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBF6124-87FE-4062-9774-3D7B314852FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "172A45CB-9976-4743-B342-460BDF1237E0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_24tc_ncp_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D354D47-434F-48DB-9415-4B6B650485BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "573BD04B-6601-4F8A-BA6E-3B5769002B6E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_con_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "230828B3-36C5-4183-824F-A0D2C8811AF6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5A3F35-0DEE-40D7-AA69-E1CB81291D8E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:embedded_service_2020_ncp_b:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF0961D3-060C-415F-8721-6035BD813EC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:enhanced_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9861A7C6-9AC2-4B84-B86E-56BEA7A84774",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:enhanced_layer_2_etherswitch_service_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1526DA59-4077-44CF-A42C-56EC36EFFA76",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:gigabit_ethernet_switch_module_\\(cgesm\\):-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30B0E5E0-92ED-4AFF-BF81-A48AA6E9DC51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0071F74-A0D3-45FE-8F58-F2F4D64AA0A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "095B70C4-0551-42BB-88B3-602DA9AE7C18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-16gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45EC8751-C17A-4F75-B88A-5778E2496462",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-16t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C52B1C4-A42A-42AC-ABB3-F2B289F47B8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19155C80-7068-4E3A-88EA-9F90C1B14ABC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64234EBB-B47D-4B2A-A46D-2AA234E0ECC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4s8p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C4975AA-722F-43AB-A762-88D5A00FC7EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4t4p4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76C5B3B-03FF-47C0-88B1-A5AB932D02DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-4tc4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA64B716-2D79-4B4E-8007-C4575AA68E8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gs4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "763B3611-7EE1-455F-96C7-0A2E83D22AF1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gt4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2D391F-27DE-48E6-9AA3-36A8C672A6AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DE4E5E0-F7E8-43BC-9AFC-159D6B2B4344",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8s4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BBAC7B1-693D-40F8-90BB-6290E3DCD5A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4000-8t4g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43AF8063-E30D-411B-9CEC-25E336E5E4E4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A359421-6CD3-43E0-94FC-20C76756C7EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F9DF32-3E0B-47FA-912A-FCE948BA768E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-5000-12s12p-10g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDCB2A84-541D-44A6-ABDA-67A3A6DFC80F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie-5000-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE187051-5443-44D9-A0F8-2D351D2E4372",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F63F4C5-7784-4B83-B454-E9731210920B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89AEB2-8690-4389-A896-10430A690243",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D464787-DC79-474F-84CA-2B4AD209C21F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAFC9C43-2BAE-4F4E-B084-F9FB54EEF6D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6EAC97A-E3FC-490F-9D02-8CA8FA87D6DA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B0F4029-9E79-4ADE-A851-72F18635A492",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C224EE6-1436-4F11-94A8-4CC96A5001F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A4E545-9F74-40CC-8212-11798AF8D611",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D817838-BDA5-4ED8-8EC9-6C5F4C3C9C5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842352DA-0E9B-4520-9B32-C766BEA7BF9C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66521F18-9C3D-4323-AFC1-5A4ABC476084",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E62F6C8-1B96-4093-8E54-05B0086842A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5D3398-D9AE-4447-8D21-03853B41594E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27364811-6885-49B9-ADE7-55CD69105EC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77F72F96-3272-432C-A8B8-781C95D65A5E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "036F4AFB-CBAA-4155-AC79-B2DC38E37613",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9725FF2E-25DB-42EB-B504-B169392D6C31",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "683C46D6-6DBD-4C99-A577-4CE624DEDD8B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA132B36-55CB-492A-8B85-715201E7712F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_2000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ABD77B1-BF1E-4748-A965-08D19E323D78",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_3000-4tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED7DA136-4146-439B-A27B-013F353382B7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ie_3000-8tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3374CF70-3F34-448D-ABA0-EEF1C79DC4BA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:me_4924-10ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8D304B8-89EB-45DE-BEA3-564028842BB9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:rf_gateway_10:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18233C3F-7F08-4E97-BEC1-30B336E92511",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:sm-x_layer_2\\/3_etherswitch_service_module:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21F16053-2839-4A59-B2A7-7E642BD26BE7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el c\u00f3digo de procesamiento de Cisco Cluster Management Protocol (CMP) en Cisco IOS y Cisco IOS XE Software podr\u00eda permitir a un atacante remoto no autenticado provocar una recarga de un dispositivo afectado o ejecutar c\u00f3digo remotamente con privilegios elevados. El Cluster Management Protocol utiliza internamente Telnet como un protocolo de se\u00f1alizaci\u00f3n y comando entre los miembros del cl\u00faster. La vulnerabilidad se debe a la combinaci\u00f3n de dos factores: (1) la imposibilidad de restringir el uso de las opciones Telnet espec\u00edficas de CMP s\u00f3lo a las comunicaciones locales internas entre los miembros del cl\u00faster y, en cambio, aceptar y procesar dichas opciones a trav\u00e9s de cualquier conexi\u00f3n Telnet con un dispositivo afectado; y (2) el procesamiento incorrecto de las opciones malformadas de Telnet espec\u00edficas de CMP. Un atacante podr\u00eda explotar esta vulnerabilidad enviando opciones malformadas de Telnet espec\u00edficas de CMP mientras establec\u00eda una sesi\u00f3n Telnet con un dispositivo Cisco afectado configurado para aceptar conexiones Telnet. Un exploit podr\u00eda permitir a un atacante ejecutar c\u00f3digo arbitrario y obtener el control total del dispositivo o provocar una recarga del dispositivo afectado. Esto afecta a los conmutadores Catalyst, los conmutadores Embedded Service 2020, el m\u00f3dulo de servicio Enhanced Layer 2 EtherSwitch, el m\u00f3dulo de servicio Enhanced Layer 2/3 EtherSwitch, el conmutador Gigabit Ethernet (CGESM) para HP, los conmutadores IE Industrial Ethernet, el conmutador ME 4924-10GE, la pasarela RF 10 , y m\u00f3dulo de servicio EtherSwitch de capa 2/3 SM-X. ID de errores de Cisco: CSCvd48893."
    }
  ],
  "id": "CVE-2017-3881",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-17T22:59:00.640",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/96960"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97391"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038059"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/41872/"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://www.exploit-db.com/exploits/41874/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/96960"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/97391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038059"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/41872/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://www.exploit-db.com/exploits/41874/"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}