Vulnerabilites related to cisco - mds_9140
CVE-2015-4237 (GCVE-0-2015-4237)
Vulnerability from cvelistv5
Published
2015-07-03 10:00
Modified
2024-08-06 06:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv08434, and CSCuv08436.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:11:12.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1032775", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032775" }, { "name": "20150701 Cisco Nexus Operating System Devices Command Line Interface Local Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv08434, and CSCuv08436." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-23T18:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "1032775", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032775" }, { "name": "20150701 Cisco Nexus Operating System Devices Command Line Interface Local Privilege Escalation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2015-4237", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv08434, and CSCuv08436." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1032775", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032775" }, { "name": "20150701 Cisco Nexus Operating System Devices Command Line Interface Local Privilege Escalation Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2015-4237", "datePublished": "2015-07-03T10:00:00", "dateReserved": "2015-06-04T00:00:00", "dateUpdated": "2024-08-06T06:11:12.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20399 (GCVE-0-2024-20399)
Vulnerability from cvelistv5
Published
2024-07-01 16:11
Modified
2025-07-28 19:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.
Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:
Nexus 3000 Series Switches
Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later
Nexus 9000 Series Switches in standalone NX-OS mode
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco NX-OS Software |
Version: 8.2(5) Version: 7.3(6)N1(1a) Version: 7.3(5)D1(1) Version: 8.4(2) Version: 7.3(6)N1(1) Version: 6.2(2) Version: 8.4(3) Version: 9.2(3) Version: 7.0(3)I5(2) Version: 8.2(1) Version: 6.0(2)A8(7a) Version: 7.0(3)I4(5) Version: 6.0(2)A6(1) Version: 7.3(1)D1(1) Version: 6.2(14a) Version: 7.0(3)I4(6) Version: 7.3(4)N1(1) Version: 7.0(3)I4(3) Version: 9.2(2v) Version: 6.0(2)A6(5b) Version: 7.3(0)D1(1) Version: 6.2(17a) Version: 7.0(3)I4(7) Version: 6.0(2)U6(1a) Version: 7.1(5)N1(1b) Version: 7.0(3)I4(1) Version: 7.0(3)I4(8) Version: 7.0(3)I4(2) Version: 7.1(4)N1(1c) Version: 7.0(3)IM3(1) Version: 6.0(2)U6(5a) Version: 6.0(2)A8(11) Version: 6.0(2)A6(4a) Version: 6.2(9) Version: 6.2(5) Version: 7.3(4)D1(1) Version: 6.2(20) Version: 9.2(1) Version: 9.2(2t) Version: 9.2(3y) Version: 7.0(3)I4(1t) Version: 6.0(2)U6(5c) Version: 6.0(2)A6(4) Version: 7.0(3)I7(6z) Version: 9.3(2) Version: 7.3(1)DY(1) Version: 7.0(3)F3(3) Version: 6.0(2)U6(6) Version: 6.2(29) Version: 7.0(3)I7(3z) Version: 7.0(3)IM7(2) Version: 6.0(2)A8(11b) Version: 6.2(9a) Version: 7.3(0)N1(1) Version: 7.0(3)I7(5a) Version: 6.2(11d) Version: 8.1(1) Version: 7.0(3)I6(1) Version: 6.0(2)U6(10) Version: 7.2(2)D1(2) Version: 7.0(3)IM3(2) Version: 6.0(2)A6(8) Version: 8.2(2) Version: 6.0(2)U6(1) Version: 7.3(2)N1(1c) Version: 7.0(3)I5(3b) Version: 8.3(2) Version: 7.3(5)N1(1) Version: 6.0(2)A6(2a) Version: 7.3(2)N1(1b) Version: 6.2(27) Version: 7.3(2)D1(3a) Version: 7.3(1)N1(1) Version: 6.0(2)U6(7) Version: 9.2(4) Version: 7.1(4)N1(1a) Version: 7.1(3)N1(4) Version: 7.0(3)IM3(2a) Version: 6.2(8b) Version: 6.0(2)A8(10) Version: 7.1(3)N1(2) Version: 6.2(13) Version: 6.0(2)A8(2) Version: 7.0(3)IC4(4) Version: 6.2(1) Version: 7.3(4)N1(1a) Version: 8.1(2) Version: 6.0(2)A6(3) Version: 6.0(2)U6(5b) Version: 7.0(3)F3(3c) Version: 7.3(3)D1(1) Version: 7.0(3)F3(1) Version: 6.0(2)U6(5) Version: 7.0(3)F3(5) Version: 7.1(2)N1(1) Version: 7.1(3)N1(3) Version: 8.2(3) Version: 6.0(2)A6(7) Version: 7.0(3)I7(2) Version: 6.2(5a) Version: 6.2(18) Version: 6.0(2)A6(5) Version: 7.0(3)IM3(2b) Version: 7.1(3)N1(1) Version: 6.0(2)U6(4a) Version: 7.0(3)I5(3) Version: 7.0(3)I7(3) Version: 6.0(2)A8(6) Version: 7.0(3)I6(2) Version: 8.3(1) Version: 6.2(3) Version: 6.2(22) Version: 7.1(1)N1(1) Version: 8.4(1) Version: 8.1(1b) Version: 7.3(0)N1(1b) Version: 7.2(2)D1(4) Version: 6.0(2)A8(5) Version: 7.3(0)DX(1) Version: 7.1(4)N1(1d) Version: 7.3(2)D1(1) Version: 7.3(2)N1(1) Version: 6.0(2)U6(8) Version: 7.1(1)N1(1a) Version: 7.0(3)IM3(3) Version: 9.3(1) Version: 6.0(2)U6(2) Version: 6.2(9b) Version: 7.1(3)N1(2a) Version: 7.3(0)N1(1a) Version: 6.0(2)A8(7) Version: 7.0(3)I7(6) Version: 7.3(2)D1(2) Version: 6.2(25) Version: 6.0(2)U6(3a) Version: 8.0(1) Version: 6.0(2)A8(11a) Version: 6.2(11e) Version: 7.1(3)N1(5) Version: 7.0(3)I4(8z) Version: 6.2(11) Version: 7.0(3)I4(9) Version: 6.2(16) Version: 6.2(19) Version: 8.2(4) Version: 6.2(2a) Version: 7.2(2)D1(3) Version: 7.1(0)N1(1b) Version: 7.0(3)I7(4) Version: 7.0(3)I7(7) Version: 6.2(5b) Version: 7.3(0)DY(1) Version: 6.0(2)A8(9) Version: 6.0(2)A8(1) Version: 7.1(5)N1(1) Version: 7.2(1)D1(1) Version: 6.2(15) Version: 6.0(2)A6(6) Version: 6.0(2)A8(10a) Version: 7.0(3)I5(1) Version: 9.3(1z) Version: 9.2(2) Version: 6.2(7) Version: 6.2(9c) Version: 7.0(3)F3(4) Version: 7.3(3)N1(1) Version: 6.2(6b) Version: 7.0(3)I4(8b) Version: 8.1(2a) Version: 7.3(2)D1(3) Version: 6.2(8) Version: 6.0(2)A8(3) Version: 6.2(11b) Version: 7.0(3)I4(6t) Version: 7.0(3)I5(3a) Version: 8.1(1a) Version: 6.2(13a) Version: 6.0(2)A8(8) Version: 7.0(3)I7(5) Version: 7.0(3)F3(3a) Version: 7.1(0)N1(1a) Version: 6.0(2)A8(4) Version: 6.0(2)A6(3a) Version: 6.0(2)A6(5a) Version: 7.0(3)F2(1) Version: 7.0(3)I4(8a) Version: 6.0(2)U6(9) Version: 7.0(3)F3(2) Version: 6.0(2)U6(2a) Version: 6.2(12) Version: 6.2(17) Version: 7.0(3)I4(4) Version: 6.2(23) Version: 6.2(13b) Version: 6.0(2)U6(3) Version: 6.2(10) Version: 6.2(6a) Version: 6.2(6) Version: 7.1(2)N1(1a) Version: 6.2(14) Version: 7.0(3)I7(1) Version: 6.2(14b) Version: 6.2(21) Version: 7.2(2)D1(1) Version: 7.0(3)F2(2) Version: 7.0(3)IA7(2) Version: 7.0(3)IA7(1) Version: 6.0(2)A8(7b) Version: 6.2(8a) Version: 6.2(11c) Version: 7.0(3)F1(1) Version: 6.0(2)A6(1a) Version: 7.1(0)N1(1) Version: 7.2(0)D1(1) Version: 6.0(2)A6(2) Version: 7.1(4)N1(1) Version: 6.0(2)A8(4a) Version: 6.2(20a) Version: 6.0(2)U6(4) Version: 8.4(1a) Version: 9.3(3) Version: 7.3(2)D1(1d) Version: 7.3(7)N1(1) Version: 6.2(24) Version: 6.2(31) Version: 7.0(3)I7(8) Version: 6.0(2)U6(10a) Version: 7.3(7)N1(1a) Version: 9.3(4) Version: 7.3(6)D1(1) Version: 6.2(26) Version: 8.2(6) Version: 6.2(33) Version: 9.3(5) Version: 8.4(2a) Version: 8.4(2b) Version: 7.3(8)N1(1) Version: 7.0(3)I7(9) Version: 7.3(7)N1(1b) Version: 6.2(24a) Version: 8.5(1) Version: 9.3(6) Version: 10.1(2) Version: 10.1(1) Version: 8.4(4) Version: 7.3(7)D1(1) Version: 8.4(2c) Version: 9.3(5w) Version: 8.2(7) Version: 7.3(9)N1(1) Version: 9.3(7) Version: 9.3(7k) Version: 7.0(3)I7(9w) Version: 10.2(1) Version: 7.3(8)N1(1a) Version: 7.3(8)D1(1) Version: 9.3(7a) Version: 8.2(7a) Version: 9.3(8) Version: 8.4(4a) Version: 8.4(2d) Version: 7.3(10)N1(1) Version: 8.4(5) Version: 7.0(3)I7(10) Version: 7.3(8)N1(1b) Version: 8.2(8) Version: 10.2(1q) Version: 10.2(2) Version: 9.3(9) Version: 7.3(9)D1(1) Version: 7.3(11)N1(1) Version: 10.2(3) Version: 8.4(6) Version: 8.4(2e) Version: 9.3(10) Version: 7.3(11)N1(1a) Version: 10.2(2a) Version: 7.3(12)N1(1) Version: 9.2(1a) Version: 8.2(9) Version: 10.3(1) Version: 10.2(4) Version: 7.3(13)N1(1) Version: 8.4(7) Version: 10.3(2) Version: 8.4(6a) Version: 9.3(11) Version: 10.3(3) Version: 10.2(5) Version: 9.4(1) Version: 9.3(2a) Version: 8.4(2f) Version: 8.2(10) Version: 9.3(12) Version: 10.4(1) Version: 8.4(8) Version: 10.3(99w) Version: 7.3(14)N1(1) Version: 10.2(6) Version: 10.3(3w) Version: 10.3(99x) Version: 10.3(3o) Version: 8.4(9) Version: 10.3(4) Version: 10.3(3p) Version: 10.3(4a) Version: 9.4(1a) Version: 10.4(2) Version: 10.3(3q) Version: 9.3(13) Version: 8.2(11) Version: 9.4(2) Version: 10.3(5) Version: 10.2(7) Version: 10.3(3x) Version: 10.3(4g) Version: 10.2(8) Version: 10.3(3r) |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A6\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(7b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(10a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)A8\\(11b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(5c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)U6\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(5b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(9a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(9b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(13a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(13b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(17\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(27\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(29\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(24a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.2\\(33\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)F3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(8z\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I4\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I5\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I6\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I6\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(5a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)I7\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)N1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)N1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)D1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)DX\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)D1\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.1\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.2\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(2c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(6a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(2f\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.4\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(13\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)N1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(8\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(9\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:8.5\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(10\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(8\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(1q\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(9\\)D1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(11\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(12\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(99w\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(99x\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(13\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.3\\(14\\)N1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.4\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.4\\(2\\):*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "nx-os", "vendor": "cisco", "versions": [ { "status": "affected", "version": "6.0\\(2\\)a6\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(1a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(2a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(3\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(3a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(4\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(4a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(5a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(5b\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(6\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(7\\)" }, { "status": "affected", "version": "6.0\\(2\\)A6\\(8\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(3\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(4\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(4a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(5\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(6\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(7\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(7a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(7b\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(8\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(9\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(10a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(10\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(11\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(11a\\)" }, { "status": "affected", "version": "6.0\\(2\\)A8\\(11b\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(1\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(2\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(3\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(4\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(5\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(6\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(7\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(8\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(1a\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(2a\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(3a\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(4a\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(5a\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(5b\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(5c\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(9\\)" }, { "status": "affected", "version": "6.0\\(2\\)U6\\(10\\)" }, { "status": "affected", "version": "6.2\\(2\\)" }, { "status": "affected", "version": "6.2\\(2a\\)" }, { "status": "affected", "version": "6.2\\(6\\)" }, { "status": "affected", "version": "6.2\\(6b\\)" }, { "status": "affected", "version": "6.2\\(8\\)" }, { "status": "affected", "version": "6.2\\(8a\\)" }, { "status": "affected", "version": "6.2\\(8b\\)" }, { "status": "affected", "version": "6.2\\(10\\)" }, { "status": "affected", "version": "6.2\\(12\\)" }, { "status": "affected", "version": "6.2\\(18\\)" }, { "status": "affected", "version": "6.2\\(16\\)" }, { "status": "affected", "version": "6.2\\(14\\)" }, { "status": "affected", "version": "6.2\\(6a\\)" }, { "status": "affected", "version": "6.2\\(20\\)" }, { "status": "affected", "version": "6.2\\(1\\)" }, { "status": "affected", "version": "6.2\\(5b\\)" }, { "status": "affected", "version": "6.2\\(9\\)" }, { "status": "affected", "version": "6.2\\(9a\\)" }, { "status": "affected", "version": "6.2\\(9b\\)" }, { "status": "affected", "version": "6.2\\(11\\)" }, { "status": "affected", "version": "6.2\\(13a\\)" }, { "status": "affected", "version": "6.2\\(13b\\)" }, { "status": "affected", "version": "6.2\\(17\\)" }, { "status": "affected", "version": "6.2\\(20a\\)" }, { "status": "affected", "version": "6.2\\(22\\)" }, { "status": "affected", "version": "6.2\\(27\\)" }, { "status": "affected", "version": "6.2\\(29\\)" }, { "status": "affected", "version": "6.2\\(24\\)" }, { "status": "affected", "version": "6.2\\(24a\\)" }, { "status": "affected", "version": "6.2\\(33\\)" }, { "status": "affected", "version": "7.0\\(3\\)F1\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)F2\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)F2\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)F3\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)F3\\(3\\)" }, { "status": "affected", "version": "7.0\\(3\\)F3\\(3a\\)" }, { "status": "affected", "version": "7.0\\(3\\)F3\\(4\\)" }, { "status": "affected", "version": "7.0\\(3\\)F3\\(3c\\)" }, { "status": "affected", "version": "7.0\\(3\\)F3\\(5\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(3\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(4\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(5\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(6\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(7\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(8\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(8a\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(8b\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(8z\\)" }, { "status": "affected", "version": "7.0\\(3\\)I4\\(9\\)" }, { "status": "affected", "version": "7.0\\(3\\)I5\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)I5\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)I6\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)I6\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(1\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(2\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(3\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(4\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(5\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(5a\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(6\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(7\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(8\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(9\\)" }, { "status": "affected", "version": "7.0\\(3\\)I7\\(10\\)" }, { "status": "affected", "version": "7.1\\(0\\)N1\\(1a\\)" }, { "status": "affected", "version": "7.1\\(0\\)N1\\(1b\\)" }, { "status": "affected", "version": "7.1\\(0\\)N1\\(1\\)" }, { "status": "affected", "version": "7.1\\(1\\)N1\\(1\\)" }, { "status": "affected", "version": "7.1\\(2\\)N1\\(1\\)" }, { "status": "affected", "version": "7.1\\(3\\)N1\\(1\\)" }, { "status": "affected", "version": "7.1\\(3\\)N1\\(2\\)" }, { "status": "affected", "version": "7.1\\(4\\)N1\\(1\\)" }, { "status": "affected", "version": "7.1\\(5\\)N1\\(1\\)" }, { "status": "affected", "version": "7.1\\(5\\)N1\\(1b\\)" }, { "status": "affected", "version": "7.2\\(0\\)D1\\(1\\)" }, { "status": "affected", "version": "7.2\\(1\\)D1\\(1\\)" }, { "status": "affected", "version": "7.2\\(2\\)D1\\(2\\)" }, { "status": "affected", "version": "7.2\\(2\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(0\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(0\\)DX\\(1\\)" }, { "status": "affected", "version": "7.3\\(0\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(1\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(1\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(2\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(2\\)D1\\(2\\)" }, { "status": "affected", "version": "7.3\\(2\\)D1\\(3\\)" }, { "status": "affected", "version": "7.3\\(2\\)D1\\(3a\\)" }, { "status": "affected", "version": "7.3\\(2\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(3\\)N1\\(1\\)" }, { "status": "affected", "version": "8.0\\(1\\)" }, { "status": "affected", "version": "8.1\\(1\\)" }, { "status": "affected", "version": "8.1\\(2\\)" }, { "status": "affected", "version": "8.1\\(2a\\)" }, { "status": "affected", "version": "8.1\\(1b\\)" }, { "status": "affected", "version": "8.2\\(1\\)" }, { "status": "affected", "version": "8.2\\(2\\)" }, { "status": "affected", "version": "8.2\\(3\\)" }, { "status": "affected", "version": "8.2\\(4\\)" }, { "status": "affected", "version": "8.2\\(5\\)" }, { "status": "affected", "version": "8.2\\(6\\)" }, { "status": "affected", "version": "8.2\\(7\\)" }, { "status": "affected", "version": "8.2\\(7a\\)" }, { "status": "affected", "version": "8.2\\(8\\)" }, { "status": "affected", "version": "8.2\\(9\\)" }, { "status": "affected", "version": "8.2\\(10\\)" }, { "status": "affected", "version": "8.2\\(11\\)" }, { "status": "affected", "version": "8.3\\(1\\)" }, { "status": "affected", "version": "8.3\\(2\\)" }, { "status": "affected", "version": "9.2\\(1\\)" }, { "status": "affected", "version": "9.2\\(2\\)" }, { "status": "affected", "version": "9.2\\(2t\\)" }, { "status": "affected", "version": "9.2\\(3\\)" }, { "status": "affected", "version": "9.2\\(4\\)" }, { "status": "affected", "version": "9.2\\(2v\\)" }, { "status": "affected", "version": "7.3\\(4\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(3\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(4\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(5\\)N1\\(1\\)" }, { "status": "affected", "version": "8.4\\(1\\)" }, { "status": "affected", "version": "8.4\\(2\\)" }, { "status": "affected", "version": "8.4\\(3\\)" }, { "status": "affected", "version": "8.4\\(2b\\)" }, { "status": "affected", "version": "8.4\\(4\\)" }, { "status": "affected", "version": "8.4\\(2c\\)" }, { "status": "affected", "version": "8.4\\(4a\\)" }, { "status": "affected", "version": "8.4\\(5\\)" }, { "status": "affected", "version": "8.4\\(6\\)" }, { "status": "affected", "version": "8.4\\(6a\\)" }, { "status": "affected", "version": "8.4\\(7\\)" }, { "status": "affected", "version": "8.4\\(2f\\)" }, { "status": "affected", "version": "8.4\\(8\\)" }, { "status": "affected", "version": "8.4\\(9\\)" }, { "status": "affected", "version": "9.3\\(1\\)" }, { "status": "affected", "version": "9.3\\(2\\)" }, { "status": "affected", "version": "9.3\\(3\\)" }, { "status": "affected", "version": "9.3\\(4\\)" }, { "status": "affected", "version": "9.3\\(5\\)" }, { "status": "affected", "version": "9.3\\(6\\)" }, { "status": "affected", "version": "9.3\\(7\\)" }, { "status": "affected", "version": "9.3\\(7a\\)" }, { "status": "affected", "version": "9.3\\(8\\)" }, { "status": "affected", "version": "9.3\\(9\\)" }, { "status": "affected", "version": "9.3\\(10\\)" }, { "status": "affected", "version": "9.3\\(11\\)" }, { "status": "affected", "version": "9.3\\(2a\\)" }, { "status": "affected", "version": "9.3\\(12\\)" }, { "status": "affected", "version": "9.3\\(13\\)" }, { "status": "affected", "version": "7.3\\(6\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(5\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(7\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(7\\)N1\\(1a\\)" }, { "status": "affected", "version": "7.3\\(7\\)N1\\(1b\\)" }, { "status": "affected", "version": "7.3\\(6\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(8\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(7\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(9\\)N1\\(1\\)" }, { "status": "affected", "version": "10.1\\(1\\)" }, { "status": "affected", "version": "8.5\\(1\\)" }, { "status": "affected", "version": "7.3\\(10\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(8\\)D1\\(1\\)" }, { "status": "affected", "version": "10.2\\(1\\)" }, { "status": "affected", "version": "10.2\\(1q\\)" }, { "status": "affected", "version": "10.2\\(2\\)" }, { "status": "affected", "version": "10.2\\(3\\)" }, { "status": "affected", "version": "10.2\\(3t\\)" }, { "status": "affected", "version": "7.3\\(9\\)D1\\(1\\)" }, { "status": "affected", "version": "7.3\\(11\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(12\\)N1\\(1\\)" }, { "status": "affected", "version": "10.3\\(1\\)" }, { "status": "affected", "version": "10.3\\(3\\)" }, { "status": "affected", "version": "10.3\\(99w\\)" }, { "status": "affected", "version": "10.3\\(99x\\)" }, { "status": "affected", "version": "10.3\\(4a\\)" }, { "status": "affected", "version": "10.3\\(5\\)" }, { "status": "affected", "version": "7.3\\(13\\)N1\\(1\\)" }, { "status": "affected", "version": "7.3\\(14\\)N1\\(1\\)" }, { "status": "affected", "version": "10.4\\(1\\)" }, { "status": "affected", "version": "10.4\\(2\\)" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20399", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-02T15:08:04.278010Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-07-02", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-20399" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-28T19:43:12.886Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-07-02T00:00:00+00:00", "value": "CVE-2024-20399 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:42.407Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-nxos-cmd-injection-xD9OhyOP", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP" }, { "tags": [ "x_transferred" ], "url": "https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco NX-OS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "8.2(5)" }, { "status": "affected", "version": "7.3(6)N1(1a)" }, { "status": "affected", "version": "7.3(5)D1(1)" }, { "status": "affected", "version": "8.4(2)" }, { "status": "affected", "version": "7.3(6)N1(1)" }, { "status": "affected", "version": "6.2(2)" }, { "status": "affected", "version": "8.4(3)" }, { "status": "affected", "version": "9.2(3)" }, { "status": "affected", "version": "7.0(3)I5(2)" }, { "status": "affected", "version": "8.2(1)" }, { "status": "affected", "version": "6.0(2)A8(7a)" }, { "status": "affected", "version": "7.0(3)I4(5)" }, { "status": "affected", "version": "6.0(2)A6(1)" }, { "status": "affected", "version": "7.3(1)D1(1)" }, { "status": "affected", "version": "6.2(14a)" }, { "status": "affected", "version": "7.0(3)I4(6)" }, { "status": "affected", "version": "7.3(4)N1(1)" }, { "status": "affected", "version": "7.0(3)I4(3)" }, { "status": "affected", "version": "9.2(2v)" }, { "status": "affected", "version": "6.0(2)A6(5b)" }, { "status": "affected", "version": "7.3(0)D1(1)" }, { "status": "affected", "version": "6.2(17a)" }, { "status": "affected", "version": "7.0(3)I4(7)" }, { "status": "affected", "version": "6.0(2)U6(1a)" }, { "status": "affected", "version": "7.1(5)N1(1b)" }, { "status": "affected", "version": "7.0(3)I4(1)" }, { "status": "affected", "version": "7.0(3)I4(8)" }, { "status": "affected", "version": "7.0(3)I4(2)" }, { "status": "affected", "version": "7.1(4)N1(1c)" }, { "status": "affected", "version": "7.0(3)IM3(1)" }, { "status": "affected", "version": "6.0(2)U6(5a)" }, { "status": "affected", "version": "6.0(2)A8(11)" }, { "status": "affected", "version": "6.0(2)A6(4a)" }, { "status": "affected", "version": "6.2(9)" }, { "status": "affected", "version": "6.2(5)" }, { "status": "affected", "version": "7.3(4)D1(1)" }, { "status": "affected", "version": "6.2(20)" }, { "status": "affected", "version": "9.2(1)" }, { "status": "affected", "version": "9.2(2t)" }, { "status": "affected", "version": "9.2(3y)" }, { "status": "affected", "version": "7.0(3)I4(1t)" }, { "status": "affected", "version": "6.0(2)U6(5c)" }, { "status": "affected", "version": "6.0(2)A6(4)" }, { "status": "affected", "version": "7.0(3)I7(6z)" }, { "status": "affected", "version": "9.3(2)" }, { "status": "affected", "version": "7.3(1)DY(1)" }, { "status": "affected", "version": "7.0(3)F3(3)" }, { "status": "affected", "version": "6.0(2)U6(6)" }, { "status": "affected", "version": "6.2(29)" }, { "status": "affected", "version": "7.0(3)I7(3z)" }, { "status": "affected", "version": "7.0(3)IM7(2)" }, { "status": "affected", "version": "6.0(2)A8(11b)" }, { "status": "affected", "version": "6.2(9a)" }, { "status": "affected", "version": "7.3(0)N1(1)" }, { "status": "affected", "version": "7.0(3)I7(5a)" }, { "status": "affected", "version": "6.2(11d)" }, { "status": "affected", "version": "8.1(1)" }, { "status": "affected", "version": "7.0(3)I6(1)" }, { "status": "affected", "version": "6.0(2)U6(10)" }, { "status": "affected", "version": "7.2(2)D1(2)" }, { "status": "affected", "version": "7.0(3)IM3(2)" }, { "status": "affected", "version": "6.0(2)A6(8)" }, { "status": "affected", "version": "8.2(2)" }, { "status": "affected", "version": "6.0(2)U6(1)" }, { "status": "affected", "version": "7.3(2)N1(1c)" }, { "status": "affected", "version": "7.0(3)I5(3b)" }, { "status": "affected", "version": "8.3(2)" }, { "status": "affected", "version": "7.3(5)N1(1)" }, { "status": "affected", "version": "6.0(2)A6(2a)" }, { "status": "affected", "version": "7.3(2)N1(1b)" }, { "status": "affected", "version": "6.2(27)" }, { "status": "affected", "version": "7.3(2)D1(3a)" }, { "status": "affected", "version": "7.3(1)N1(1)" }, { "status": "affected", "version": "6.0(2)U6(7)" }, { "status": "affected", "version": "9.2(4)" }, { "status": "affected", "version": "7.1(4)N1(1a)" }, { "status": "affected", "version": "7.1(3)N1(4)" }, { "status": "affected", "version": "7.0(3)IM3(2a)" }, { "status": "affected", "version": "6.2(8b)" }, { "status": "affected", "version": "6.0(2)A8(10)" }, { "status": "affected", "version": "7.1(3)N1(2)" }, { "status": "affected", "version": "6.2(13)" }, { "status": "affected", "version": "6.0(2)A8(2)" }, { "status": "affected", "version": "7.0(3)IC4(4)" }, { "status": "affected", "version": "6.2(1)" }, { "status": "affected", "version": "7.3(4)N1(1a)" }, { "status": "affected", "version": "8.1(2)" }, { "status": "affected", "version": "6.0(2)A6(3)" }, { "status": "affected", "version": "6.0(2)U6(5b)" }, { "status": "affected", "version": "7.0(3)F3(3c)" }, { "status": "affected", "version": "7.3(3)D1(1)" }, { "status": "affected", "version": "7.0(3)F3(1)" }, { "status": "affected", "version": "6.0(2)U6(5)" }, { "status": "affected", "version": "7.0(3)F3(5)" }, { "status": "affected", "version": "7.1(2)N1(1)" }, { "status": "affected", "version": "7.1(3)N1(3)" }, { "status": "affected", "version": "8.2(3)" }, { "status": "affected", "version": "6.0(2)A6(7)" }, { "status": "affected", "version": "7.0(3)I7(2)" }, { "status": "affected", "version": "6.2(5a)" }, { "status": "affected", "version": "6.2(18)" }, { "status": "affected", "version": "6.0(2)A6(5)" }, { "status": "affected", "version": "7.0(3)IM3(2b)" }, { "status": "affected", "version": "7.1(3)N1(1)" }, { "status": "affected", "version": "6.0(2)U6(4a)" }, { "status": "affected", "version": "7.0(3)I5(3)" }, { "status": "affected", "version": "7.0(3)I7(3)" }, { "status": "affected", "version": "6.0(2)A8(6)" }, { "status": "affected", "version": "7.0(3)I6(2)" }, { "status": "affected", "version": "8.3(1)" }, { "status": "affected", "version": "6.2(3)" }, { "status": "affected", "version": "6.2(22)" }, { "status": "affected", "version": "7.1(1)N1(1)" }, { "status": "affected", "version": "8.4(1)" }, { "status": "affected", "version": "8.1(1b)" }, { "status": "affected", "version": "7.3(0)N1(1b)" }, { "status": "affected", "version": "7.2(2)D1(4)" }, { "status": "affected", "version": "6.0(2)A8(5)" }, { "status": "affected", "version": "7.3(0)DX(1)" }, { "status": "affected", "version": "7.1(4)N1(1d)" }, { "status": "affected", "version": "7.3(2)D1(1)" }, { "status": "affected", "version": "7.3(2)N1(1)" }, { "status": "affected", "version": "6.0(2)U6(8)" }, { "status": "affected", "version": "7.1(1)N1(1a)" }, { "status": "affected", "version": "7.0(3)IM3(3)" }, { "status": "affected", "version": "9.3(1)" }, { "status": "affected", "version": "6.0(2)U6(2)" }, { "status": "affected", "version": "6.2(9b)" }, { "status": "affected", "version": "7.1(3)N1(2a)" }, { "status": "affected", "version": "7.3(0)N1(1a)" }, { "status": "affected", "version": "6.0(2)A8(7)" }, { "status": "affected", "version": "7.0(3)I7(6)" }, { "status": "affected", "version": "7.3(2)D1(2)" }, { "status": "affected", "version": "6.2(25)" }, { "status": "affected", "version": "6.0(2)U6(3a)" }, { "status": "affected", "version": "8.0(1)" }, { "status": "affected", "version": "6.0(2)A8(11a)" }, { "status": "affected", "version": "6.2(11e)" }, { "status": "affected", "version": "7.1(3)N1(5)" }, { "status": "affected", "version": "7.0(3)I4(8z)" }, { "status": "affected", "version": "6.2(11)" }, { "status": "affected", "version": "7.0(3)I4(9)" }, { "status": "affected", "version": "6.2(16)" }, { "status": "affected", "version": "6.2(19)" }, { "status": "affected", "version": "8.2(4)" }, { "status": "affected", "version": "6.2(2a)" }, { "status": "affected", "version": "7.2(2)D1(3)" }, { "status": "affected", "version": "7.1(0)N1(1b)" }, { "status": "affected", "version": "7.0(3)I7(4)" }, { "status": "affected", "version": "7.0(3)I7(7)" }, { "status": "affected", "version": "6.2(5b)" }, { "status": "affected", "version": "7.3(0)DY(1)" }, { "status": "affected", "version": "6.0(2)A8(9)" }, { "status": "affected", "version": "6.0(2)A8(1)" }, { "status": "affected", "version": "7.1(5)N1(1)" }, { "status": "affected", "version": "7.2(1)D1(1)" }, { "status": "affected", "version": "6.2(15)" }, { "status": "affected", "version": "6.0(2)A6(6)" }, { "status": "affected", "version": "6.0(2)A8(10a)" }, { "status": "affected", "version": "7.0(3)I5(1)" }, { "status": "affected", "version": "9.3(1z)" }, { "status": "affected", "version": "9.2(2)" }, { "status": "affected", "version": "6.2(7)" }, { "status": "affected", "version": "6.2(9c)" }, { "status": "affected", "version": "7.0(3)F3(4)" }, { "status": "affected", "version": "7.3(3)N1(1)" }, { "status": "affected", "version": "6.2(6b)" }, { "status": "affected", "version": "7.0(3)I4(8b)" }, { "status": "affected", "version": "8.1(2a)" }, { "status": "affected", "version": "7.3(2)D1(3)" }, { "status": "affected", "version": "6.2(8)" }, { "status": "affected", "version": "6.0(2)A8(3)" }, { "status": "affected", "version": "6.2(11b)" }, { "status": "affected", "version": "7.0(3)I4(6t)" }, { "status": "affected", "version": "7.0(3)I5(3a)" }, { "status": "affected", "version": "8.1(1a)" }, { "status": "affected", "version": "6.2(13a)" }, { "status": "affected", "version": "6.0(2)A8(8)" }, { "status": "affected", "version": "7.0(3)I7(5)" }, { "status": "affected", "version": "7.0(3)F3(3a)" }, { "status": "affected", "version": "7.1(0)N1(1a)" }, { "status": "affected", "version": "6.0(2)A8(4)" }, { "status": "affected", "version": "6.0(2)A6(3a)" }, { "status": "affected", "version": "6.0(2)A6(5a)" }, { "status": "affected", "version": "7.0(3)F2(1)" }, { "status": "affected", "version": "7.0(3)I4(8a)" }, { "status": "affected", "version": "6.0(2)U6(9)" }, { "status": "affected", "version": "7.0(3)F3(2)" }, { "status": "affected", "version": "6.0(2)U6(2a)" }, { "status": "affected", "version": "6.2(12)" }, { "status": "affected", "version": "6.2(17)" }, { "status": "affected", "version": "7.0(3)I4(4)" }, { "status": "affected", "version": "6.2(23)" }, { "status": "affected", "version": "6.2(13b)" }, { "status": "affected", "version": "6.0(2)U6(3)" }, { "status": "affected", "version": "6.2(10)" }, { "status": "affected", "version": "6.2(6a)" }, { "status": "affected", "version": "6.2(6)" }, { "status": "affected", "version": "7.1(2)N1(1a)" }, { "status": "affected", "version": "6.2(14)" }, { "status": "affected", "version": "7.0(3)I7(1)" }, { "status": "affected", "version": "6.2(14b)" }, { "status": "affected", "version": "6.2(21)" }, { "status": "affected", "version": "7.2(2)D1(1)" }, { "status": "affected", "version": "7.0(3)F2(2)" }, { "status": "affected", "version": "7.0(3)IA7(2)" }, { "status": "affected", "version": "7.0(3)IA7(1)" }, { "status": "affected", "version": "6.0(2)A8(7b)" }, { "status": "affected", "version": "6.2(8a)" }, { "status": "affected", "version": "6.2(11c)" }, { "status": "affected", "version": "7.0(3)F1(1)" }, { "status": "affected", "version": "6.0(2)A6(1a)" }, { "status": "affected", "version": "7.1(0)N1(1)" }, { "status": "affected", "version": "7.2(0)D1(1)" }, { "status": "affected", "version": "6.0(2)A6(2)" }, { "status": "affected", "version": "7.1(4)N1(1)" }, { "status": "affected", "version": "6.0(2)A8(4a)" }, { "status": "affected", "version": "6.2(20a)" }, { "status": "affected", "version": "6.0(2)U6(4)" }, { "status": "affected", "version": "8.4(1a)" }, { "status": "affected", "version": "9.3(3)" }, { "status": "affected", "version": "7.3(2)D1(1d)" }, { "status": "affected", "version": "7.3(7)N1(1)" }, { "status": "affected", "version": "6.2(24)" }, { "status": "affected", "version": "6.2(31)" }, { "status": "affected", "version": "7.0(3)I7(8)" }, { "status": "affected", "version": "6.0(2)U6(10a)" }, { "status": "affected", "version": "7.3(7)N1(1a)" }, { "status": "affected", "version": "9.3(4)" }, { "status": "affected", "version": "7.3(6)D1(1)" }, { "status": "affected", "version": "6.2(26)" }, { "status": "affected", "version": "8.2(6)" }, { "status": "affected", "version": "6.2(33)" }, { "status": "affected", "version": "9.3(5)" }, { "status": "affected", "version": "8.4(2a)" }, { "status": "affected", "version": "8.4(2b)" }, { "status": "affected", "version": "7.3(8)N1(1)" }, { "status": "affected", "version": "7.0(3)I7(9)" }, { "status": "affected", "version": "7.3(7)N1(1b)" }, { "status": "affected", "version": "6.2(24a)" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "9.3(6)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "8.4(4)" }, { "status": "affected", "version": "7.3(7)D1(1)" }, { "status": "affected", "version": "8.4(2c)" }, { "status": "affected", "version": "9.3(5w)" }, { "status": "affected", "version": "8.2(7)" }, { "status": "affected", "version": "7.3(9)N1(1)" }, { "status": "affected", "version": "9.3(7)" }, { "status": "affected", "version": "9.3(7k)" }, { "status": "affected", "version": "7.0(3)I7(9w)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "7.3(8)N1(1a)" }, { "status": "affected", "version": "7.3(8)D1(1)" }, { "status": "affected", "version": "9.3(7a)" }, { "status": "affected", "version": "8.2(7a)" }, { "status": "affected", "version": "9.3(8)" }, { "status": "affected", "version": "8.4(4a)" }, { "status": "affected", "version": "8.4(2d)" }, { "status": "affected", "version": "7.3(10)N1(1)" }, { "status": "affected", "version": "8.4(5)" }, { "status": "affected", "version": "7.0(3)I7(10)" }, { "status": "affected", "version": "7.3(8)N1(1b)" }, { "status": "affected", "version": "8.2(8)" }, { "status": "affected", "version": "10.2(1q)" }, { "status": "affected", "version": "10.2(2)" }, { "status": "affected", "version": "9.3(9)" }, { "status": "affected", "version": "7.3(9)D1(1)" }, { "status": "affected", "version": "7.3(11)N1(1)" }, { "status": "affected", "version": "10.2(3)" }, { "status": "affected", "version": "8.4(6)" }, { "status": "affected", "version": "8.4(2e)" }, { "status": "affected", "version": "9.3(10)" }, { "status": "affected", "version": "7.3(11)N1(1a)" }, { "status": "affected", "version": "10.2(2a)" }, { "status": "affected", "version": "7.3(12)N1(1)" }, { "status": "affected", "version": "9.2(1a)" }, { "status": "affected", "version": "8.2(9)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.2(4)" }, { "status": "affected", "version": "7.3(13)N1(1)" }, { "status": "affected", "version": "8.4(7)" }, { "status": "affected", "version": "10.3(2)" }, { "status": "affected", "version": "8.4(6a)" }, { "status": "affected", "version": "9.3(11)" }, { "status": "affected", "version": "10.3(3)" }, { "status": "affected", "version": "10.2(5)" }, { "status": "affected", "version": "9.4(1)" }, { "status": "affected", "version": "9.3(2a)" }, { "status": "affected", "version": "8.4(2f)" }, { "status": "affected", "version": "8.2(10)" }, { "status": "affected", "version": "9.3(12)" }, { "status": "affected", "version": "10.4(1)" }, { "status": "affected", "version": "8.4(8)" }, { "status": "affected", "version": "10.3(99w)" }, { "status": "affected", "version": "7.3(14)N1(1)" }, { "status": "affected", "version": "10.2(6)" }, { "status": "affected", "version": "10.3(3w)" }, { "status": "affected", "version": "10.3(99x)" }, { "status": "affected", "version": "10.3(3o)" }, { "status": "affected", "version": "8.4(9)" }, { "status": "affected", "version": "10.3(4)" }, { "status": "affected", "version": "10.3(3p)" }, { "status": "affected", "version": "10.3(4a)" }, { "status": "affected", "version": "9.4(1a)" }, { "status": "affected", "version": "10.4(2)" }, { "status": "affected", "version": "10.3(3q)" }, { "status": "affected", "version": "9.3(13)" }, { "status": "affected", "version": "8.2(11)" }, { "status": "affected", "version": "9.4(2)" }, { "status": "affected", "version": "10.3(5)" }, { "status": "affected", "version": "10.2(7)" }, { "status": "affected", "version": "10.3(3x)" }, { "status": "affected", "version": "10.3(4g)" }, { "status": "affected", "version": "10.2(8)" }, { "status": "affected", "version": "10.3(3r)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.\r\nNote: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:\r\n\r\nNexus 3000 Series Switches\r\nNexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later\r\nNexus 9000 Series Switches in standalone NX-OS mode" } ], "exploits": [ { "lang": "en", "value": "In May 2024, the Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in the wild." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T18:07:44.853Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-nxos-cmd-injection-xD9OhyOP", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP" } ], "source": { "advisory": "cisco-sa-nxos-cmd-injection-xD9OhyOP", "defects": [ "CSCwj94682" ], "discovery": "EXTERNAL" }, "title": "Cisco NX-OS Software CLI Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20399", "datePublished": "2024-07-01T16:11:44.028Z", "dateReserved": "2023-11-08T15:08:07.660Z", "dateUpdated": "2025-07-28T19:43:12.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1967 (GCVE-0-2019-1967)
Vulnerability from cvelistv5
Published
2019-08-29 21:45
Modified
2024-11-19 18:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the attacker to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco NX-OS Software |
Version: unspecified < 8.3(2) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:51.286Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190828 Cisco NX-OS Software Network Time Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1967", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:23:18.708362Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T18:58:07.518Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco NX-OS Software", "vendor": "Cisco", "versions": [ { "lessThan": "8.3(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-08-28T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the attacker to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-29T21:45:15", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190828 Cisco NX-OS Software Network Time Protocol Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos" } ], "source": { "advisory": "cisco-sa-20190828-nxos-ntp-dos", "defect": [ [ "CSCvm35740", "CSCvm51138", "CSCvm51139", "CSCvm51142" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software Network Time Protocol Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-08-28T16:00:00-0700", "ID": "CVE-2019-1967", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software Network Time Protocol Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco NX-OS Software", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(2)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the attacker to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "8.6", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "20190828 Cisco NX-OS Software Network Time Protocol Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos" } ] }, "source": { "advisory": "cisco-sa-20190828-nxos-ntp-dos", "defect": [ [ "CSCvm35740", "CSCvm51138", "CSCvm51139", "CSCvm51142" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1967", "datePublished": "2019-08-29T21:45:15.166469Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T18:58:07.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20050 (GCVE-0-2023-20050)
Vulnerability from cvelistv5
Published
2023-02-23 00:00
Modified
2024-10-25 16:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco NX-OS Software |
Version: n/a |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:57:35.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20230222 Cisco NX-OS Software CLI Command Injection Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cli-cmdinject-euQVK9u" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20050", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T14:36:39.198780Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-25T16:03:54.154Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco NX-OS Software ", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2023-02-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. " } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-23T00:00:00", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20230222 Cisco NX-OS Software CLI Command Injection Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cli-cmdinject-euQVK9u" } ], "source": { "advisory": "cisco-sa-nxos-cli-cmdinject-euQVK9u", "defect": [ [ "CSCwd00653", "CSCwd18009", "CSCwd18011", "CSCwd18012", "CSCwd18013" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software CLI Command Injection Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20050", "datePublished": "2023-02-23T00:00:00", "dateReserved": "2022-10-27T00:00:00", "dateUpdated": "2024-10-25T16:03:54.154Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-20294 (GCVE-0-2024-20294)
Vulnerability from cvelistv5
Published
2024-02-28 16:16
Modified
2024-08-01 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-805 - Buffer Access with Incorrect Length Value
Summary
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device and having an authenticated user retrieve LLDP statistics from the affected device through CLI show commands or Simple Network Management Protocol (SNMP) requests. A successful exploit could allow the attacker to cause the LLDP service to crash and stop running on the affected device. In certain situations, the LLDP crash may result in a reload of the affected device.
Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).
References
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Cisco | Cisco NX-OS Software |
Version: 6.0(2)A3(1) Version: 6.0(2)A3(2) Version: 6.0(2)A3(4) Version: 6.0(2)A4(1) Version: 6.0(2)A4(2) Version: 6.0(2)A4(3) Version: 6.0(2)A4(4) Version: 6.0(2)A4(5) Version: 6.0(2)A4(6) Version: 6.0(2)A6(1) Version: 6.0(2)A6(1a) Version: 6.0(2)A6(2) Version: 6.0(2)A6(2a) Version: 6.0(2)A6(3) Version: 6.0(2)A6(3a) Version: 6.0(2)A6(4) Version: 6.0(2)A6(4a) Version: 6.0(2)A6(5) Version: 6.0(2)A6(5a) Version: 6.0(2)A6(5b) Version: 6.0(2)A6(6) Version: 6.0(2)A6(7) Version: 6.0(2)A6(8) Version: 6.0(2)A7(1) Version: 6.0(2)A7(1a) Version: 6.0(2)A7(2) Version: 6.0(2)A7(2a) Version: 6.0(2)A8(1) Version: 6.0(2)A8(2) Version: 6.0(2)A8(3) Version: 6.0(2)A8(4) Version: 6.0(2)A8(4a) Version: 6.0(2)A8(5) Version: 6.0(2)A8(6) Version: 6.0(2)A8(7) Version: 6.0(2)A8(7a) Version: 6.0(2)A8(7b) Version: 6.0(2)A8(8) Version: 6.0(2)A8(9) Version: 6.0(2)A8(10a) Version: 6.0(2)A8(10) Version: 6.0(2)A8(11) Version: 6.0(2)A8(11a) Version: 6.0(2)A8(11b) Version: 6.0(2)U2(1) Version: 6.0(2)U2(2) Version: 6.0(2)U2(3) Version: 6.0(2)U2(4) Version: 6.0(2)U2(5) Version: 6.0(2)U2(6) Version: 6.0(2)U3(1) Version: 6.0(2)U3(2) Version: 6.0(2)U3(3) Version: 6.0(2)U3(4) Version: 6.0(2)U3(5) Version: 6.0(2)U3(6) Version: 6.0(2)U3(7) Version: 6.0(2)U3(8) Version: 6.0(2)U3(9) Version: 6.0(2)U4(1) Version: 6.0(2)U4(2) Version: 6.0(2)U4(3) Version: 6.0(2)U4(4) Version: 6.0(2)U5(1) Version: 6.0(2)U5(2) Version: 6.0(2)U5(3) Version: 6.0(2)U5(4) Version: 6.0(2)U6(1) Version: 6.0(2)U6(2) Version: 6.0(2)U6(3) Version: 6.0(2)U6(4) Version: 6.0(2)U6(5) Version: 6.0(2)U6(6) Version: 6.0(2)U6(7) Version: 6.0(2)U6(8) Version: 6.0(2)U6(1a) Version: 6.0(2)U6(2a) Version: 6.0(2)U6(3a) Version: 6.0(2)U6(4a) Version: 6.0(2)U6(5a) Version: 6.0(2)U6(5b) Version: 6.0(2)U6(5c) Version: 6.0(2)U6(9) Version: 6.0(2)U6(10) Version: 6.2(2) Version: 6.2(2a) Version: 6.2(6) Version: 6.2(6b) Version: 6.2(8) Version: 6.2(8a) Version: 6.2(8b) Version: 6.2(10) Version: 6.2(12) Version: 6.2(18) Version: 6.2(16) Version: 6.2(14) Version: 6.2(6a) Version: 6.2(20) Version: 6.2(1) Version: 6.2(3) Version: 6.2(5) Version: 6.2(5a) Version: 6.2(5b) Version: 6.2(7) Version: 6.2(9) Version: 6.2(9a) Version: 6.2(9b) Version: 6.2(9c) Version: 6.2(11) Version: 6.2(11b) Version: 6.2(11c) Version: 6.2(11d) Version: 6.2(11e) Version: 6.2(13) Version: 6.2(13a) Version: 6.2(13b) Version: 6.2(15) Version: 6.2(17) Version: 6.2(19) Version: 6.2(21) Version: 6.2(23) Version: 6.2(20a) Version: 6.2(25) Version: 6.2(22) Version: 6.2(27) Version: 6.2(29) Version: 6.2(24) Version: 6.2(31) Version: 6.2(24a) Version: 6.2(33) Version: 7.0(3)F1(1) Version: 7.0(3)F2(1) Version: 7.0(3)F2(2) Version: 7.0(3)F3(1) Version: 7.0(3)F3(2) Version: 7.0(3)F3(3) Version: 7.0(3)F3(3a) Version: 7.0(3)F3(4) Version: 7.0(3)F3(3c) Version: 7.0(3)F3(5) Version: 7.0(3)I2(2a) Version: 7.0(3)I2(2b) Version: 7.0(3)I2(2c) Version: 7.0(3)I2(2d) Version: 7.0(3)I2(2e) Version: 7.0(3)I2(3) Version: 7.0(3)I2(4) Version: 7.0(3)I2(5) Version: 7.0(3)I2(1) Version: 7.0(3)I2(1a) Version: 7.0(3)I2(2) Version: 7.0(3)I3(1) Version: 7.0(3)I4(1) Version: 7.0(3)I4(2) Version: 7.0(3)I4(3) Version: 7.0(3)I4(4) Version: 7.0(3)I4(5) Version: 7.0(3)I4(6) Version: 7.0(3)I4(7) Version: 7.0(3)I4(8) Version: 7.0(3)I4(8a) Version: 7.0(3)I4(8b) Version: 7.0(3)I4(8z) Version: 7.0(3)I4(9) Version: 7.0(3)I5(1) Version: 7.0(3)I5(2) Version: 7.0(3)I6(1) Version: 7.0(3)I6(2) Version: 7.0(3)I7(1) Version: 7.0(3)I7(2) Version: 7.0(3)I7(3) Version: 7.0(3)I7(4) Version: 7.0(3)I7(5) Version: 7.0(3)I7(5a) Version: 7.0(3)I7(6) Version: 7.0(3)I7(7) Version: 7.0(3)I7(8) Version: 7.0(3)I7(9) Version: 7.0(3)I7(10) Version: 7.1(0)N1(1a) Version: 7.1(0)N1(1b) Version: 7.1(0)N1(1) Version: 7.1(1)N1(1) Version: 7.1(2)N1(1) Version: 7.1(3)N1(1) Version: 7.1(3)N1(2) Version: 7.1(4)N1(1) Version: 7.1(5)N1(1) Version: 7.1(5)N1(1b) Version: 7.2(0)D1(1) Version: 7.2(1)D1(1) Version: 7.2(2)D1(2) Version: 7.2(2)D1(1) Version: 7.3(0)D1(1) Version: 7.3(0)DX(1) Version: 7.3(0)DY(1) Version: 7.3(0)N1(1) Version: 7.3(1)D1(1) Version: 7.3(1)DY(1) Version: 7.3(1)N1(1) Version: 7.3(2)D1(1) Version: 7.3(2)D1(2) Version: 7.3(2)D1(3) Version: 7.3(2)D1(3a) Version: 7.3(2)N1(1) Version: 7.3(3)N1(1) Version: 8.0(1) Version: 8.1(1) Version: 8.1(2) Version: 8.1(2a) Version: 8.1(1a) Version: 8.1(1b) Version: 8.2(1) Version: 8.2(2) Version: 8.2(3) Version: 8.2(4) Version: 8.2(5) Version: 8.2(6) Version: 8.2(7) Version: 8.2(7a) Version: 8.2(8) Version: 8.2(9) Version: 8.2(10) Version: 8.3(1) Version: 8.3(2) Version: 9.2(1) Version: 9.2(2) Version: 9.2(2t) Version: 9.2(3) Version: 9.2(4) Version: 9.2(2v) Version: 9.2(1a) Version: 7.3(4)N1(1) Version: 7.3(3)D1(1) Version: 7.3(4)D1(1) Version: 7.3(5)N1(1) Version: 8.4(1) Version: 8.4(1a) Version: 8.4(2) Version: 8.4(2a) Version: 8.4(3) Version: 8.4(2b) Version: 8.4(4) Version: 8.4(2c) Version: 8.4(4a) Version: 8.4(5) Version: 8.4(2d) Version: 8.4(6) Version: 8.4(2e) Version: 8.4(6a) Version: 8.4(7) Version: 8.4(2f) Version: 9.3(1) Version: 9.3(2) Version: 9.3(3) Version: 9.3(4) Version: 9.3(5) Version: 9.3(6) Version: 9.3(7) Version: 9.3(7a) Version: 9.3(8) Version: 9.3(9) Version: 9.3(10) Version: 9.3(11) Version: 9.3(2a) Version: 7.3(6)N1(1) Version: 7.3(5)D1(1) Version: 7.3(7)N1(1) Version: 7.3(7)N1(1a) Version: 7.3(7)N1(1b) Version: 7.3(6)D1(1) Version: 7.3(8)N1(1) Version: 7.3(7)D1(1) Version: 7.3(9)N1(1) Version: 10.1(1) Version: 10.1(2) Version: 10.1(2t) Version: 8.5(1) Version: 7.3(10)N1(1) Version: 7.3(8)D1(1) Version: 10.2(1) Version: 10.2(1q) Version: 10.2(2) Version: 10.2(3) Version: 10.2(3t) Version: 10.2(4) Version: 10.2(5) Version: 10.2(3v) Version: 7.3(9)D1(1) Version: 7.3(11)N1(1) Version: 7.3(12)N1(1) Version: 10.3(1) Version: 10.3(2) Version: 7.3(13)N1(1) |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-29T18:49:22.444391Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:40:18.434Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-nxos-lldp-dos-z7PncTgt", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco NX-OS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "6.0(2)A3(1)" }, { "status": "affected", "version": "6.0(2)A3(2)" }, { "status": "affected", "version": "6.0(2)A3(4)" }, { "status": "affected", "version": "6.0(2)A4(1)" }, { "status": "affected", "version": "6.0(2)A4(2)" }, { "status": "affected", "version": "6.0(2)A4(3)" }, { "status": "affected", "version": "6.0(2)A4(4)" }, { "status": "affected", "version": "6.0(2)A4(5)" }, { "status": "affected", "version": "6.0(2)A4(6)" }, { "status": "affected", "version": "6.0(2)A6(1)" }, { "status": "affected", "version": "6.0(2)A6(1a)" }, { "status": "affected", "version": "6.0(2)A6(2)" }, { "status": "affected", "version": "6.0(2)A6(2a)" }, { "status": "affected", "version": "6.0(2)A6(3)" }, { "status": "affected", "version": "6.0(2)A6(3a)" }, { "status": "affected", "version": "6.0(2)A6(4)" }, { "status": "affected", "version": "6.0(2)A6(4a)" }, { "status": "affected", "version": "6.0(2)A6(5)" }, { "status": "affected", "version": "6.0(2)A6(5a)" }, { "status": "affected", "version": "6.0(2)A6(5b)" }, { "status": "affected", "version": "6.0(2)A6(6)" }, { "status": "affected", "version": "6.0(2)A6(7)" }, { "status": "affected", "version": "6.0(2)A6(8)" }, { "status": "affected", "version": "6.0(2)A7(1)" }, { "status": "affected", "version": "6.0(2)A7(1a)" }, { "status": "affected", "version": "6.0(2)A7(2)" }, { "status": "affected", "version": "6.0(2)A7(2a)" }, { "status": "affected", "version": "6.0(2)A8(1)" }, { "status": "affected", "version": "6.0(2)A8(2)" }, { "status": "affected", "version": "6.0(2)A8(3)" }, { "status": "affected", "version": "6.0(2)A8(4)" }, { "status": "affected", "version": "6.0(2)A8(4a)" }, { "status": "affected", "version": "6.0(2)A8(5)" }, { "status": "affected", "version": "6.0(2)A8(6)" }, { "status": "affected", "version": "6.0(2)A8(7)" }, { "status": "affected", "version": "6.0(2)A8(7a)" }, { "status": "affected", "version": "6.0(2)A8(7b)" }, { "status": "affected", "version": "6.0(2)A8(8)" }, { "status": "affected", "version": "6.0(2)A8(9)" }, { "status": "affected", "version": "6.0(2)A8(10a)" }, { "status": "affected", "version": "6.0(2)A8(10)" }, { "status": "affected", "version": "6.0(2)A8(11)" }, { "status": "affected", "version": "6.0(2)A8(11a)" }, { "status": "affected", "version": "6.0(2)A8(11b)" }, { "status": "affected", "version": "6.0(2)U2(1)" }, { "status": "affected", "version": "6.0(2)U2(2)" }, { "status": "affected", "version": "6.0(2)U2(3)" }, { "status": "affected", "version": "6.0(2)U2(4)" }, { "status": "affected", "version": "6.0(2)U2(5)" }, { "status": "affected", "version": "6.0(2)U2(6)" }, { "status": "affected", "version": "6.0(2)U3(1)" }, { "status": "affected", "version": "6.0(2)U3(2)" }, { "status": "affected", "version": "6.0(2)U3(3)" }, { "status": "affected", "version": "6.0(2)U3(4)" }, { "status": "affected", "version": "6.0(2)U3(5)" }, { "status": "affected", "version": "6.0(2)U3(6)" }, { "status": "affected", "version": "6.0(2)U3(7)" }, { "status": "affected", "version": "6.0(2)U3(8)" }, { "status": "affected", "version": "6.0(2)U3(9)" }, { "status": "affected", "version": "6.0(2)U4(1)" }, { "status": "affected", "version": "6.0(2)U4(2)" }, { "status": "affected", "version": "6.0(2)U4(3)" }, { "status": "affected", "version": "6.0(2)U4(4)" }, { "status": "affected", "version": "6.0(2)U5(1)" }, { "status": "affected", "version": "6.0(2)U5(2)" }, { "status": "affected", "version": "6.0(2)U5(3)" }, { "status": "affected", "version": "6.0(2)U5(4)" }, { "status": "affected", "version": "6.0(2)U6(1)" }, { "status": "affected", "version": "6.0(2)U6(2)" }, { "status": "affected", "version": "6.0(2)U6(3)" }, { "status": "affected", "version": "6.0(2)U6(4)" }, { "status": "affected", "version": "6.0(2)U6(5)" }, { "status": "affected", "version": "6.0(2)U6(6)" }, { "status": "affected", "version": "6.0(2)U6(7)" }, { "status": "affected", "version": "6.0(2)U6(8)" }, { "status": "affected", "version": "6.0(2)U6(1a)" }, { "status": "affected", "version": "6.0(2)U6(2a)" }, { "status": "affected", "version": "6.0(2)U6(3a)" }, { "status": "affected", "version": "6.0(2)U6(4a)" }, { "status": "affected", "version": "6.0(2)U6(5a)" }, { "status": "affected", "version": "6.0(2)U6(5b)" }, { "status": "affected", "version": "6.0(2)U6(5c)" }, { "status": "affected", "version": "6.0(2)U6(9)" }, { "status": "affected", "version": "6.0(2)U6(10)" }, { "status": "affected", "version": "6.2(2)" }, { "status": "affected", "version": "6.2(2a)" }, { "status": "affected", "version": "6.2(6)" }, { "status": "affected", "version": "6.2(6b)" }, { "status": "affected", "version": "6.2(8)" }, { "status": "affected", "version": "6.2(8a)" }, { "status": "affected", "version": "6.2(8b)" }, { "status": "affected", "version": "6.2(10)" }, { "status": "affected", "version": "6.2(12)" }, { "status": "affected", "version": "6.2(18)" }, { "status": "affected", "version": "6.2(16)" }, { "status": "affected", "version": "6.2(14)" }, { "status": "affected", "version": "6.2(6a)" }, { "status": "affected", "version": "6.2(20)" }, { "status": "affected", "version": "6.2(1)" }, { "status": "affected", "version": "6.2(3)" }, { "status": "affected", "version": "6.2(5)" }, { "status": "affected", "version": "6.2(5a)" }, { "status": "affected", "version": "6.2(5b)" }, { "status": "affected", "version": "6.2(7)" }, { "status": "affected", "version": "6.2(9)" }, { "status": "affected", "version": "6.2(9a)" }, { "status": "affected", "version": "6.2(9b)" }, { "status": "affected", "version": "6.2(9c)" }, { "status": "affected", "version": "6.2(11)" }, { "status": "affected", "version": "6.2(11b)" }, { "status": "affected", "version": "6.2(11c)" }, { "status": "affected", "version": "6.2(11d)" }, { "status": "affected", "version": "6.2(11e)" }, { "status": "affected", "version": "6.2(13)" }, { "status": "affected", "version": "6.2(13a)" }, { "status": "affected", "version": "6.2(13b)" }, { "status": "affected", "version": "6.2(15)" }, { "status": "affected", "version": "6.2(17)" }, { "status": "affected", "version": "6.2(19)" }, { "status": "affected", "version": "6.2(21)" }, { "status": "affected", "version": "6.2(23)" }, { "status": "affected", "version": "6.2(20a)" }, { "status": "affected", "version": "6.2(25)" }, { "status": "affected", "version": "6.2(22)" }, { "status": "affected", "version": "6.2(27)" }, { "status": "affected", "version": "6.2(29)" }, { "status": "affected", "version": "6.2(24)" }, { "status": "affected", "version": "6.2(31)" }, { "status": "affected", "version": "6.2(24a)" }, { "status": "affected", "version": "6.2(33)" }, { "status": "affected", "version": "7.0(3)F1(1)" }, { "status": "affected", "version": "7.0(3)F2(1)" }, { "status": "affected", "version": "7.0(3)F2(2)" }, { "status": "affected", "version": "7.0(3)F3(1)" }, { "status": "affected", "version": "7.0(3)F3(2)" }, { "status": "affected", "version": "7.0(3)F3(3)" }, { "status": "affected", "version": "7.0(3)F3(3a)" }, { "status": "affected", "version": "7.0(3)F3(4)" }, { "status": "affected", "version": "7.0(3)F3(3c)" }, { "status": "affected", "version": "7.0(3)F3(5)" }, { "status": "affected", "version": "7.0(3)I2(2a)" }, { "status": "affected", "version": "7.0(3)I2(2b)" }, { "status": "affected", "version": "7.0(3)I2(2c)" }, { "status": "affected", "version": "7.0(3)I2(2d)" }, { "status": "affected", "version": "7.0(3)I2(2e)" }, { "status": "affected", "version": "7.0(3)I2(3)" }, { "status": "affected", "version": "7.0(3)I2(4)" }, { "status": "affected", "version": "7.0(3)I2(5)" }, { "status": "affected", "version": "7.0(3)I2(1)" }, { "status": "affected", "version": "7.0(3)I2(1a)" }, { "status": "affected", "version": "7.0(3)I2(2)" }, { "status": "affected", "version": "7.0(3)I3(1)" }, { "status": "affected", "version": "7.0(3)I4(1)" }, { "status": "affected", "version": "7.0(3)I4(2)" }, { "status": "affected", "version": "7.0(3)I4(3)" }, { "status": "affected", "version": "7.0(3)I4(4)" }, { "status": "affected", "version": "7.0(3)I4(5)" }, { "status": "affected", "version": "7.0(3)I4(6)" }, { "status": "affected", "version": "7.0(3)I4(7)" }, { "status": "affected", "version": "7.0(3)I4(8)" }, { "status": "affected", "version": "7.0(3)I4(8a)" }, { "status": "affected", "version": "7.0(3)I4(8b)" }, { "status": "affected", "version": "7.0(3)I4(8z)" }, { "status": "affected", "version": "7.0(3)I4(9)" }, { "status": "affected", "version": "7.0(3)I5(1)" }, { "status": "affected", "version": "7.0(3)I5(2)" }, { "status": "affected", "version": "7.0(3)I6(1)" }, { "status": "affected", "version": "7.0(3)I6(2)" }, { "status": "affected", "version": "7.0(3)I7(1)" }, { "status": "affected", "version": "7.0(3)I7(2)" }, { "status": "affected", "version": "7.0(3)I7(3)" }, { "status": "affected", "version": "7.0(3)I7(4)" }, { "status": "affected", "version": "7.0(3)I7(5)" }, { "status": "affected", "version": "7.0(3)I7(5a)" }, { "status": "affected", "version": "7.0(3)I7(6)" }, { "status": "affected", "version": "7.0(3)I7(7)" }, { "status": "affected", "version": "7.0(3)I7(8)" }, { "status": "affected", "version": "7.0(3)I7(9)" }, { "status": "affected", "version": "7.0(3)I7(10)" }, { "status": "affected", "version": "7.1(0)N1(1a)" }, { "status": "affected", "version": "7.1(0)N1(1b)" }, { "status": "affected", "version": "7.1(0)N1(1)" }, { "status": "affected", "version": "7.1(1)N1(1)" }, { "status": "affected", "version": "7.1(2)N1(1)" }, { "status": "affected", "version": "7.1(3)N1(1)" }, { "status": "affected", "version": "7.1(3)N1(2)" }, { "status": "affected", "version": "7.1(4)N1(1)" }, { "status": "affected", "version": "7.1(5)N1(1)" }, { "status": "affected", "version": "7.1(5)N1(1b)" }, { "status": "affected", "version": "7.2(0)D1(1)" }, { "status": "affected", "version": "7.2(1)D1(1)" }, { "status": "affected", "version": "7.2(2)D1(2)" }, { "status": "affected", "version": "7.2(2)D1(1)" }, { "status": "affected", "version": "7.3(0)D1(1)" }, { "status": "affected", "version": "7.3(0)DX(1)" }, { "status": "affected", "version": "7.3(0)DY(1)" }, { "status": "affected", "version": "7.3(0)N1(1)" }, { "status": "affected", "version": "7.3(1)D1(1)" }, { "status": "affected", "version": "7.3(1)DY(1)" }, { "status": "affected", "version": "7.3(1)N1(1)" }, { "status": "affected", "version": "7.3(2)D1(1)" }, { "status": "affected", "version": "7.3(2)D1(2)" }, { "status": "affected", "version": "7.3(2)D1(3)" }, { "status": "affected", "version": "7.3(2)D1(3a)" }, { "status": "affected", "version": "7.3(2)N1(1)" }, { "status": "affected", "version": "7.3(3)N1(1)" }, { "status": "affected", "version": "8.0(1)" }, { "status": "affected", "version": "8.1(1)" }, { "status": "affected", "version": "8.1(2)" }, { "status": "affected", "version": "8.1(2a)" }, { "status": "affected", "version": "8.1(1a)" }, { "status": "affected", "version": "8.1(1b)" }, { "status": "affected", "version": "8.2(1)" }, { "status": "affected", "version": "8.2(2)" }, { "status": "affected", "version": "8.2(3)" }, { "status": "affected", "version": "8.2(4)" }, { "status": "affected", "version": "8.2(5)" }, { "status": "affected", "version": "8.2(6)" }, { "status": "affected", "version": "8.2(7)" }, { "status": "affected", "version": "8.2(7a)" }, { "status": "affected", "version": "8.2(8)" }, { "status": "affected", "version": "8.2(9)" }, { "status": "affected", "version": "8.2(10)" }, { "status": "affected", "version": "8.3(1)" }, { "status": "affected", "version": "8.3(2)" }, { "status": "affected", "version": "9.2(1)" }, { "status": "affected", "version": "9.2(2)" }, { "status": "affected", "version": "9.2(2t)" }, { "status": "affected", "version": "9.2(3)" }, { "status": "affected", "version": "9.2(4)" }, { "status": "affected", "version": "9.2(2v)" }, { "status": "affected", "version": "9.2(1a)" }, { "status": "affected", "version": "7.3(4)N1(1)" }, { "status": "affected", "version": "7.3(3)D1(1)" }, { "status": "affected", "version": "7.3(4)D1(1)" }, { "status": "affected", "version": "7.3(5)N1(1)" }, { "status": "affected", "version": "8.4(1)" }, { "status": "affected", "version": "8.4(1a)" }, { "status": "affected", "version": "8.4(2)" }, { "status": "affected", "version": "8.4(2a)" }, { "status": "affected", "version": "8.4(3)" }, { "status": "affected", "version": "8.4(2b)" }, { "status": "affected", "version": "8.4(4)" }, { "status": "affected", "version": "8.4(2c)" }, { "status": "affected", "version": "8.4(4a)" }, { "status": "affected", "version": "8.4(5)" }, { "status": "affected", "version": "8.4(2d)" }, { "status": "affected", "version": "8.4(6)" }, { "status": "affected", "version": "8.4(2e)" }, { "status": "affected", "version": "8.4(6a)" }, { "status": "affected", "version": "8.4(7)" }, { "status": "affected", "version": "8.4(2f)" }, { "status": "affected", "version": "9.3(1)" }, { "status": "affected", "version": "9.3(2)" }, { "status": "affected", "version": "9.3(3)" }, { "status": "affected", "version": "9.3(4)" }, { "status": "affected", "version": "9.3(5)" }, { "status": "affected", "version": "9.3(6)" }, { "status": "affected", "version": "9.3(7)" }, { "status": "affected", "version": "9.3(7a)" }, { "status": "affected", "version": "9.3(8)" }, { "status": "affected", "version": "9.3(9)" }, { "status": "affected", "version": "9.3(10)" }, { "status": "affected", "version": "9.3(11)" }, { "status": "affected", "version": "9.3(2a)" }, { "status": "affected", "version": "7.3(6)N1(1)" }, { "status": "affected", "version": "7.3(5)D1(1)" }, { "status": "affected", "version": "7.3(7)N1(1)" }, { "status": "affected", "version": "7.3(7)N1(1a)" }, { "status": "affected", "version": "7.3(7)N1(1b)" }, { "status": "affected", "version": "7.3(6)D1(1)" }, { "status": "affected", "version": "7.3(8)N1(1)" }, { "status": "affected", "version": "7.3(7)D1(1)" }, { "status": "affected", "version": "7.3(9)N1(1)" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "10.1(2t)" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "7.3(10)N1(1)" }, { "status": "affected", "version": "7.3(8)D1(1)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "10.2(1q)" }, { "status": "affected", "version": "10.2(2)" }, { "status": "affected", "version": "10.2(3)" }, { "status": "affected", "version": "10.2(3t)" }, { "status": "affected", "version": "10.2(4)" }, { "status": "affected", "version": "10.2(5)" }, { "status": "affected", "version": "10.2(3v)" }, { "status": "affected", "version": "7.3(9)D1(1)" }, { "status": "affected", "version": "7.3(11)N1(1)" }, { "status": "affected", "version": "7.3(12)N1(1)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.3(2)" }, { "status": "affected", "version": "7.3(13)N1(1)" } ] }, { "product": "Cisco Unified Computing System (Managed)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "3.1(1e)" }, { "status": "affected", "version": "3.1(1g)" }, { "status": "affected", "version": "3.1(1h)" }, { "status": "affected", "version": "3.1(1k)" }, { "status": "affected", "version": "3.1(1l)" }, { "status": "affected", "version": "3.1(2b)" }, { "status": "affected", "version": "3.1(2c)" }, { "status": "affected", "version": "3.1(2e)" }, { "status": "affected", "version": "3.1(2f)" }, { "status": "affected", "version": "3.1(2g)" }, { "status": "affected", "version": "3.1(2h)" }, { "status": "affected", "version": "3.1(3a)" }, { "status": "affected", "version": "3.1(3b)" }, { "status": "affected", "version": "3.1(3c)" }, { "status": "affected", "version": "3.1(3d)" }, { "status": "affected", "version": "3.1(3e)" }, { "status": "affected", "version": "3.1(3f)" }, { "status": "affected", "version": "3.1(3h)" }, { "status": "affected", "version": "3.1(3j)" }, { "status": "affected", "version": "3.1(3k)" }, { "status": "affected", "version": "3.1(2d)" }, { "status": "affected", "version": "3.1(3l)" }, { "status": "affected", "version": "3.2(1d)" }, { "status": "affected", "version": "3.2(2b)" }, { "status": "affected", "version": "3.2(2c)" }, { "status": "affected", "version": "3.2(2d)" }, { "status": "affected", "version": "3.2(2e)" }, { "status": "affected", "version": "3.2(2f)" }, { "status": "affected", "version": "3.2(3a)" }, { "status": "affected", "version": "3.2(3b)" }, { "status": "affected", "version": "3.2(3d)" }, { "status": "affected", "version": "3.2(3e)" }, { "status": "affected", "version": "3.2(3g)" }, { "status": "affected", "version": "3.2(3h)" }, { "status": "affected", "version": "3.2(3i)" }, { "status": "affected", "version": "3.2(3j)" }, { "status": "affected", "version": "3.2(3k)" }, { "status": "affected", "version": "3.2(3l)" }, { "status": "affected", "version": "3.2(3n)" }, { "status": "affected", "version": "3.2(3o)" }, { "status": "affected", "version": "3.2(3p)" }, { "status": "affected", "version": "4.0(1a)" }, { "status": "affected", "version": "4.0(1b)" }, { "status": "affected", "version": "4.0(1c)" }, { "status": "affected", "version": "4.0(1d)" }, { "status": "affected", "version": "4.0(2a)" }, { "status": "affected", "version": "4.0(2b)" }, { "status": "affected", "version": "4.0(2d)" }, { "status": "affected", "version": "4.0(2e)" }, { "status": "affected", "version": "4.0(4b)" }, { "status": "affected", "version": "4.0(4c)" }, { "status": "affected", "version": "4.0(4d)" }, { "status": "affected", "version": "4.0(4e)" }, { "status": "affected", "version": "4.0(4f)" }, { "status": "affected", "version": "4.0(4g)" }, { "status": "affected", "version": "4.0(4h)" }, { "status": "affected", "version": "4.0(4a)" }, { "status": "affected", "version": "4.0(4i)" }, { "status": "affected", "version": "4.0(4k)" }, { "status": "affected", "version": "4.0(4l)" }, { "status": "affected", "version": "4.0(4m)" }, { "status": "affected", "version": "4.0(4n)" }, { "status": "affected", "version": "4.0(4o)" }, { "status": "affected", "version": "4.1(1a)" }, { "status": "affected", "version": "4.1(1b)" }, { "status": "affected", "version": "4.1(1c)" }, { "status": "affected", "version": "4.1(2a)" }, { "status": "affected", "version": "4.1(1d)" }, { "status": "affected", "version": "4.1(1e)" }, { "status": "affected", "version": "4.1(2b)" }, { "status": "affected", "version": "4.1(3a)" }, { "status": "affected", "version": "4.1(3b)" }, { "status": "affected", "version": "4.1(2c)" }, { "status": "affected", "version": "4.1(3d)" }, { "status": "affected", "version": "4.1(3c)" }, { "status": "affected", "version": "4.1(3e)" }, { "status": "affected", "version": "4.1(3f)" }, { "status": "affected", "version": "4.1(3h)" }, { "status": "affected", "version": "4.1(3i)" }, { "status": "affected", "version": "4.1(3j)" }, { "status": "affected", "version": "4.1(3k)" }, { "status": "affected", "version": "4.1(3l)" }, { "status": "affected", "version": "4.2(1d)" }, { "status": "affected", "version": "4.2(1c)" }, { "status": "affected", "version": "4.2(1f)" }, { "status": "affected", "version": "4.2(1i)" }, { "status": "affected", "version": "4.2(1k)" }, { "status": "affected", "version": "4.2(1l)" }, { "status": "affected", "version": "4.2(1m)" }, { "status": "affected", "version": "4.2(2a)" }, { "status": "affected", "version": "4.2(2c)" }, { "status": "affected", "version": "4.2(1n)" }, { "status": "affected", "version": "4.2(2d)" }, { "status": "affected", "version": "4.2(3b)" }, { "status": "affected", "version": "4.2(2e)" }, { "status": "affected", "version": "4.2(3d)" }, { "status": "affected", "version": "4.2(3e)" }, { "status": "affected", "version": "4.2(3g)" }, { "status": "affected", "version": "4.2(3h)" }, { "status": "affected", "version": "4.2(3i)" } ] }, { "product": "Cisco Firepower Extensible Operating System (FXOS)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "2.2.1.63" }, { "status": "affected", "version": "2.2.1.66" }, { "status": "affected", "version": "2.2.1.70" }, { "status": "affected", "version": "2.2.2.17" }, { "status": "affected", "version": "2.2.2.19" }, { "status": "affected", "version": "2.2.2.24" }, { "status": "affected", "version": "2.2.2.26" }, { "status": "affected", "version": "2.2.2.28" }, { "status": "affected", "version": "2.2.2.54" }, { "status": "affected", "version": "2.2.2.60" }, { "status": "affected", "version": "2.2.2.71" }, { "status": "affected", "version": "2.2.2.83" }, { "status": "affected", "version": "2.2.2.86" }, { "status": "affected", "version": "2.2.2.91" }, { "status": "affected", "version": "2.2.2.97" }, { "status": "affected", "version": "2.2.2.101" }, { "status": "affected", "version": "2.2.2.137" }, { "status": "affected", "version": "2.2.2.148" }, { "status": "affected", "version": "2.2.2.149" }, { "status": "affected", "version": "2.3.1.99" }, { "status": "affected", "version": "2.3.1.93" }, { "status": "affected", "version": "2.3.1.91" }, { "status": "affected", "version": "2.3.1.88" }, { "status": "affected", "version": "2.3.1.75" }, { "status": "affected", "version": "2.3.1.73" }, { "status": "affected", "version": "2.3.1.66" }, { "status": "affected", "version": "2.3.1.58" }, { "status": "affected", "version": "2.3.1.130" }, { "status": "affected", "version": "2.3.1.111" }, { "status": "affected", "version": "2.3.1.110" }, { "status": "affected", "version": "2.3.1.144" }, { "status": "affected", "version": "2.3.1.145" }, { "status": "affected", "version": "2.3.1.155" }, { "status": "affected", "version": "2.3.1.166" }, { "status": "affected", "version": "2.3.1.173" }, { "status": "affected", "version": "2.3.1.179" }, { "status": "affected", "version": "2.3.1.180" }, { "status": "affected", "version": "2.3.1.56" }, { "status": "affected", "version": "2.3.1.190" }, { "status": "affected", "version": "2.3.1.215" }, { "status": "affected", "version": "2.3.1.216" }, { "status": "affected", "version": "2.3.1.219" }, { "status": "affected", "version": "2.3.1.230" }, { "status": "affected", "version": "2.6.1.131" }, { "status": "affected", "version": "2.6.1.157" }, { "status": "affected", "version": "2.6.1.166" }, { "status": "affected", "version": "2.6.1.169" }, { "status": "affected", "version": "2.6.1.174" }, { "status": "affected", "version": "2.6.1.187" }, { "status": "affected", "version": "2.6.1.192" }, { "status": "affected", "version": "2.6.1.204" }, { "status": "affected", "version": "2.6.1.214" }, { "status": "affected", "version": "2.6.1.224" }, { "status": "affected", "version": "2.6.1.229" }, { "status": "affected", "version": "2.6.1.230" }, { "status": "affected", "version": "2.6.1.238" }, { "status": "affected", "version": "2.6.1.239" }, { "status": "affected", "version": "2.6.1.254" }, { "status": "affected", "version": "2.6.1.259" }, { "status": "affected", "version": "2.6.1.264" }, { "status": "affected", "version": "2.6.1.265" }, { "status": "affected", "version": "2.8.1.105" }, { "status": "affected", "version": "2.8.1.125" }, { "status": "affected", "version": "2.8.1.139" }, { "status": "affected", "version": "2.8.1.143" }, { "status": "affected", "version": "2.8.1.152" }, { "status": "affected", "version": "2.8.1.162" }, { "status": "affected", "version": "2.8.1.164" }, { "status": "affected", "version": "2.8.1.172" }, { "status": "affected", "version": "2.8.1.186" }, { "status": "affected", "version": "2.8.1.190" }, { "status": "affected", "version": "2.8.1.198" }, { "status": "affected", "version": "2.9.1.131" }, { "status": "affected", "version": "2.9.1.135" }, { "status": "affected", "version": "2.9.1.143" }, { "status": "affected", "version": "2.9.1.150" }, { "status": "affected", "version": "2.9.1.158" }, { "status": "affected", "version": "2.10.1.159" }, { "status": "affected", "version": "2.10.1.166" }, { "status": "affected", "version": "2.10.1.179" }, { "status": "affected", "version": "2.10.1.207" }, { "status": "affected", "version": "2.10.1.234" }, { "status": "affected", "version": "2.10.1.245" }, { "status": "affected", "version": "2.10.1.271" }, { "status": "affected", "version": "2.11.1.154" }, { "status": "affected", "version": "2.11.1.182" }, { "status": "affected", "version": "2.11.1.200" }, { "status": "affected", "version": "2.11.1.205" }, { "status": "affected", "version": "2.12.0.31" }, { "status": "affected", "version": "2.12.0.432" }, { "status": "affected", "version": "2.12.0.450" }, { "status": "affected", "version": "2.12.0.467" }, { "status": "affected", "version": "2.12.0.498" }, { "status": "affected", "version": "2.12.1.29" }, { "status": "affected", "version": "2.12.1.48" }, { "status": "affected", "version": "2.13.0.198" }, { "status": "affected", "version": "2.13.0.212" }, { "status": "affected", "version": "2.13.0.243" }, { "status": "affected", "version": "2.14.1.131" } ] }, { "product": "Cisco NX-OS System Software in ACI Mode", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.0(1m)" }, { "status": "affected", "version": "12.0(2g)" }, { "status": "affected", "version": "12.0(1n)" }, { "status": "affected", "version": "12.0(1o)" }, { "status": "affected", "version": "12.0(1p)" }, { "status": "affected", "version": "12.0(1q)" }, { "status": "affected", "version": "12.0(2h)" }, { "status": "affected", "version": "12.0(2l)" }, { "status": "affected", "version": "12.0(2m)" }, { "status": "affected", "version": "12.0(2n)" }, { "status": "affected", "version": "12.0(2o)" }, { "status": "affected", "version": "12.0(2f)" }, { "status": "affected", "version": "12.0(1r)" }, { "status": "affected", "version": "12.1(1h)" }, { "status": "affected", "version": "12.1(2e)" }, { "status": "affected", "version": "12.1(3g)" }, { "status": "affected", "version": "12.1(4a)" }, { "status": "affected", "version": "12.1(1i)" }, { "status": "affected", "version": "12.1(2g)" }, { "status": "affected", "version": "12.1(2k)" }, { "status": "affected", "version": "12.1(3h)" }, { "status": "affected", "version": "12.1(3j)" }, { "status": "affected", "version": "12.2(1n)" }, { "status": "affected", "version": "12.2(2e)" }, { "status": "affected", "version": "12.2(3j)" }, { "status": "affected", "version": "12.2(4f)" }, { "status": "affected", "version": "12.2(4p)" }, { "status": "affected", "version": "12.2(3p)" }, { "status": "affected", "version": "12.2(3r)" }, { "status": "affected", "version": "12.2(3s)" }, { "status": "affected", "version": "12.2(3t)" }, { "status": "affected", "version": "12.2(2f)" }, { "status": "affected", "version": "12.2(2i)" }, { "status": "affected", "version": "12.2(2j)" }, { "status": "affected", "version": "12.2(2k)" }, { "status": "affected", "version": "12.2(2q)" }, { "status": "affected", "version": "12.2(1o)" }, { "status": "affected", "version": "12.2(4q)" }, { "status": "affected", "version": "12.2(4r)" }, { "status": "affected", "version": "12.3(1e)" }, { "status": "affected", "version": "12.3(1f)" }, { "status": "affected", "version": "12.3(1i)" }, { "status": "affected", "version": "12.3(1l)" }, { "status": "affected", "version": "12.3(1o)" }, { "status": "affected", "version": "12.3(1p)" }, { "status": "affected", "version": "13.0(1k)" }, { "status": "affected", "version": "13.0(2h)" }, { "status": "affected", "version": "13.0(2k)" }, { "status": "affected", "version": "13.0(2n)" }, { "status": "affected", "version": "13.1(1i)" }, { "status": "affected", "version": "13.1(2m)" }, { "status": "affected", "version": "13.1(2o)" }, { "status": "affected", "version": "13.1(2p)" }, { "status": "affected", "version": "13.1(2q)" }, { "status": "affected", "version": "13.1(2s)" }, { "status": "affected", "version": "13.1(2t)" }, { "status": "affected", "version": "13.1(2u)" }, { "status": "affected", "version": "13.1(2v)" }, { "status": "affected", "version": "13.2(1l)" }, { "status": "affected", "version": "13.2(1m)" }, { "status": "affected", "version": "13.2(2l)" }, { "status": "affected", "version": "13.2(2o)" }, { "status": "affected", "version": "13.2(3i)" }, { "status": "affected", "version": "13.2(3n)" }, { "status": "affected", "version": "13.2(3o)" }, { "status": "affected", "version": "13.2(3r)" }, { "status": "affected", "version": "13.2(4d)" }, { "status": "affected", "version": "13.2(4e)" }, { "status": "affected", "version": "13.2(3s)" }, { "status": "affected", "version": "13.2(5d)" }, { "status": "affected", "version": "13.2(5e)" }, { "status": "affected", "version": "13.2(5f)" }, { "status": "affected", "version": "13.2(6i)" }, { "status": "affected", "version": "13.2(7f)" }, { "status": "affected", "version": "13.2(7k)" }, { "status": "affected", "version": "13.2(9b)" }, { "status": "affected", "version": "13.2(9f)" }, { "status": "affected", "version": "13.2(9h)" }, { "status": "affected", "version": "13.2(10e)" }, { "status": "affected", "version": "13.2(10f)" }, { "status": "affected", "version": "13.2(10g)" }, { "status": "affected", "version": "14.0(1h)" }, { "status": "affected", "version": "14.0(2c)" }, { "status": "affected", "version": "14.0(3d)" }, { "status": "affected", "version": "14.0(3c)" }, { "status": "affected", "version": "14.1(1i)" }, { "status": "affected", "version": "14.1(1j)" }, { "status": "affected", "version": "14.1(1k)" }, { "status": "affected", "version": "14.1(1l)" }, { "status": "affected", "version": "14.1(2g)" }, { "status": "affected", "version": "14.1(2m)" }, { "status": "affected", "version": "14.1(2o)" }, { "status": "affected", "version": "14.1(2s)" }, { "status": "affected", "version": "14.1(2u)" }, { "status": "affected", "version": "14.1(2w)" }, { "status": "affected", "version": "14.1(2x)" }, { "status": "affected", "version": "14.2(1i)" }, { "status": "affected", "version": "14.2(1j)" }, { "status": "affected", "version": "14.2(1l)" }, { "status": "affected", "version": "14.2(2e)" }, { "status": "affected", "version": "14.2(2f)" }, { "status": "affected", "version": "14.2(2g)" }, { "status": "affected", "version": "14.2(3j)" }, { "status": "affected", "version": "14.2(3l)" }, { "status": "affected", "version": "14.2(3n)" }, { "status": "affected", "version": "14.2(3q)" }, { "status": "affected", "version": "14.2(4i)" }, { "status": "affected", "version": "14.2(4k)" }, { "status": "affected", "version": "14.2(4o)" }, { "status": "affected", "version": "14.2(4p)" }, { "status": "affected", "version": "14.2(5k)" }, { "status": "affected", "version": "14.2(5l)" }, { "status": "affected", "version": "14.2(5n)" }, { "status": "affected", "version": "14.2(6d)" }, { "status": "affected", "version": "14.2(6g)" }, { "status": "affected", "version": "14.2(6h)" }, { "status": "affected", "version": "14.2(6l)" }, { "status": "affected", "version": "14.2(7f)" }, { "status": "affected", "version": "14.2(7l)" }, { "status": "affected", "version": "14.2(6o)" }, { "status": "affected", "version": "14.2(7q)" }, { "status": "affected", "version": "14.2(7r)" }, { "status": "affected", "version": "14.2(7s)" }, { "status": "affected", "version": "14.2(7t)" }, { "status": "affected", "version": "14.2(7u)" }, { "status": "affected", "version": "14.2(7v)" }, { "status": "affected", "version": "14.2(7w)" }, { "status": "affected", "version": "15.0(1k)" }, { "status": "affected", "version": "15.0(1l)" }, { "status": "affected", "version": "15.0(2e)" }, { "status": "affected", "version": "15.0(2h)" }, { "status": "affected", "version": "15.1(1h)" }, { "status": "affected", "version": "15.1(2e)" }, { "status": "affected", "version": "15.1(3e)" }, { "status": "affected", "version": "15.1(4c)" }, { "status": "affected", "version": "15.2(1g)" }, { "status": "affected", "version": "15.2(2e)" }, { "status": "affected", "version": "15.2(2f)" }, { "status": "affected", "version": "15.2(2g)" }, { "status": "affected", "version": "15.2(2h)" }, { "status": "affected", "version": "15.2(3e)" }, { "status": "affected", "version": "15.2(3f)" }, { "status": "affected", "version": "15.2(3g)" }, { "status": "affected", "version": "15.2(4d)" }, { "status": "affected", "version": "15.2(4e)" }, { "status": "affected", "version": "15.2(5c)" }, { "status": "affected", "version": "15.2(5d)" }, { "status": "affected", "version": "15.2(5e)" }, { "status": "affected", "version": "15.2(4f)" }, { "status": "affected", "version": "15.2(6e)" }, { "status": "affected", "version": "15.2(6g)" }, { "status": "affected", "version": "15.2(7f)" }, { "status": "affected", "version": "15.2(7g)" }, { "status": "affected", "version": "15.2(8d)" }, { "status": "affected", "version": "15.2(8e)" }, { "status": "affected", "version": "15.2(8f)" }, { "status": "affected", "version": "15.2(8g)" }, { "status": "affected", "version": "16.0(1g)" }, { "status": "affected", "version": "16.0(1j)" }, { "status": "affected", "version": "16.0(2h)" }, { "status": "affected", "version": "16.0(2j)" }, { "status": "affected", "version": "16.0(3d)" }, { "status": "affected", "version": "16.0(3e)" }, { "status": "affected", "version": "15.3(1d)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device and having an authenticated user retrieve LLDP statistics from the affected device through CLI show commands or Simple Network Management Protocol (SNMP) requests. A successful exploit could allow the attacker to cause the LLDP service to crash and stop running on the affected device. In certain situations, the LLDP crash may result in a reload of the affected device.\r\n\r Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol)." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-805", "description": "Buffer Access with Incorrect Length Value", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-28T16:16:56.717Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-nxos-lldp-dos-z7PncTgt", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt" } ], "source": { "advisory": "cisco-sa-nxos-lldp-dos-z7PncTgt", "defects": [ "CSCwf67412", "CSCwf67468", "CSCwi31871", "CSCwe86457", "CSCwf67408", "CSCwf67409", "CSCwf67411", "CSCwi29934" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20294", "datePublished": "2024-02-28T16:16:56.717Z", "dateReserved": "2023-11-08T15:08:07.629Z", "dateUpdated": "2024-08-01T21:59:41.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-34714 (GCVE-0-2021-34714)
Vulnerability from cvelistv5
Published
2021-09-23 02:25
Modified
2024-11-07 21:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:19:48.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20210922 Multiple Cisco Operating Systems Unidirectional Link Detection Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-34714", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T21:40:36.961651Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T21:59:09.403Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2021-09-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-23T02:25:58", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20210922 Multiple Cisco Operating Systems Unidirectional Link Detection Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ" } ], "source": { "advisory": "cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ", "defect": [ [ "CSCvw22670", "CSCvw26126", "CSCvw26127", "CSCvw26129", "CSCvw26130", "CSCvw26152", "CSCvw46194", "CSCvw46239" ] ], "discovery": "INTERNAL" }, "title": "Multiple Cisco Operating Systems Unidirectional Link Detection Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2021-09-22T16:00:00", "ID": "CVE-2021-34714", "STATE": "PUBLIC", "TITLE": "Multiple Cisco Operating Systems Unidirectional Link Detection Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "7.4", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20210922 Multiple Cisco Operating Systems Unidirectional Link Detection Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ" } ] }, "source": { "advisory": "cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ", "defect": [ [ "CSCvw22670", "CSCvw26126", "CSCvw26127", "CSCvw26129", "CSCvw26130", "CSCvw26152", "CSCvw46194", "CSCvw46239" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2021-34714", "datePublished": "2021-09-23T02:25:58.322621Z", "dateReserved": "2021-06-15T00:00:00", "dateUpdated": "2024-11-07T21:59:09.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-1968 (GCVE-0-2019-1968)
Vulnerability from cvelistv5
Published
2019-08-29 21:50
Modified
2024-11-19 18:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco NX-OS Software 6.0(2)A4(1) |
Version: unspecified < 8.3(2) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T18:35:52.007Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20190828 Cisco NX-OS Software NX-API Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-api-dos" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2019-1968", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-19T17:23:15.309150Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-19T18:57:48.765Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco NX-OS Software 6.0(2)A4(1)", "vendor": "Cisco", "versions": [ { "lessThan": "8.3(2)", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-08-28T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default." } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-29T21:50:25", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20190828 Cisco NX-OS Software NX-API Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-api-dos" } ], "source": { "advisory": "cisco-sa-20190828-nxos-api-dos", "defect": [ [ "CSCvn26502", "CSCvn31273", "CSCvn57900" ] ], "discovery": "INTERNAL" }, "title": "Cisco NX-OS Software NX-API Denial of Service Vulnerability", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "DATE_PUBLIC": "2019-08-28T16:00:00-0700", "ID": "CVE-2019-1968", "STATE": "PUBLIC", "TITLE": "Cisco NX-OS Software NX-API Denial of Service Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco NX-OS Software 6.0(2)A4(1)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "8.3(2)" } ] } } ] }, "vendor_name": "Cisco" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default." } ] }, "exploit": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "impact": { "cvss": { "baseScore": "5.3", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "20190828 Cisco NX-OS Software NX-API Denial of Service Vulnerability", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-api-dos" } ] }, "source": { "advisory": "cisco-sa-20190828-nxos-api-dos", "defect": [ [ "CSCvn26502", "CSCvn31273", "CSCvn57900" ] ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2019-1968", "datePublished": "2019-08-29T21:50:25.458591Z", "dateReserved": "2018-12-06T00:00:00", "dateUpdated": "2024-11-19T18:57:48.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20168 (GCVE-0-2023-20168)
Vulnerability from cvelistv5
Published
2023-08-23 18:07
Modified
2024-08-02 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Cisco | Cisco NX-OS Software |
Version: 4.2(1)SV1(4) Version: 4.2(1)SV1(4a) Version: 4.2(1)SV1(4b) Version: 4.2(1)SV1(5.1) Version: 4.2(1)SV1(5.1a) Version: 4.2(1)SV1(5.2) Version: 4.2(1)SV1(5.2b) Version: 4.2(1)SV2(1.1) Version: 4.2(1)SV2(1.1a) Version: 4.2(1)SV2(2.1) Version: 4.2(1)SV2(2.1a) Version: 4.2(1)SV2(2.2) Version: 4.2(1)SV2(2.3) Version: 5.2(1)SM1(5.1) Version: 5.2(1)SM1(5.2) Version: 5.2(1)SM1(5.2a) Version: 5.2(1)SM1(5.2b) Version: 5.2(1)SM1(5.2c) Version: 5.2(1)SM3(1.1) Version: 5.2(1)SM3(1.1a) Version: 5.2(1)SM3(1.1b) Version: 5.2(1)SM3(1.1c) Version: 5.2(1)SM3(2.1) Version: 5.2(1)SV3(1.4) Version: 5.2(1)SV3(1.1) Version: 5.2(1)SV3(1.3) Version: 5.2(1)SV3(1.5a) Version: 5.2(1)SV3(1.5b) Version: 5.2(1)SV3(1.6) Version: 5.2(1)SV3(1.10) Version: 5.2(1)SV3(1.15) Version: 5.2(1)SV3(2.1) Version: 5.2(1)SV3(2.5) Version: 5.2(1)SV3(2.8) Version: 5.2(1)SV3(3.1) Version: 5.2(1)SV3(1.2) Version: 5.2(1)SV3(1.4b) Version: 5.2(1)SV3(3.15) Version: 5.2(1)SV3(4.1) Version: 5.2(1)SV3(4.1a) Version: 5.2(1)SV3(4.1b) Version: 5.2(1)SV3(4.1c) Version: 6.0(2)A3(1) Version: 6.0(2)A3(2) Version: 6.0(2)A3(4) Version: 6.0(2)A4(1) Version: 6.0(2)A4(2) Version: 6.0(2)A4(3) Version: 6.0(2)A4(4) Version: 6.0(2)A4(5) Version: 6.0(2)A4(6) Version: 6.0(2)A6(1) Version: 6.0(2)A6(1a) Version: 6.0(2)A6(2) Version: 6.0(2)A6(2a) Version: 6.0(2)A6(3) Version: 6.0(2)A6(3a) Version: 6.0(2)A6(4) Version: 6.0(2)A6(4a) Version: 6.0(2)A6(5) Version: 6.0(2)A6(5a) Version: 6.0(2)A6(5b) Version: 6.0(2)A6(6) Version: 6.0(2)A6(7) Version: 6.0(2)A6(8) Version: 6.0(2)A7(1) Version: 6.0(2)A7(1a) Version: 6.0(2)A7(2) Version: 6.0(2)A7(2a) Version: 6.0(2)A8(1) Version: 6.0(2)A8(2) Version: 6.0(2)A8(3) Version: 6.0(2)A8(4) Version: 6.0(2)A8(4a) Version: 6.0(2)A8(5) Version: 6.0(2)A8(6) Version: 6.0(2)A8(7) Version: 6.0(2)A8(7a) Version: 6.0(2)A8(7b) Version: 6.0(2)A8(8) Version: 6.0(2)A8(9) Version: 6.0(2)A8(10a) Version: 6.0(2)A8(10) Version: 6.0(2)A8(11) Version: 6.0(2)A8(11a) Version: 6.0(2)A8(11b) Version: 6.0(2)U2(1) Version: 6.0(2)U2(2) Version: 6.0(2)U2(3) Version: 6.0(2)U2(4) Version: 6.0(2)U2(5) Version: 6.0(2)U2(6) Version: 6.0(2)U3(1) Version: 6.0(2)U3(2) Version: 6.0(2)U3(3) Version: 6.0(2)U3(4) Version: 6.0(2)U3(5) Version: 6.0(2)U3(6) Version: 6.0(2)U3(7) Version: 6.0(2)U3(8) Version: 6.0(2)U3(9) Version: 6.0(2)U4(1) Version: 6.0(2)U4(2) Version: 6.0(2)U4(3) Version: 6.0(2)U4(4) Version: 6.0(2)U5(1) Version: 6.0(2)U5(2) Version: 6.0(2)U5(3) Version: 6.0(2)U5(4) Version: 6.0(2)U6(1) Version: 6.0(2)U6(2) Version: 6.0(2)U6(3) Version: 6.0(2)U6(4) Version: 6.0(2)U6(5) Version: 6.0(2)U6(6) Version: 6.0(2)U6(7) Version: 6.0(2)U6(8) Version: 6.0(2)U6(1a) Version: 6.0(2)U6(2a) Version: 6.0(2)U6(3a) Version: 6.0(2)U6(4a) Version: 6.0(2)U6(5a) Version: 6.0(2)U6(5b) Version: 6.0(2)U6(5c) Version: 6.0(2)U6(9) Version: 6.0(2)U6(10) Version: 6.2(2) Version: 6.2(2a) Version: 6.2(6) Version: 6.2(6b) Version: 6.2(8) Version: 6.2(8a) Version: 6.2(8b) Version: 6.2(10) Version: 6.2(12) Version: 6.2(18) Version: 6.2(16) Version: 6.2(14) Version: 6.2(6a) Version: 6.2(20) Version: 6.2(1) Version: 6.2(3) Version: 6.2(5) Version: 6.2(5a) Version: 6.2(5b) Version: 6.2(7) Version: 6.2(9) Version: 6.2(9a) Version: 6.2(9b) Version: 6.2(9c) Version: 6.2(11) Version: 6.2(11b) Version: 6.2(11c) Version: 6.2(11d) Version: 6.2(11e) Version: 6.2(13) Version: 6.2(13a) Version: 6.2(13b) Version: 6.2(15) Version: 6.2(17) Version: 6.2(19) Version: 6.2(21) Version: 6.2(23) Version: 6.2(20a) Version: 6.2(25) Version: 6.2(22) Version: 6.2(27) Version: 6.2(29) Version: 6.2(24) Version: 6.2(31) Version: 6.2(24a) Version: 6.2(33) Version: 7.0(3)F1(1) Version: 7.0(3)F2(1) Version: 7.0(3)F2(2) Version: 7.0(3)F3(1) Version: 7.0(3)F3(2) Version: 7.0(3)F3(3) Version: 7.0(3)F3(3a) Version: 7.0(3)F3(4) Version: 7.0(3)F3(3c) Version: 7.0(3)F3(5) Version: 7.0(3)I2(2a) Version: 7.0(3)I2(2b) Version: 7.0(3)I2(2c) Version: 7.0(3)I2(2d) Version: 7.0(3)I2(2e) Version: 7.0(3)I2(3) Version: 7.0(3)I2(4) Version: 7.0(3)I2(5) Version: 7.0(3)I2(1) Version: 7.0(3)I2(1a) Version: 7.0(3)I2(2) Version: 7.0(3)I3(1) Version: 7.0(3)I4(1) Version: 7.0(3)I4(2) Version: 7.0(3)I4(3) Version: 7.0(3)I4(4) Version: 7.0(3)I4(5) Version: 7.0(3)I4(6) Version: 7.0(3)I4(7) Version: 7.0(3)I4(8) Version: 7.0(3)I4(8a) Version: 7.0(3)I4(8b) Version: 7.0(3)I4(8z) Version: 7.0(3)I4(9) Version: 7.0(3)I5(1) Version: 7.0(3)I5(2) Version: 7.0(3)I6(1) Version: 7.0(3)I6(2) Version: 7.0(3)I7(1) Version: 7.0(3)I7(2) Version: 7.0(3)I7(3) Version: 7.0(3)I7(4) Version: 7.0(3)I7(5) Version: 7.0(3)I7(5a) Version: 7.0(3)I7(6) Version: 7.0(3)I7(7) Version: 7.0(3)I7(8) Version: 7.0(3)I7(9) Version: 7.0(3)I7(10) Version: 7.1(0)N1(1a) Version: 7.1(0)N1(1b) Version: 7.1(0)N1(1) Version: 7.1(1)N1(1) Version: 7.1(2)N1(1) Version: 7.1(3)N1(1) Version: 7.1(3)N1(2) Version: 7.1(4)N1(1) Version: 7.1(5)N1(1) Version: 7.1(5)N1(1b) Version: 7.2(0)D1(1) Version: 7.2(1)D1(1) Version: 7.2(2)D1(2) Version: 7.2(2)D1(1) Version: 7.3(0)D1(1) Version: 7.3(0)DX(1) Version: 7.3(0)DY(1) Version: 7.3(0)N1(1) Version: 7.3(1)D1(1) Version: 7.3(1)DY(1) Version: 7.3(1)N1(1) Version: 7.3(2)D1(1) Version: 7.3(2)D1(2) Version: 7.3(2)D1(3) Version: 7.3(2)D1(3a) Version: 7.3(2)N1(1) Version: 7.3(3)N1(1) Version: 8.0(1) Version: 8.1(1) Version: 8.1(2) Version: 8.1(2a) Version: 8.1(1a) Version: 8.1(1b) Version: 8.2(1) Version: 8.2(2) Version: 8.2(3) Version: 8.2(4) Version: 8.2(5) Version: 8.2(6) Version: 8.2(7) Version: 8.2(7a) Version: 8.2(8) Version: 8.2(9) Version: 8.3(1) Version: 8.3(2) Version: 9.2(1) Version: 9.2(2) Version: 9.2(2t) Version: 9.2(3) Version: 9.2(4) Version: 9.2(2v) Version: 9.2(1a) Version: 7.3(4)N1(1) Version: 7.3(3)D1(1) Version: 7.3(4)D1(1) Version: 7.3(5)N1(1) Version: 5.2(1)SK3(1.1) Version: 5.2(1)SK3(2.1) Version: 5.2(1)SK3(2.2) Version: 5.2(1)SK3(2.2b) Version: 5.2(1)SK3(2.1a) Version: 5.2(1)SV5(1.1) Version: 5.2(1)SV5(1.2) Version: 5.2(1)SV5(1.3) Version: 5.2(1)SV5(1.3a) Version: 5.2(1)SV5(1.3b) Version: 5.2(1)SV5(1.3c) Version: 8.4(1) Version: 8.4(1a) Version: 8.4(2) Version: 8.4(2a) Version: 8.4(3) Version: 8.4(2b) Version: 8.4(4) Version: 8.4(2c) Version: 8.4(4a) Version: 8.4(5) Version: 8.4(2d) Version: 8.4(6) Version: 8.4(2e) Version: 8.4(6a) Version: 8.4(7) Version: 8.4(2f) Version: 9.3(1) Version: 9.3(2) Version: 9.3(3) Version: 9.3(4) Version: 9.3(5) Version: 9.3(6) Version: 9.3(7) Version: 9.3(7a) Version: 9.3(8) Version: 9.3(9) Version: 9.3(10) Version: 9.3(11) Version: 7.3(6)N1(1) Version: 7.3(5)D1(1) Version: 7.3(7)N1(1) Version: 7.3(7)N1(1a) Version: 7.3(7)N1(1b) Version: 7.3(6)D1(1) Version: 7.3(8)N1(1) Version: 7.3(7)D1(1) Version: 7.3(9)N1(1) Version: 10.1(1) Version: 10.1(2) Version: 10.1(2t) Version: 8.5(1) Version: 7.3(10)N1(1) Version: 7.3(8)D1(1) Version: 10.2(1) Version: 10.2(1q) Version: 10.2(2) Version: 10.2(3) Version: 10.2(3t) Version: 10.2(4) Version: 10.2(5) Version: 7.3(9)D1(1) Version: 7.3(11)N1(1) Version: 7.3(12)N1(1) Version: 10.3(1) Version: 10.3(2) Version: 7.3(13)N1(1) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.038Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-nxos-remoteauth-dos-XB6pv74m", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco NX-OS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.2(1)SV1(4)" }, { "status": "affected", "version": "4.2(1)SV1(4a)" }, { "status": "affected", "version": "4.2(1)SV1(4b)" }, { "status": "affected", "version": "4.2(1)SV1(5.1)" }, { "status": "affected", "version": "4.2(1)SV1(5.1a)" }, { "status": "affected", "version": "4.2(1)SV1(5.2)" }, { "status": "affected", "version": "4.2(1)SV1(5.2b)" }, { "status": "affected", "version": "4.2(1)SV2(1.1)" }, { "status": "affected", "version": "4.2(1)SV2(1.1a)" }, { "status": "affected", "version": "4.2(1)SV2(2.1)" }, { "status": "affected", "version": "4.2(1)SV2(2.1a)" }, { "status": "affected", "version": "4.2(1)SV2(2.2)" }, { "status": "affected", "version": "4.2(1)SV2(2.3)" }, { "status": "affected", "version": "5.2(1)SM1(5.1)" }, { "status": "affected", "version": "5.2(1)SM1(5.2)" }, { "status": "affected", "version": "5.2(1)SM1(5.2a)" }, { "status": "affected", "version": "5.2(1)SM1(5.2b)" }, { "status": "affected", "version": "5.2(1)SM1(5.2c)" }, { "status": "affected", "version": "5.2(1)SM3(1.1)" }, { "status": "affected", "version": "5.2(1)SM3(1.1a)" }, { "status": "affected", "version": "5.2(1)SM3(1.1b)" }, { "status": "affected", "version": "5.2(1)SM3(1.1c)" }, { "status": "affected", "version": "5.2(1)SM3(2.1)" }, { "status": "affected", "version": "5.2(1)SV3(1.4)" }, { "status": "affected", "version": "5.2(1)SV3(1.1)" }, { "status": "affected", "version": "5.2(1)SV3(1.3)" }, { "status": "affected", "version": "5.2(1)SV3(1.5a)" }, { "status": "affected", "version": "5.2(1)SV3(1.5b)" }, { "status": "affected", "version": "5.2(1)SV3(1.6)" }, { "status": "affected", "version": "5.2(1)SV3(1.10)" }, { "status": "affected", "version": "5.2(1)SV3(1.15)" }, { "status": "affected", "version": "5.2(1)SV3(2.1)" }, { "status": "affected", "version": "5.2(1)SV3(2.5)" }, { "status": "affected", "version": "5.2(1)SV3(2.8)" }, { "status": "affected", "version": "5.2(1)SV3(3.1)" }, { "status": "affected", "version": "5.2(1)SV3(1.2)" }, { "status": "affected", "version": "5.2(1)SV3(1.4b)" }, { "status": "affected", "version": "5.2(1)SV3(3.15)" }, { "status": "affected", "version": "5.2(1)SV3(4.1)" }, { "status": "affected", "version": "5.2(1)SV3(4.1a)" }, { "status": "affected", "version": "5.2(1)SV3(4.1b)" }, { "status": "affected", "version": "5.2(1)SV3(4.1c)" }, { "status": "affected", "version": "6.0(2)A3(1)" }, { "status": "affected", "version": "6.0(2)A3(2)" }, { "status": "affected", "version": "6.0(2)A3(4)" }, { "status": "affected", "version": "6.0(2)A4(1)" }, { "status": "affected", "version": "6.0(2)A4(2)" }, { "status": "affected", "version": "6.0(2)A4(3)" }, { "status": "affected", "version": "6.0(2)A4(4)" }, { "status": "affected", "version": "6.0(2)A4(5)" }, { "status": "affected", "version": "6.0(2)A4(6)" }, { "status": "affected", "version": "6.0(2)A6(1)" }, { "status": "affected", "version": "6.0(2)A6(1a)" }, { "status": "affected", "version": "6.0(2)A6(2)" }, { "status": "affected", "version": "6.0(2)A6(2a)" }, { "status": "affected", "version": "6.0(2)A6(3)" }, { "status": "affected", "version": "6.0(2)A6(3a)" }, { "status": "affected", "version": "6.0(2)A6(4)" }, { "status": "affected", "version": "6.0(2)A6(4a)" }, { "status": "affected", "version": "6.0(2)A6(5)" }, { "status": "affected", "version": "6.0(2)A6(5a)" }, { "status": "affected", "version": "6.0(2)A6(5b)" }, { "status": "affected", "version": "6.0(2)A6(6)" }, { "status": "affected", "version": "6.0(2)A6(7)" }, { "status": "affected", "version": "6.0(2)A6(8)" }, { "status": "affected", "version": "6.0(2)A7(1)" }, { "status": "affected", "version": "6.0(2)A7(1a)" }, { "status": "affected", "version": "6.0(2)A7(2)" }, { "status": "affected", "version": "6.0(2)A7(2a)" }, { "status": "affected", "version": "6.0(2)A8(1)" }, { "status": "affected", "version": "6.0(2)A8(2)" }, { "status": "affected", "version": "6.0(2)A8(3)" }, { "status": "affected", "version": "6.0(2)A8(4)" }, { "status": "affected", "version": "6.0(2)A8(4a)" }, { "status": "affected", "version": "6.0(2)A8(5)" }, { "status": "affected", "version": "6.0(2)A8(6)" }, { "status": "affected", "version": "6.0(2)A8(7)" }, { "status": "affected", "version": "6.0(2)A8(7a)" }, { "status": "affected", "version": "6.0(2)A8(7b)" }, { "status": "affected", "version": "6.0(2)A8(8)" }, { "status": "affected", "version": "6.0(2)A8(9)" }, { "status": "affected", "version": "6.0(2)A8(10a)" }, { "status": "affected", "version": "6.0(2)A8(10)" }, { "status": "affected", "version": "6.0(2)A8(11)" }, { "status": "affected", "version": "6.0(2)A8(11a)" }, { "status": "affected", "version": "6.0(2)A8(11b)" }, { "status": "affected", "version": "6.0(2)U2(1)" }, { "status": "affected", "version": "6.0(2)U2(2)" }, { "status": "affected", "version": "6.0(2)U2(3)" }, { "status": "affected", "version": "6.0(2)U2(4)" }, { "status": "affected", "version": "6.0(2)U2(5)" }, { "status": "affected", "version": "6.0(2)U2(6)" }, { "status": "affected", "version": "6.0(2)U3(1)" }, { "status": "affected", "version": "6.0(2)U3(2)" }, { "status": "affected", "version": "6.0(2)U3(3)" }, { "status": "affected", "version": "6.0(2)U3(4)" }, { "status": "affected", "version": "6.0(2)U3(5)" }, { "status": "affected", "version": "6.0(2)U3(6)" }, { "status": "affected", "version": "6.0(2)U3(7)" }, { "status": "affected", "version": "6.0(2)U3(8)" }, { "status": "affected", "version": "6.0(2)U3(9)" }, { "status": "affected", "version": "6.0(2)U4(1)" }, { "status": "affected", "version": "6.0(2)U4(2)" }, { "status": "affected", "version": "6.0(2)U4(3)" }, { "status": "affected", "version": "6.0(2)U4(4)" }, { "status": "affected", "version": "6.0(2)U5(1)" }, { "status": "affected", "version": "6.0(2)U5(2)" }, { "status": "affected", "version": "6.0(2)U5(3)" }, { "status": "affected", "version": "6.0(2)U5(4)" }, { "status": "affected", "version": "6.0(2)U6(1)" }, { "status": "affected", "version": "6.0(2)U6(2)" }, { "status": "affected", "version": "6.0(2)U6(3)" }, { "status": "affected", "version": "6.0(2)U6(4)" }, { "status": "affected", "version": "6.0(2)U6(5)" }, { "status": "affected", "version": "6.0(2)U6(6)" }, { "status": "affected", "version": "6.0(2)U6(7)" }, { "status": "affected", "version": "6.0(2)U6(8)" }, { "status": "affected", "version": "6.0(2)U6(1a)" }, { "status": "affected", "version": "6.0(2)U6(2a)" }, { "status": "affected", "version": "6.0(2)U6(3a)" }, { "status": "affected", "version": "6.0(2)U6(4a)" }, { "status": "affected", "version": "6.0(2)U6(5a)" }, { "status": "affected", "version": "6.0(2)U6(5b)" }, { "status": "affected", "version": "6.0(2)U6(5c)" }, { "status": "affected", "version": "6.0(2)U6(9)" }, { "status": "affected", "version": "6.0(2)U6(10)" }, { "status": "affected", "version": "6.2(2)" }, { "status": "affected", "version": "6.2(2a)" }, { "status": "affected", "version": "6.2(6)" }, { "status": "affected", "version": "6.2(6b)" }, { "status": "affected", "version": "6.2(8)" }, { "status": "affected", "version": "6.2(8a)" }, { "status": "affected", "version": "6.2(8b)" }, { "status": "affected", "version": "6.2(10)" }, { "status": "affected", "version": "6.2(12)" }, { "status": "affected", "version": "6.2(18)" }, { "status": "affected", "version": "6.2(16)" }, { "status": "affected", "version": "6.2(14)" }, { "status": "affected", "version": "6.2(6a)" }, { "status": "affected", "version": "6.2(20)" }, { "status": "affected", "version": "6.2(1)" }, { "status": "affected", "version": "6.2(3)" }, { "status": "affected", "version": "6.2(5)" }, { "status": "affected", "version": "6.2(5a)" }, { "status": "affected", "version": "6.2(5b)" }, { "status": "affected", "version": "6.2(7)" }, { "status": "affected", "version": "6.2(9)" }, { "status": "affected", "version": "6.2(9a)" }, { "status": "affected", "version": "6.2(9b)" }, { "status": "affected", "version": "6.2(9c)" }, { "status": "affected", "version": "6.2(11)" }, { "status": "affected", "version": "6.2(11b)" }, { "status": "affected", "version": "6.2(11c)" }, { "status": "affected", "version": "6.2(11d)" }, { "status": "affected", "version": "6.2(11e)" }, { "status": "affected", "version": "6.2(13)" }, { "status": "affected", "version": "6.2(13a)" }, { "status": "affected", "version": "6.2(13b)" }, { "status": "affected", "version": "6.2(15)" }, { "status": "affected", "version": "6.2(17)" }, { "status": "affected", "version": "6.2(19)" }, { "status": "affected", "version": "6.2(21)" }, { "status": "affected", "version": "6.2(23)" }, { "status": "affected", "version": "6.2(20a)" }, { "status": "affected", "version": "6.2(25)" }, { "status": "affected", "version": "6.2(22)" }, { "status": "affected", "version": "6.2(27)" }, { "status": "affected", "version": "6.2(29)" }, { "status": "affected", "version": "6.2(24)" }, { "status": "affected", "version": "6.2(31)" }, { "status": "affected", "version": "6.2(24a)" }, { "status": "affected", "version": "6.2(33)" }, { "status": "affected", "version": "7.0(3)F1(1)" }, { "status": "affected", "version": "7.0(3)F2(1)" }, { "status": "affected", "version": "7.0(3)F2(2)" }, { "status": "affected", "version": "7.0(3)F3(1)" }, { "status": "affected", "version": "7.0(3)F3(2)" }, { "status": "affected", "version": "7.0(3)F3(3)" }, { "status": "affected", "version": "7.0(3)F3(3a)" }, { "status": "affected", "version": "7.0(3)F3(4)" }, { "status": "affected", "version": "7.0(3)F3(3c)" }, { "status": "affected", "version": "7.0(3)F3(5)" }, { "status": "affected", "version": "7.0(3)I2(2a)" }, { "status": "affected", "version": "7.0(3)I2(2b)" }, { "status": "affected", "version": "7.0(3)I2(2c)" }, { "status": "affected", "version": "7.0(3)I2(2d)" }, { "status": "affected", "version": "7.0(3)I2(2e)" }, { "status": "affected", "version": "7.0(3)I2(3)" }, { "status": "affected", "version": "7.0(3)I2(4)" }, { "status": "affected", "version": "7.0(3)I2(5)" }, { "status": "affected", "version": "7.0(3)I2(1)" }, { "status": "affected", "version": "7.0(3)I2(1a)" }, { "status": "affected", "version": "7.0(3)I2(2)" }, { "status": "affected", "version": "7.0(3)I3(1)" }, { "status": "affected", "version": "7.0(3)I4(1)" }, { "status": "affected", "version": "7.0(3)I4(2)" }, { "status": "affected", "version": "7.0(3)I4(3)" }, { "status": "affected", "version": "7.0(3)I4(4)" }, { "status": "affected", "version": "7.0(3)I4(5)" }, { "status": "affected", "version": "7.0(3)I4(6)" }, { "status": "affected", "version": "7.0(3)I4(7)" }, { "status": "affected", "version": "7.0(3)I4(8)" }, { "status": "affected", "version": "7.0(3)I4(8a)" }, { "status": "affected", "version": "7.0(3)I4(8b)" }, { "status": "affected", "version": "7.0(3)I4(8z)" }, { "status": "affected", "version": "7.0(3)I4(9)" }, { "status": "affected", "version": "7.0(3)I5(1)" }, { "status": "affected", "version": "7.0(3)I5(2)" }, { "status": "affected", "version": "7.0(3)I6(1)" }, { "status": "affected", "version": "7.0(3)I6(2)" }, { "status": "affected", "version": "7.0(3)I7(1)" }, { "status": "affected", "version": "7.0(3)I7(2)" }, { "status": "affected", "version": "7.0(3)I7(3)" }, { "status": "affected", "version": "7.0(3)I7(4)" }, { "status": "affected", "version": "7.0(3)I7(5)" }, { "status": "affected", "version": "7.0(3)I7(5a)" }, { "status": "affected", "version": "7.0(3)I7(6)" }, { "status": "affected", "version": "7.0(3)I7(7)" }, { "status": "affected", "version": "7.0(3)I7(8)" }, { "status": "affected", "version": "7.0(3)I7(9)" }, { "status": "affected", "version": "7.0(3)I7(10)" }, { "status": "affected", "version": "7.1(0)N1(1a)" }, { "status": "affected", "version": "7.1(0)N1(1b)" }, { "status": "affected", "version": "7.1(0)N1(1)" }, { "status": "affected", "version": "7.1(1)N1(1)" }, { "status": "affected", "version": "7.1(2)N1(1)" }, { "status": "affected", "version": "7.1(3)N1(1)" }, { "status": "affected", "version": "7.1(3)N1(2)" }, { "status": "affected", "version": "7.1(4)N1(1)" }, { "status": "affected", "version": "7.1(5)N1(1)" }, { "status": "affected", "version": "7.1(5)N1(1b)" }, { "status": "affected", "version": "7.2(0)D1(1)" }, { "status": "affected", "version": "7.2(1)D1(1)" }, { "status": "affected", "version": "7.2(2)D1(2)" }, { "status": "affected", "version": "7.2(2)D1(1)" }, { "status": "affected", "version": "7.3(0)D1(1)" }, { "status": "affected", "version": "7.3(0)DX(1)" }, { "status": "affected", "version": "7.3(0)DY(1)" }, { "status": "affected", "version": "7.3(0)N1(1)" }, { "status": "affected", "version": "7.3(1)D1(1)" }, { "status": "affected", "version": "7.3(1)DY(1)" }, { "status": "affected", "version": "7.3(1)N1(1)" }, { "status": "affected", "version": "7.3(2)D1(1)" }, { "status": "affected", "version": "7.3(2)D1(2)" }, { "status": "affected", "version": "7.3(2)D1(3)" }, { "status": "affected", "version": "7.3(2)D1(3a)" }, { "status": "affected", "version": "7.3(2)N1(1)" }, { "status": "affected", "version": "7.3(3)N1(1)" }, { "status": "affected", "version": "8.0(1)" }, { "status": "affected", "version": "8.1(1)" }, { "status": "affected", "version": "8.1(2)" }, { "status": "affected", "version": "8.1(2a)" }, { "status": "affected", "version": "8.1(1a)" }, { "status": "affected", "version": "8.1(1b)" }, { "status": "affected", "version": "8.2(1)" }, { "status": "affected", "version": "8.2(2)" }, { "status": "affected", "version": "8.2(3)" }, { "status": "affected", "version": "8.2(4)" }, { "status": "affected", "version": "8.2(5)" }, { "status": "affected", "version": "8.2(6)" }, { "status": "affected", "version": "8.2(7)" }, { "status": "affected", "version": "8.2(7a)" }, { "status": "affected", "version": "8.2(8)" }, { "status": "affected", "version": "8.2(9)" }, { "status": "affected", "version": "8.3(1)" }, { "status": "affected", "version": "8.3(2)" }, { "status": "affected", "version": "9.2(1)" }, { "status": "affected", "version": "9.2(2)" }, { "status": "affected", "version": "9.2(2t)" }, { "status": "affected", "version": "9.2(3)" }, { "status": "affected", "version": "9.2(4)" }, { "status": "affected", "version": "9.2(2v)" }, { "status": "affected", "version": "9.2(1a)" }, { "status": "affected", "version": "7.3(4)N1(1)" }, { "status": "affected", "version": "7.3(3)D1(1)" }, { "status": "affected", "version": "7.3(4)D1(1)" }, { "status": "affected", "version": "7.3(5)N1(1)" }, { "status": "affected", "version": "5.2(1)SK3(1.1)" }, { "status": "affected", "version": "5.2(1)SK3(2.1)" }, { "status": "affected", "version": "5.2(1)SK3(2.2)" }, { "status": "affected", "version": "5.2(1)SK3(2.2b)" }, { "status": "affected", "version": "5.2(1)SK3(2.1a)" }, { "status": "affected", "version": "5.2(1)SV5(1.1)" }, { "status": "affected", "version": "5.2(1)SV5(1.2)" }, { "status": "affected", "version": "5.2(1)SV5(1.3)" }, { "status": "affected", "version": "5.2(1)SV5(1.3a)" }, { "status": "affected", "version": "5.2(1)SV5(1.3b)" }, { "status": "affected", "version": "5.2(1)SV5(1.3c)" }, { "status": "affected", "version": "8.4(1)" }, { "status": "affected", "version": "8.4(1a)" }, { "status": "affected", "version": "8.4(2)" }, { "status": "affected", "version": "8.4(2a)" }, { "status": "affected", "version": "8.4(3)" }, { "status": "affected", "version": "8.4(2b)" }, { "status": "affected", "version": "8.4(4)" }, { "status": "affected", "version": "8.4(2c)" }, { "status": "affected", "version": "8.4(4a)" }, { "status": "affected", "version": "8.4(5)" }, { "status": "affected", "version": "8.4(2d)" }, { "status": "affected", "version": "8.4(6)" }, { "status": "affected", "version": "8.4(2e)" }, { "status": "affected", "version": "8.4(6a)" }, { "status": "affected", "version": "8.4(7)" }, { "status": "affected", "version": "8.4(2f)" }, { "status": "affected", "version": "9.3(1)" }, { "status": "affected", "version": "9.3(2)" }, { "status": "affected", "version": "9.3(3)" }, { "status": "affected", "version": "9.3(4)" }, { "status": "affected", "version": "9.3(5)" }, { "status": "affected", "version": "9.3(6)" }, { "status": "affected", "version": "9.3(7)" }, { "status": "affected", "version": "9.3(7a)" }, { "status": "affected", "version": "9.3(8)" }, { "status": "affected", "version": "9.3(9)" }, { "status": "affected", "version": "9.3(10)" }, { "status": "affected", "version": "9.3(11)" }, { "status": "affected", "version": "7.3(6)N1(1)" }, { "status": "affected", "version": "7.3(5)D1(1)" }, { "status": "affected", "version": "7.3(7)N1(1)" }, { "status": "affected", "version": "7.3(7)N1(1a)" }, { "status": "affected", "version": "7.3(7)N1(1b)" }, { "status": "affected", "version": "7.3(6)D1(1)" }, { "status": "affected", "version": "7.3(8)N1(1)" }, { "status": "affected", "version": "7.3(7)D1(1)" }, { "status": "affected", "version": "7.3(9)N1(1)" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "10.1(2t)" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "7.3(10)N1(1)" }, { "status": "affected", "version": "7.3(8)D1(1)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "10.2(1q)" }, { "status": "affected", "version": "10.2(2)" }, { "status": "affected", "version": "10.2(3)" }, { "status": "affected", "version": "10.2(3t)" }, { "status": "affected", "version": "10.2(4)" }, { "status": "affected", "version": "10.2(5)" }, { "status": "affected", "version": "7.3(9)D1(1)" }, { "status": "affected", "version": "7.3(11)N1(1)" }, { "status": "affected", "version": "7.3(12)N1(1)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.3(2)" }, { "status": "affected", "version": "7.3(13)N1(1)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. " } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:48.712Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-nxos-remoteauth-dos-XB6pv74m", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m" } ], "source": { "advisory": "cisco-sa-nxos-remoteauth-dos-XB6pv74m", "defects": [ "CSCwe72368", "CSCwe72670", "CSCwe72648", "CSCwe72673", "CSCwe72674" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20168", "datePublished": "2023-08-23T18:07:53.428Z", "dateReserved": "2022-10-27T18:47:50.362Z", "dateUpdated": "2024-08-02T09:05:35.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0960 (GCVE-0-2008-0960)
Vulnerability from cvelistv5
Published
2008-06-10 18:00
Modified
2024-08-07 08:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30615" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30648" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30802" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30574" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30615" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30648" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30802" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30574" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2008-0960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380", "refsource": "CONFIRM", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "name": "35463", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35463" }, { "name": "30615", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30615" }, { "name": "http://support.apple.com/kb/HT2163", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT2163" }, { "name": "ADV-2008-1787", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "name": "30648", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30648" }, { "name": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "name": "32664", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32664" }, { "name": "ADV-2008-1981", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "name": "ADV-2008-1801", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "name": "SUSE-SA:2008:039", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "name": "[productinfo] 20080611 Ingate Firewall and SIParator affected by SNMPv3 vulnerability", "refsource": "MLIST", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "name": "31351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31351" }, { "name": "ADV-2008-1788", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "name": "FEDORA-2008-5215", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "name": "29623", "refsource": "BID", "url": "http://www.securityfocus.com/bid/29623" }, { "name": "31334", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31334" }, { "name": "ADV-2008-2971", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "name": "oval:org.mitre.oval:def:10820", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "name": "oval:org.mitre.oval:def:6414", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "name": "30626", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30626" }, { "name": "SSRT080082", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "name": "[oss-security] 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "name": "HPSBMA02439", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "name": "VU#878044", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/878044" }, { "name": "30647", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30647" }, { "name": "238865", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "name": "20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "name": "ADV-2008-1836", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "name": "33003", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33003" }, { "name": "20080610 SNMP Version 3 Authentication Vulnerabilities", "refsource": "CISCO", "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "name": "ADV-2008-2361", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "name": "31568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31568" }, { "name": "31467", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31467" }, { "name": "APPLE-SA-2008-06-30", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "name": "DSA-1663", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1663" }, { "name": "TA08-162A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "name": "http://www.ocert.org/advisories/ocert-2008-006.html", "refsource": "MISC", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "name": "RHSA-2008:0528", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "name": "3933", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3933" }, { "name": "RHSA-2008:0529", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "name": "30612", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30612" }, { "name": "30802", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30802" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=447974", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "name": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "name": "5790", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5790" }, { "name": "ADV-2008-1797", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "name": "GLSA-200808-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "name": "20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "name": "30665", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30665" }, { "name": "FEDORA-2008-5218", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "name": "FEDORA-2008-5224", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "name": "ADV-2008-1800", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "name": "MDVSA-2008:118", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "name": "USN-685-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=833770", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "name": "1020218", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020218" }, { "name": "30596", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30596" }, { "name": "oval:org.mitre.oval:def:5785", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "name": "ADV-2009-1612", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "name": "30574", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30574" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2008-0960", "datePublished": "2008-06-10T18:00:00", "dateReserved": "2008-02-25T00:00:00", "dateUpdated": "2024-08-07T08:01:40.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-08-30 09:15
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the attacker to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nx-os | 6.2 | |
cisco | nx-os | 7.3 | |
cisco | nx-os | 8.1 | |
cisco | nx-os | 8.2 | |
cisco | nx-os | 8.3 | |
cisco | mds_9000 | - | |
cisco | mds_9100 | - | |
cisco | mds_9140 | - | |
cisco | mds_9200 | - | |
cisco | mds_9500 | - | |
cisco | mds_9700 | - | |
cisco | nx-os | 6.0\(2\)a8\(9.7\) | |
cisco | nx-os | 6.0\(2\)u6 | |
cisco | nx-os | 7.0\(3\)i | |
cisco | nx-os | 9.2 | |
cisco | nx-os | 9.2\(1\) | |
cisco | nexus_3016 | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3064-t | - | |
cisco | nexus_31108pc-v | - | |
cisco | nexus_31108tc-v | - | |
cisco | nexus_31128pq | - | |
cisco | nexus_3132c-z | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3132q-v | - | |
cisco | nexus_3132q-xl | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172 | - | |
cisco | nexus_3172pq-xl | - | |
cisco | nexus_3172tq | - | |
cisco | nexus_3172tq-32t | - | |
cisco | nexus_3172tq-xl | - | |
cisco | nexus_3232c | - | |
cisco | nexus_3264c-e | - | |
cisco | nexus_3264q | - | |
cisco | nexus_3408-s | - | |
cisco | nexus_34180yc | - | |
cisco | nexus_3432d-s | - | |
cisco | nexus_3464c | - | |
cisco | nexus_9000v | - | |
cisco | nexus_92160yc-x | - | |
cisco | nexus_92300yc | - | |
cisco | nexus_92304qc | - | |
cisco | nexus_92348gc-x | - | |
cisco | nexus_9236c | - | |
cisco | nexus_9272q | - | |
cisco | nexus_93108tc-ex | - | |
cisco | nexus_93108tc-fx | - | |
cisco | nexus_93120tx | - | |
cisco | nexus_93128tx | - | |
cisco | nexus_93180lc-ex | - | |
cisco | nexus_93180yc-ex | - | |
cisco | nexus_93180yc-fx | - | |
cisco | nexus_93216tc-fx2 | - | |
cisco | nexus_93240yc-fx2 | - | |
cisco | nexus_9332c | - | |
cisco | nexus_9332pq | - | |
cisco | nexus_93360yc-fx2 | - | |
cisco | nexus_9336c-fx2 | - | |
cisco | nexus_9336pq_aci_spine | - | |
cisco | nexus_9348gc-fxp | - | |
cisco | nexus_9364c | - | |
cisco | nexus_9372px | - | |
cisco | nexus_9372px-e | - | |
cisco | nexus_9372tx | - | |
cisco | nexus_9372tx-e | - | |
cisco | nexus_9396px | - | |
cisco | nexus_9396tx | - | |
cisco | nx-os | 6.0\(2\)a8 | |
cisco | nx-os | 6.0\(2\)a8\(9.7\) | |
cisco | nx-os | 7.0\(3\)i7 | |
cisco | nx-os | 9.2 | |
cisco | nexus_3524 | - | |
cisco | nexus_3524-x | - | |
cisco | nexus_3524-xl | - | |
cisco | nexus_3548 | - | |
cisco | nexus_3548-x | - | |
cisco | nexus_3548-xl | - | |
cisco | nx-os | 6.0\(2\)a8\(9.7\) | |
cisco | nx-os | 7.0\(3\)f | |
cisco | nx-os | 9.2 | |
cisco | nx-os | 9.2\(1\) | |
cisco | nexus_36180yc-r | - | |
cisco | nexus_3636c-r | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9516 | - | |
cisco | nx-os | 7.1\(4\) | |
cisco | nx-os | 7.1\(4\)n1\(1\) | |
cisco | nx-os | 7.1\(5\) | |
cisco | nx-os | 7.2 | |
cisco | nx-os | 7.3 | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5696q | - | |
cisco | nexus_6001 | - | |
cisco | nexus_6004 | - | |
cisco | nx-os | 6.2 | |
cisco | nx-os | 7.2 | |
cisco | nx-os | 7.3 | |
cisco | nx-os | 7.3\(2\)d1\(1\) | |
cisco | nx-os | 8.0 | |
cisco | nx-os | 8.1 | |
cisco | nx-os | 8.2 | |
cisco | nx-os | 8.3 | |
cisco | nx-os | 8.3\(2\)s5 | |
cisco | nexus_7000 | - | |
cisco | nexus_7000_10-slot | - | |
cisco | nexus_7000_18-slot | - | |
cisco | nexus_7000_4-slot | - | |
cisco | nexus_7000_9-slot | - | |
cisco | nexus_7700 | - | |
cisco | nexus_7700_10-slot | - | |
cisco | nexus_7700_18-slot | - | |
cisco | nexus_7700_2-slot | - | |
cisco | nexus_7700_6-slot | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "AEF1AF20-C6CE-4956-8129-FA68E3B03E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "9501608B-3811-4C33-BDA1-721045284C7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F363BEDD-A8AC-4FB6-87DC-708F97F8375E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "E40D9097-C95A-4813-9DEE-89CA75820524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "399568C2-4198-4D2C-B694-FF4EFE5E4710", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FD00AB9-F2DD-4D07-8DFF-E7B34824D66A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:*", "matchCriteriaId": "F762E87A-BF80-4D33-ADDA-84369E068005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "B25B92ED-37C0-4653-9C5E-B4C13C46464C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "98CFE9BB-7BFE-4782-B602-2C6A1392693F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6:*:*:*:*:*:*:*", "matchCriteriaId": "0CDB1D59-C964-4D30-B55E-08E68562300C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i:*:*:*:*:*:*:*", "matchCriteriaId": "2C8702D0-13F8-4033-B675-90B380A5AC9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9E648A2-AFB2-4F84-B27A-F8AC7F67B36F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD96C7AE-EECC-43F4-9132-1E7F8047C701", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4283E433-7F8C-4410-B565-471415445811", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80AB6FB-32FD-43D7-A9F1-80FA47696210", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8:*:*:*:*:*:*:*", "matchCriteriaId": "9DCBF1FE-C124-4DBA-B127-D484D5C9110C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "98CFE9BB-7BFE-4782-B602-2C6A1392693F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBF467-C2E2-4ED9-8E8A-02E062E734D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9E648A2-AFB2-4F84-B27A-F8AC7F67B36F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9.7\\):*:*:*:*:*:*:*", "matchCriteriaId": "98CFE9BB-7BFE-4782-B602-2C6A1392693F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f:*:*:*:*:*:*:*", "matchCriteriaId": "E575893D-81E5-47E6-9531-50E044C2C3D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9E648A2-AFB2-4F84-B27A-F8AC7F67B36F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD96C7AE-EECC-43F4-9132-1E7F8047C701", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "57572E4A-78D5-4D1A-938B-F05F01759612", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "247F42D0-7B07-4F4A-95D9-648139D5F67D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9103A92E-C9F3-401B-AE30-66466210ADED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "01B3A010-8F62-4505-AB02-9A3E3FDC8C72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "5EE85C54-276F-462E-808A-23D3E54D31BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "9501608B-3811-4C33-BDA1-721045284C7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F557E38-09F6-42C6-BABA-3C3168B38BBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "AEF1AF20-C6CE-4956-8129-FA68E3B03E35", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "5EE85C54-276F-462E-808A-23D3E54D31BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "9501608B-3811-4C33-BDA1-721045284C7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FADC755B-3AB3-43D6-8495-1FABCBD548E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B36B056-C068-4413-B648-1D1D6026B823", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F363BEDD-A8AC-4FB6-87DC-708F97F8375E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "E40D9097-C95A-4813-9DEE-89CA75820524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "399568C2-4198-4D2C-B694-FF4EFE5E4710", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3\\(2\\)s5:*:*:*:*:*:*:*", "matchCriteriaId": "C733C52D-953A-4CDF-BD98-3102FE50CE70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEACA55F-4335-4478-B608-EB92EE1D6C6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5ABB175-81BE-4C46-BD2D-70016508BE22", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F93299-A715-4E97-87FE-B1E248EA98BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D71B228-FFE5-45F7-ADCF-6D359ADA6D31", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3AD807-5A0F-4DF5-9A7A-748205F409E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the attacker to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad Network Time Protocol (NTP) de Cisco NX-OS Software, podr\u00eda permitir a un atacante remoto no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. La vulnerabilidad es debido al uso excesivo de los recursos del sistema cuando el dispositivo afectado est\u00e1 registrando una acci\u00f3n de ca\u00edda para los paquetes NTP MODE_PRIVATE (Modo 7) recibidos. Un atacante podr\u00eda explotar esta vulnerabilidad inundando el dispositivo con un flujo constante de paquetes NTP de Modo 7. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar un uso elevado de CPU y memoria en el dispositivo afectado, lo que podr\u00eda causar que los procesos internos del sistema se reinicien o causar que el dispositivo afectado se recargue inesperadamente. Nota: La funcionalidad NTP est\u00e1 habilitada por defecto." } ], "id": "CVE-2019-1967", "lastModified": "2024-11-21T04:37:47.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-30T09:15:20.287", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ntp-dos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-23 03:15
Modified
2024-11-21 06:11
Severity ?
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
7.4 (High) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | fxos | * | |
cisco | fxos | * | |
cisco | fxos | * | |
cisco | fxos | * | |
cisco | fxos | * | |
cisco | fxos | * | |
cisco | fxos | * | |
cisco | firepower_4100 | - | |
cisco | firepower_4110 | - | |
cisco | firepower_4112 | - | |
cisco | firepower_4115 | - | |
cisco | firepower_4120 | - | |
cisco | firepower_4125 | - | |
cisco | firepower_4140 | - | |
cisco | firepower_4145 | - | |
cisco | firepower_4150 | - | |
cisco | firepower_9300 | - | |
cisco | firepower_9300_sm-24 | - | |
cisco | firepower_9300_sm-36 | - | |
cisco | firepower_9300_sm-40 | - | |
cisco | firepower_9300_sm-44 | - | |
cisco | firepower_9300_sm-44_x_3 | - | |
cisco | firepower_9300_sm-48 | - | |
cisco | firepower_9300_sm-56 | - | |
cisco | firepower_9300_sm-56_x_3 | - | |
cisco | firepower_9300_with_1_sm-24_module | - | |
cisco | firepower_9300_with_1_sm-36_module | - | |
cisco | firepower_9300_with_1_sm-44_module | - | |
cisco | firepower_9300_with_3_sm-44_module | - | |
cisco | firepower_extensible_operating_system | * | |
cisco | ios | * | |
cisco | ios_xe | * | |
cisco | ios_xr | * | |
cisco | nx-os | * | |
cisco | mds_9000 | - | |
cisco | mds_9100 | - | |
cisco | mds_9132t | - | |
cisco | mds_9134 | - | |
cisco | mds_9140 | - | |
cisco | mds_9148 | - | |
cisco | mds_9148s | - | |
cisco | mds_9148t | - | |
cisco | mds_9200 | - | |
cisco | mds_9216 | - | |
cisco | mds_9216a | - | |
cisco | mds_9216i | - | |
cisco | mds_9222i | - | |
cisco | mds_9250i | - | |
cisco | mds_9396s | - | |
cisco | mds_9396t | - | |
cisco | mds_9500 | - | |
cisco | mds_9506 | - | |
cisco | mds_9509 | - | |
cisco | mds_9513 | - | |
cisco | mds_9700 | - | |
cisco | mds_9706 | - | |
cisco | mds_9710 | - | |
cisco | mds_9718 | - | |
cisco | nexus_7000 | - | |
cisco | nexus_7000_10-slot | - | |
cisco | nexus_7000_18-slot | - | |
cisco | nexus_7000_4-slot | - | |
cisco | nexus_7000_9-slot | - | |
cisco | nexus_7000_supervisor_1 | - | |
cisco | nexus_7000_supervisor_2 | - | |
cisco | nexus_7000_supervisor_2e | - | |
cisco | nexus_7004 | - | |
cisco | nexus_7009 | - | |
cisco | nexus_7010 | - | |
cisco | nexus_7018 | - | |
cisco | nexus_7700 | - | |
cisco | nexus_7700_10-slot | - | |
cisco | nexus_7700_18-slot | - | |
cisco | nexus_7700_2-slot | - | |
cisco | nexus_7700_6-slot | - | |
cisco | nexus_7700_supervisor_2e | - | |
cisco | nexus_7700_supervisor_3e | - | |
cisco | nexus_7702 | - | |
cisco | nexus_7706 | - | |
cisco | nexus_7710 | - | |
cisco | nexus_7718 | - | |
cisco | firepower_extensible_operating_system | * | |
cisco | ios | * | |
cisco | ios_xe | * | |
cisco | ios_xr | * | |
cisco | nx-os | * | |
cisco | nexus_3000 | - | |
cisco | nexus_3016 | - | |
cisco | nexus_3016q | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3064-32t | - | |
cisco | nexus_3064-t | - | |
cisco | nexus_3064-x | - | |
cisco | nexus_3064t | - | |
cisco | nexus_3064x | - | |
cisco | nexus_3100 | - | |
cisco | nexus_3100-v | - | |
cisco | nexus_3100-z | - | |
cisco | nexus_3100v | - | |
cisco | nexus_31108pc-v | - | |
cisco | nexus_31108pv-v | - | |
cisco | nexus_31108tc-v | - | |
cisco | nexus_31128pq | - | |
cisco | nexus_3132c-z | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3132q-v | - | |
cisco | nexus_3132q-x | - | |
cisco | nexus_3132q-x\/3132q-xl | - | |
cisco | nexus_3132q-xl | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172 | - | |
cisco | nexus_3172pq | - | |
cisco | nexus_3172pq-xl | - | |
cisco | nexus_3172pq\/pq-xl | - | |
cisco | nexus_3172tq | - | |
cisco | nexus_3172tq-32t | - | |
cisco | nexus_3172tq-xl | - | |
cisco | nexus_3200 | - | |
cisco | nexus_3232c | - | |
cisco | nexus_3232c_ | - | |
cisco | nexus_3264c-e | - | |
cisco | nexus_3264q | - | |
cisco | nexus_3400 | - | |
cisco | nexus_3408-s | - | |
cisco | nexus_34180yc | - | |
cisco | nexus_34200yc-sm | - | |
cisco | nexus_3432d-s | - | |
cisco | nexus_3464c | - | |
cisco | nexus_3500 | - | |
cisco | nexus_3500_platform | - | |
cisco | nexus_3524 | - | |
cisco | nexus_3524-x | - | |
cisco | nexus_3524-x\/xl | - | |
cisco | nexus_3524-xl | - | |
cisco | nexus_3548 | - | |
cisco | nexus_3548-x | - | |
cisco | nexus_3548-x\/xl | - | |
cisco | nexus_3548-xl | - | |
cisco | nexus_3600 | - | |
cisco | nexus_36180yc-r | - | |
cisco | nexus_3636c-r | - | |
cisco | nexus_9000 | - | |
cisco | nexus_9000_in_aci_mode | - | |
cisco | nexus_9000_in_standalone | - | |
cisco | nexus_9000_in_standalone_nx-os_mode | - | |
cisco | nexus_9000v | - | |
cisco | nexus_9200 | - | |
cisco | nexus_92160yc-x | - | |
cisco | nexus_9221c | - | |
cisco | nexus_92300yc | - | |
cisco | nexus_92304qc | - | |
cisco | nexus_92348gc-x | - | |
cisco | nexus_9236c | - | |
cisco | nexus_9272q | - | |
cisco | nexus_9300 | - | |
cisco | nexus_93108tc-ex | - | |
cisco | nexus_93108tc-ex-24 | - | |
cisco | nexus_93108tc-fx | - | |
cisco | nexus_93108tc-fx-24 | - | |
cisco | nexus_93108tc-fx3p | - | |
cisco | nexus_93120tx | - | |
cisco | nexus_93128 | - | |
cisco | nexus_93128tx | - | |
cisco | nexus_9316d-gx | - | |
cisco | nexus_93180lc-ex | - | |
cisco | nexus_93180tc-ex | - | |
cisco | nexus_93180yc-ex | - | |
cisco | nexus_93180yc-ex-24 | - | |
cisco | nexus_93180yc-fx | - | |
cisco | nexus_93180yc-fx-24 | - | |
cisco | nexus_93180yc-fx3 | - | |
cisco | nexus_93180yc-fx3s | - | |
cisco | nexus_93216tc-fx2 | - | |
cisco | nexus_93240yc-fx2 | - | |
cisco | nexus_9332c | - | |
cisco | nexus_9332pq | - | |
cisco | nexus_93360yc-fx2 | - | |
cisco | nexus_9336c-fx2 | - | |
cisco | nexus_9336c-fx2-e | - | |
cisco | nexus_9336pq | - | |
cisco | nexus_9336pq_aci_spine | - | |
cisco | nexus_9348gc-fxp | - | |
cisco | nexus_93600cd-gx | - | |
cisco | nexus_9364c | - | |
cisco | nexus_9364c-gx | - | |
cisco | nexus_9372px | - | |
cisco | nexus_9372px-e | - | |
cisco | nexus_9372tx | - | |
cisco | nexus_9372tx-e | - | |
cisco | nexus_9396px | - | |
cisco | nexus_9396tx | - | |
cisco | nexus_9500 | - | |
cisco | nexus_9500_supervisor_a | - | |
cisco | nexus_9500_supervisor_a\+ | - | |
cisco | nexus_9500_supervisor_b | - | |
cisco | nexus_9500_supervisor_b\+ | - | |
cisco | nexus_9500r | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9516 | - | |
cisco | firepower_extensible_operating_system | * | |
cisco | ios | * | |
cisco | ios_xe | * | |
cisco | ios_xr | * | |
cisco | nx-os | * | |
cisco | nexus_5000 | - | |
cisco | nexus_5010 | - | |
cisco | nexus_5020 | - | |
cisco | nexus_5500 | - | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_5600 | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5672up-16g | - | |
cisco | nexus_5696q | - | |
cisco | nexus_6000 | - | |
cisco | nexus_6001 | - | |
cisco | nexus_6001p | - | |
cisco | nexus_6001t | - | |
cisco | nexus_6004 | - | |
cisco | nexus_6004x | - | |
cisco | firepower_extensible_operating_system | * | |
cisco | ios | * | |
cisco | ios_xe | * | |
cisco | ios_xr | * | |
cisco | nx-os | * | |
cisco | ucs_6200 | - | |
cisco | ucs_6248_up_fabric_interconnect | - | |
cisco | ucs_6248up | - | |
cisco | ucs_6296_up_fabric_interconnect | - | |
cisco | ucs_6296up | - | |
cisco | ucs_6300 | - | |
cisco | ucs_6324 | - | |
cisco | ucs_6324_fabric_interconnect | - | |
cisco | ucs_6332 | - | |
cisco | ucs_6332-16up | - | |
cisco | ucs_6332-16up_fabric_interconnect | - | |
cisco | ucs_6332_fabric_interconnect | - | |
cisco | firepower_extensible_operating_system | * | |
cisco | ios | * | |
cisco | ios_xe | * | |
cisco | ios_xr | * | |
cisco | nx-os | * | |
cisco | ucs_6400 | - | |
cisco | ucs_6454 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A21987E-AE24-4C2C-894A-FFF7CC0CA73B", "versionEndExcluding": "2.2.2.148", "versionStartIncluding": "2.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*", "matchCriteriaId": "3779F159-04B8-40D7-98D0-B1B68AE02C31", "versionEndExcluding": "2.3.1.216", "versionStartIncluding": "2.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F839DB11-1E63-4727-8AB0-ED0B5D6BC38A", "versionEndExcluding": "2.4.1.273", "versionStartIncluding": "2.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*", "matchCriteriaId": "440AAA0A-FEF8-4E40-95EC-59F37A63091D", "versionEndExcluding": "2.6.1.224", "versionStartIncluding": "2.6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*", "matchCriteriaId": "08C690B6-DE7E-417F-883A-3A3AE51F0710", "versionEndExcluding": "2.7.1.143", "versionStartIncluding": "2.7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*", "matchCriteriaId": "88F98150-EB80-41BB-9B80-520124E3FD9A", "versionEndExcluding": "2.8.1.143", "versionStartIncluding": "2.8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2E8B9E7-1023-4A0C-BC8C-C45F956B20BA", "versionEndExcluding": "2.9.1.135", "versionStartIncluding": "2.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firepower_4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9552E6-0B9B-4B32-BE79-90D4E3887A7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*", "matchCriteriaId": "957D64EB-D60E-4775-B9A8-B21CA48ED3B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*", "matchCriteriaId": "A694AD51-9008-4AE6-8240-98B17AB527EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*", "matchCriteriaId": "71DCEF22-ED20-4330-8502-EC2DD4C9838F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F4868A-6D62-479C-9C19-F9AABDBB6B24", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", "matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DAFDDA-718B-4B69-A524-B0CEB80FE960", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "18048A84-BA0F-48EF-AFFB-635FF7F70C66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:*", "matchCriteriaId": "317DF3DD-C7CD-4CA2-804F-A738E048BEB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*", "matchCriteriaId": "C13CF29B-9308-452B-B7E0-9E818B5A6C1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB527C2-855E-4BB9-BCA7-94BE86100D44", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-44_x_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E82C1B05-990D-49D2-B80A-C3EDD4082840", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "421D91C3-8AB3-45E1-9E55-13ED1A4A623E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D741945-8B0A-408D-A5FE-D5B38DC6D46A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9308CA67-E949-4338-A890-22B3C4428D70", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_with_1_sm-24_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C6CC11-470A-47A4-AAF5-D5580FB78562", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_with_1_sm-36_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4A2B35-5106-4F43-835A-7F97D2324373", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_with_1_sm-44_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0F7F452-9294-4445-A344-1A76B277C45D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_with_3_sm-44_module:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EA604D8-76C0-40B9-8675-02BEEA18E432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "82542890-87E9-4C92-9B20-7CC668B4E5E1", "versionEndIncluding": "8.4\\(3.115\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "2D8583BD-4586-4AB0-9C7A-BC14385AACE8", "versionEndIncluding": "8.4\\(3.115\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "657840E3-B3E9-4218-A89D-F27D8DC269C6", "versionEndIncluding": "8.4\\(3.115\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "matchCriteriaId": "B36972DF-1BEB-48EB-9C79-725AA493F87C", "versionEndIncluding": "8.4\\(3.115\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "08D3FFC7-2C86-4162-B1E8-C9FF39F4465B", "versionEndIncluding": "8.4\\(3.115\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FD00AB9-F2DD-4D07-8DFF-E7B34824D66A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*", "matchCriteriaId": "56426D35-FCFD-406E-9144-2E66C8C86EFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9134:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB00911-C0B0-4A4E-A0B9-413EC9D9C25A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:*", "matchCriteriaId": "F762E87A-BF80-4D33-ADDA-84369E068005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148:-:*:*:*:*:*:*:*", "matchCriteriaId": "22E6B85A-3988-4EC5-B788-9664772CE64E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D25FA4A8-408B-4E94-B7D9-7DC54B61322F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*", "matchCriteriaId": "831B6D0F-A975-4CBA-B5BB-0AC4AD718FE8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "B25B92ED-37C0-4653-9C5E-B4C13C46464C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A72BDC4-6640-45CC-A128-0CDEE38D3ADC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*", "matchCriteriaId": "90094569-AA2C-4D35-807F-9551FACE255F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*", "matchCriteriaId": "306AFBC9-A236-4D03-A1EB-CE7E838D8415", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*", "matchCriteriaId": "12DB1A25-A7C9-412F-88BC-E89588896395", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CD5738-029B-43AA-9342-63719DC16138", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF9DC03-5370-46FD-9CA8-AC4DF5E922FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E81D2CC1-376A-4D87-88EA-6E1831741EC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*", "matchCriteriaId": "3925D2CF-9D7C-4498-8AF2-45E15D5D009F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*", "matchCriteriaId": "C677D356-86C9-4491-A6CA-5E6306B2BB70", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A3C579-7AAD-41A4-947F-CCB9B09402A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*", "matchCriteriaId": "5182CB50-4D32-4835-B1A8-817D989F919F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*", "matchCriteriaId": "36B3B617-7554-4C36-9B41-19AA3BD2F6E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*", "matchCriteriaId": "B88879A9-A7F5-41E0-8A38-0E09E3FD27F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEACA55F-4335-4478-B608-EB92EE1D6C6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "993AFE99-DFC3-4D92-90C8-D3A6495547BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7453E0FA-B05D-4888-AFB0-8FE8B8040DFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*", "matchCriteriaId": "108DB6B5-CB29-477F-84FC-52116F295878", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:*", "matchCriteriaId": "36145717-6348-466D-87B4-B1A19F17BA55", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:*", "matchCriteriaId": "4831C5F4-AF09-4951-B7AC-9DAF1C7045B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBDCF9-562C-44BA-B709-F91346F6F99F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:*", "matchCriteriaId": "276BD181-125C-48EC-984C-29BAE20C21F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5ABB175-81BE-4C46-BD2D-70016508BE22", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F93299-A715-4E97-87FE-B1E248EA98BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D71B228-FFE5-45F7-ADCF-6D359ADA6D31", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3AD807-5A0F-4DF5-9A7A-748205F409E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBB9435-1CD4-469E-BF16-AD98ADC99AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ABB93D-2C3A-4029-B545-B638B6C7788E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596B885-5312-489B-BBDB-A5374E525DE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7706:-:*:*:*:*:*:*:*", "matchCriteriaId": "42EC10DA-FE01-4BA3-B49F-B164F697D4BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7710:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1655CC-9BD5-4BD5-B113-776E4335D556", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7718:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA6F9ED-50A1-4D61-BC83-438585646856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "04E18F69-07F4-4BEA-9867-B79351687D32", "versionEndIncluding": "7.0\\(3\\)i7\\(9\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC79F46-3416-4D95-A839-BA707A9E22E2", "versionEndIncluding": "7.0\\(3\\)i7\\(9\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4673FD6-3C58-41BA-AA7F-C26FE42ECBD4", "versionEndIncluding": "7.0\\(3\\)i7\\(9\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "matchCriteriaId": "4328C1A9-F5B4-4D6B-8B2D-03BFC5310EDC", "versionEndIncluding": "7.0\\(3\\)i7\\(9\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DC5D36F-834A-44EA-BCC8-A71BBA202A4F", "versionEndIncluding": "7.0\\(3\\)i7\\(9\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "10FFC5E8-CC5A-4D31-A63A-19E72EC442AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "09AC2BAD-F536-48D0-A2F0-D4E290519EB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8FF2EC4-0C09-4C00-9956-A2A4A894F63D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14D4B4E-120E-4607-A4F1-447C7BF3052E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "15702ACB-29F3-412D-8805-E107E0729E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B34855-D8D2-4114-80D2-A4D159C62458", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C97C29EE-9426-4BBE-8D84-AB5FF748703D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E142C18F-9FB5-4D96-866A-141D7D16CAF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFC116A-627F-4E05-B631-651D161217C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "32A532C0-B0E3-484A-B356-88970E7D0248", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*", "matchCriteriaId": "D008CA1C-6F5A-40EA-BB12-A9D84D5AF700", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*", "matchCriteriaId": "43913A0E-50D5-47DD-94D8-DD3391633619", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA52D5C1-13D8-4D23-B022-954CCEF491F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E1073F-D374-4311-8F12-AD8C72FAA293", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3500_platform:-:*:*:*:*:*:*:*", "matchCriteriaId": "B72E8456-A9BD-447B-8F33-4BEB052A82D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E505C0B1-2119-4C6A-BF96-C282C633D169", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "915EF8F6-6039-4DD0-B875-30D911752B74", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "97217080-455C-48E4-8CE1-6D5B9485864F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "57572E4A-78D5-4D1A-938B-F05F01759612", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EBEBA5B-5589-417B-BF3B-976083E9FE54", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000_in_aci_mode:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BC5903-1316-4FFF-BE52-2F6D63549590", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000_in_standalone:-:*:*:*:*:*:*:*", "matchCriteriaId": "4755F890-634B-4B25-AF08-C34F13429FA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA62800-F5DC-48DA-8C81-D684EA8EBB9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "532CE4B0-A3C9-4613-AAAF-727817D06FB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4283E433-7F8C-4410-B565-471415445811", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFB9FDE8-8533-4F65-BF32-4066D042B2F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80AB6FB-32FD-43D7-A9F1-80FA47696210", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "92E2CB2B-DA11-4CF7-9D57-3D4D48990DC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E40F42-632A-47DF-BE33-DC25B826310B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBEF7F26-BB47-44BD-872E-130820557C23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*", "matchCriteriaId": "F309E7B9-B828-4CD2-9D2B-8966EE5B9CC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "102F91CD-DFB6-43D4-AE5B-DA157A696230", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DB6FC5-762A-4F16-AE8C-69330EFCF640", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "5394DE31-3863-4CA9-B7B1-E5227183100D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CE49B45-F2E9-491D-9C29-1B46E9CE14E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F1127D2-12C0-454F-91EF-5EE334070D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CF467E2-4567-426E-8F48-39669E0F514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "63BE0266-1C00-4D6A-AD96-7F82532ABAA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*", "matchCriteriaId": "31B9D1E4-10B9-4B6F-B848-D93ABF6486D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB270C45-756E-400A-979F-D07D750C881A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8A085C-2DBA-4269-AB01-B16019FBB4DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79DD582-AF68-44F1-B640-766B46EF2BE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*", "matchCriteriaId": "B04484DA-AA59-4833-916E-6A8C96D34F0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "24A634C9-C1DA-4D2D-BA5F-1EFC05756E5A", "versionEndIncluding": "7.3\\(8\\)n1\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCA44694-9D36-4E97-83F7-A1FEAC6717AB", "versionEndIncluding": "7.3\\(8\\)n1\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D6F83F0-AF30-453D-BB96-FE56A04C4971", "versionEndIncluding": "7.3\\(8\\)n1\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0EFE3A3-2469-445E-A325-BC3F1D72FCA6", "versionEndIncluding": "7.3\\(8\\)n1\\(1\\)", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "74A7DECE-B92C-471A-8A74-F1D5B5254A9B", "versionEndIncluding": "7.3\\(8\\)n1\\(1\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*", "matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC8699E-81C0-4374-B827-71B3916B910D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "870F4379-68F6-4B34-B99B-107DFE0DBD63", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*", "matchCriteriaId": "367C2A49-4C4D-471B-9B34-AFAFA5AE9503", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A58223F-3B15-420B-A6D4-841451CF0380", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51EAD169-9036-496E-B740-45D79546F6D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E01F0DE-EA8A-451F-BADF-1A7A48B0C633", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F557E38-09F6-42C6-BABA-3C3168B38BBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F182AD1-6E51-456A-A8F7-8F3B92DBE4D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "76CF6300-0292-4E53-B28D-865C2303BA51", "versionEndIncluding": "3.2\\(3o\\)a", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "16B79C2F-DAE9-4AD4-AFDA-DADD43E650AD", "versionEndIncluding": "3.2\\(3o\\)a", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "980DD4C4-A6C0-4D2D-BD09-21B62C4ADC71", "versionEndIncluding": "3.2\\(3o\\)a", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "matchCriteriaId": "62C92804-B959-43E1-9133-C16E58921D9A", "versionEndIncluding": "3.2\\(3o\\)a", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "F063A1CB-6FC6-46EF-AF2E-1E211C7CA41F", "versionEndIncluding": "3.2\\(3o\\)a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B96E5C-CC27-4020-93CE-413B95DCABB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6248_up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "D96AB2BB-4F4A-44C3-918F-DDB31B0D1FFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*", "matchCriteriaId": "49112D3F-DFAD-4E71-992B-9E0640FA388C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6296_up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "82775AC1-173D-4335-B13A-6CF73C9C11D8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A1D8F2-A4A6-4BAC-8326-9F9DE9572FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BCF41B-A617-4563-8D14-E906411354FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82093C6-B36D-4E4E-AD7F-8C107646B8D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6324_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "104AB7AA-2AB6-40AB-9BCA-2041396060B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*", "matchCriteriaId": "E406DDCE-6753-43E9-B6F0-7A038DE84E41", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*", "matchCriteriaId": "054D8EB2-97A3-4725-9DFF-27A4D231D90A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6332-16up_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEAF3163-4FF6-4BB0-8870-80D3F3F2953B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6332_fabric_interconnect:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB5291D-D248-4125-9129-BC655F082AD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "17BAF9DA-E605-42D2-8DF9-A7211ADBEA74", "versionEndIncluding": "4.1\\(1a\\)a", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "matchCriteriaId": "81771B6E-4D9D-470B-8072-50E9F1F654CD", "versionEndIncluding": "4.1\\(1a\\)a", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6D87151-01B0-4069-861C-BBB57C493EB3", "versionEndIncluding": "4.1\\(1a\\)a", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7561ED7-D773-4A88-B145-EEC3F7A6269B", "versionEndIncluding": "4.1\\(1a\\)a", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "F063A1CB-6FC6-46EF-AF2E-1E211C7CA41F", "versionEndIncluding": "3.2\\(3o\\)a", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1888B66-5CF7-4D4D-B832-E2CF75D6EAD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD096B7-6F8E-4E48-9EC4-9A10AA7D9AA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad Unidirectional Link Detection (UDLD) de Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, y Cisco NX-OS Software podr\u00eda permitir a un atacante adyacente no autenticado causar la recarga de un dispositivo afectado. Esta vulnerabilidad es debido a una comprobaci\u00f3n inapropiada de entrada de los paquetes UDLD. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de paquetes UDLD espec\u00edficamente dise\u00f1ados a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar la recarga del dispositivo afectado, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Nota: La funcionalidad UDLD est\u00e1 deshabilitada por defecto, y las condiciones para explotar esta vulnerabilidad son estrictas. Un atacante debe tener el control total de un dispositivo conectado directamente. En los dispositivos Cisco IOS XR, el impacto se limita a la recarga del proceso UDLD" } ], "id": "CVE-2021-34714", "lastModified": "2024-11-21T06:11:01.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-23T03:15:18.153", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-29 01:43
Modified
2025-05-21 17:48
Severity ?
6.6 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
6.6 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
6.6 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H
Summary
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device and having an authenticated user retrieve LLDP statistics from the affected device through CLI show commands or Simple Network Management Protocol (SNMP) requests. A successful exploit could allow the attacker to cause the LLDP service to crash and stop running on the affected device. In certain situations, the LLDP crash may result in a reload of the affected device.
Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | firepower_extensible_operating_system | 2.2.1.63 | |
cisco | firepower_extensible_operating_system | 2.2.1.66 | |
cisco | firepower_extensible_operating_system | 2.2.1.70 | |
cisco | firepower_extensible_operating_system | 2.2.2.17 | |
cisco | firepower_extensible_operating_system | 2.2.2.19 | |
cisco | firepower_extensible_operating_system | 2.2.2.24 | |
cisco | firepower_extensible_operating_system | 2.2.2.26 | |
cisco | firepower_extensible_operating_system | 2.2.2.28 | |
cisco | firepower_extensible_operating_system | 2.2.2.54 | |
cisco | firepower_extensible_operating_system | 2.2.2.60 | |
cisco | firepower_extensible_operating_system | 2.2.2.71 | |
cisco | firepower_extensible_operating_system | 2.2.2.83 | |
cisco | firepower_extensible_operating_system | 2.2.2.86 | |
cisco | firepower_extensible_operating_system | 2.2.2.91 | |
cisco | firepower_extensible_operating_system | 2.2.2.97 | |
cisco | firepower_extensible_operating_system | 2.2.2.101 | |
cisco | firepower_extensible_operating_system | 2.2.2.137 | |
cisco | firepower_extensible_operating_system | 2.2.2.148 | |
cisco | firepower_extensible_operating_system | 2.2.2.149 | |
cisco | firepower_extensible_operating_system | 2.3.1.56 | |
cisco | firepower_extensible_operating_system | 2.3.1.58 | |
cisco | firepower_extensible_operating_system | 2.3.1.66 | |
cisco | firepower_extensible_operating_system | 2.3.1.73 | |
cisco | firepower_extensible_operating_system | 2.3.1.75 | |
cisco | firepower_extensible_operating_system | 2.3.1.88 | |
cisco | firepower_extensible_operating_system | 2.3.1.91 | |
cisco | firepower_extensible_operating_system | 2.3.1.93 | |
cisco | firepower_extensible_operating_system | 2.3.1.99 | |
cisco | firepower_extensible_operating_system | 2.3.1.110 | |
cisco | firepower_extensible_operating_system | 2.3.1.111 | |
cisco | firepower_extensible_operating_system | 2.3.1.130 | |
cisco | firepower_extensible_operating_system | 2.3.1.144 | |
cisco | firepower_extensible_operating_system | 2.3.1.145 | |
cisco | firepower_extensible_operating_system | 2.3.1.155 | |
cisco | firepower_extensible_operating_system | 2.3.1.166 | |
cisco | firepower_extensible_operating_system | 2.3.1.173 | |
cisco | firepower_extensible_operating_system | 2.3.1.179 | |
cisco | firepower_extensible_operating_system | 2.3.1.180 | |
cisco | firepower_extensible_operating_system | 2.3.1.190 | |
cisco | firepower_extensible_operating_system | 2.3.1.215 | |
cisco | firepower_extensible_operating_system | 2.3.1.216 | |
cisco | firepower_extensible_operating_system | 2.3.1.219 | |
cisco | firepower_extensible_operating_system | 2.3.1.230 | |
cisco | firepower_extensible_operating_system | 2.6.1.131 | |
cisco | firepower_extensible_operating_system | 2.6.1.157 | |
cisco | firepower_extensible_operating_system | 2.6.1.166 | |
cisco | firepower_extensible_operating_system | 2.6.1.169 | |
cisco | firepower_extensible_operating_system | 2.6.1.174 | |
cisco | firepower_extensible_operating_system | 2.6.1.187 | |
cisco | firepower_extensible_operating_system | 2.6.1.192 | |
cisco | firepower_extensible_operating_system | 2.6.1.204 | |
cisco | firepower_extensible_operating_system | 2.6.1.214 | |
cisco | firepower_extensible_operating_system | 2.6.1.224 | |
cisco | firepower_extensible_operating_system | 2.6.1.229 | |
cisco | firepower_extensible_operating_system | 2.6.1.230 | |
cisco | firepower_extensible_operating_system | 2.6.1.238 | |
cisco | firepower_extensible_operating_system | 2.6.1.239 | |
cisco | firepower_extensible_operating_system | 2.6.1.254 | |
cisco | firepower_extensible_operating_system | 2.6.1.259 | |
cisco | firepower_extensible_operating_system | 2.6.1.264 | |
cisco | firepower_extensible_operating_system | 2.6.1.265 | |
cisco | firepower_extensible_operating_system | 2.8.1.105 | |
cisco | firepower_extensible_operating_system | 2.8.1.125 | |
cisco | firepower_extensible_operating_system | 2.8.1.139 | |
cisco | firepower_extensible_operating_system | 2.8.1.143 | |
cisco | firepower_extensible_operating_system | 2.8.1.152 | |
cisco | firepower_extensible_operating_system | 2.8.1.162 | |
cisco | firepower_extensible_operating_system | 2.8.1.164 | |
cisco | firepower_extensible_operating_system | 2.8.1.172 | |
cisco | firepower_extensible_operating_system | 2.8.1.186 | |
cisco | firepower_extensible_operating_system | 2.8.1.190 | |
cisco | firepower_extensible_operating_system | 2.8.1.198 | |
cisco | firepower_extensible_operating_system | 2.9.1.131 | |
cisco | firepower_extensible_operating_system | 2.9.1.135 | |
cisco | firepower_extensible_operating_system | 2.9.1.143 | |
cisco | firepower_extensible_operating_system | 2.9.1.150 | |
cisco | firepower_extensible_operating_system | 2.9.1.158 | |
cisco | firepower_extensible_operating_system | 2.10.1.159 | |
cisco | firepower_extensible_operating_system | 2.10.1.166 | |
cisco | firepower_extensible_operating_system | 2.10.1.179 | |
cisco | firepower_extensible_operating_system | 2.10.1.207 | |
cisco | firepower_extensible_operating_system | 2.10.1.234 | |
cisco | firepower_extensible_operating_system | 2.10.1.245 | |
cisco | firepower_extensible_operating_system | 2.10.1.271 | |
cisco | firepower_extensible_operating_system | 2.11.1.154 | |
cisco | firepower_extensible_operating_system | 2.11.1.182 | |
cisco | firepower_extensible_operating_system | 2.11.1.200 | |
cisco | firepower_extensible_operating_system | 2.11.1.205 | |
cisco | firepower_extensible_operating_system | 2.12.0.31 | |
cisco | firepower_extensible_operating_system | 2.12.0.432 | |
cisco | firepower_extensible_operating_system | 2.12.0.450 | |
cisco | firepower_extensible_operating_system | 2.12.0.467 | |
cisco | firepower_extensible_operating_system | 2.12.0.498 | |
cisco | firepower_extensible_operating_system | 2.12.1.29 | |
cisco | firepower_extensible_operating_system | 2.12.1.48 | |
cisco | firepower_extensible_operating_system | 2.13.0.198 | |
cisco | firepower_extensible_operating_system | 2.13.0.212 | |
cisco | firepower_extensible_operating_system | 2.13.0.243 | |
cisco | firepower_extensible_operating_system | 2.14.1.131 | |
cisco | firepower_4110 | - | |
cisco | firepower_4112 | - | |
cisco | firepower_4115 | - | |
cisco | firepower_4120 | - | |
cisco | firepower_4125 | - | |
cisco | firepower_4140 | - | |
cisco | firepower_4145 | - | |
cisco | firepower_4150 | - | |
cisco | firepower_9300_sm-24 | - | |
cisco | firepower_9300_sm-36 | - | |
cisco | firepower_9300_sm-40 | - | |
cisco | firepower_9300_sm-44 | - | |
cisco | firepower_9300_sm-48 | - | |
cisco | firepower_9300_sm-56 | - | |
cisco | nx-os | 12.0\(1m\) | |
cisco | nx-os | 12.0\(1n\) | |
cisco | nx-os | 12.0\(1o\) | |
cisco | nx-os | 12.0\(1p\) | |
cisco | nx-os | 12.0\(1q\) | |
cisco | nx-os | 12.0\(1r\) | |
cisco | nx-os | 12.0\(2f\) | |
cisco | nx-os | 12.0\(2g\) | |
cisco | nx-os | 12.0\(2h\) | |
cisco | nx-os | 12.0\(2l\) | |
cisco | nx-os | 12.0\(2m\) | |
cisco | nx-os | 12.0\(2n\) | |
cisco | nx-os | 12.0\(2o\) | |
cisco | nx-os | 12.1\(1h\) | |
cisco | nx-os | 12.1\(1i\) | |
cisco | nx-os | 12.1\(2e\) | |
cisco | nx-os | 12.1\(2g\) | |
cisco | nx-os | 12.1\(2k\) | |
cisco | nx-os | 12.1\(3g\) | |
cisco | nx-os | 12.1\(3h\) | |
cisco | nx-os | 12.1\(3j\) | |
cisco | nx-os | 12.1\(4a\) | |
cisco | nx-os | 12.2\(1n\) | |
cisco | nx-os | 12.2\(1o\) | |
cisco | nx-os | 12.2\(2e\) | |
cisco | nx-os | 12.2\(2f\) | |
cisco | nx-os | 12.2\(2i\) | |
cisco | nx-os | 12.2\(2j\) | |
cisco | nx-os | 12.2\(2k\) | |
cisco | nx-os | 12.2\(2q\) | |
cisco | nx-os | 12.2\(3j\) | |
cisco | nx-os | 12.2\(3p\) | |
cisco | nx-os | 12.2\(3r\) | |
cisco | nx-os | 12.2\(3s\) | |
cisco | nx-os | 12.2\(3t\) | |
cisco | nx-os | 12.2\(4f\) | |
cisco | nx-os | 12.2\(4p\) | |
cisco | nx-os | 12.2\(4q\) | |
cisco | nx-os | 12.2\(4r\) | |
cisco | nx-os | 12.3\(1e\) | |
cisco | nx-os | 12.3\(1f\) | |
cisco | nx-os | 12.3\(1i\) | |
cisco | nx-os | 12.3\(1l\) | |
cisco | nx-os | 12.3\(1o\) | |
cisco | nx-os | 12.3\(1p\) | |
cisco | nx-os | 13.0\(1k\) | |
cisco | nx-os | 13.0\(2h\) | |
cisco | nx-os | 13.0\(2k\) | |
cisco | nx-os | 13.0\(2n\) | |
cisco | nx-os | 13.1\(1i\) | |
cisco | nx-os | 13.1\(2m\) | |
cisco | nx-os | 13.1\(2o\) | |
cisco | nx-os | 13.1\(2p\) | |
cisco | nx-os | 13.1\(2q\) | |
cisco | nx-os | 13.1\(2s\) | |
cisco | nx-os | 13.1\(2t\) | |
cisco | nx-os | 13.1\(2u\) | |
cisco | nx-os | 13.1\(2v\) | |
cisco | nx-os | 13.2\(1l\) | |
cisco | nx-os | 13.2\(1m\) | |
cisco | nx-os | 13.2\(2l\) | |
cisco | nx-os | 13.2\(2o\) | |
cisco | nx-os | 13.2\(3i\) | |
cisco | nx-os | 13.2\(3n\) | |
cisco | nx-os | 13.2\(3o\) | |
cisco | nx-os | 13.2\(3r\) | |
cisco | nx-os | 13.2\(3s\) | |
cisco | nx-os | 13.2\(4d\) | |
cisco | nx-os | 13.2\(4e\) | |
cisco | nx-os | 13.2\(5d\) | |
cisco | nx-os | 13.2\(5e\) | |
cisco | nx-os | 13.2\(5f\) | |
cisco | nx-os | 13.2\(6i\) | |
cisco | nx-os | 13.2\(7f\) | |
cisco | nx-os | 13.2\(7k\) | |
cisco | nx-os | 13.2\(9b\) | |
cisco | nx-os | 13.2\(9f\) | |
cisco | nx-os | 13.2\(9h\) | |
cisco | nx-os | 13.2\(10e\) | |
cisco | nx-os | 13.2\(10f\) | |
cisco | nx-os | 13.2\(10g\) | |
cisco | nx-os | 14.0\(1h\) | |
cisco | nx-os | 14.0\(2c\) | |
cisco | nx-os | 14.0\(3c\) | |
cisco | nx-os | 14.0\(3d\) | |
cisco | nx-os | 14.1\(1i\) | |
cisco | nx-os | 14.1\(1j\) | |
cisco | nx-os | 14.1\(1k\) | |
cisco | nx-os | 14.1\(1l\) | |
cisco | nx-os | 14.1\(2g\) | |
cisco | nx-os | 14.1\(2m\) | |
cisco | nx-os | 14.1\(2o\) | |
cisco | nx-os | 14.1\(2s\) | |
cisco | nx-os | 14.1\(2u\) | |
cisco | nx-os | 14.1\(2w\) | |
cisco | nx-os | 14.1\(2x\) | |
cisco | nx-os | 14.2\(1i\) | |
cisco | nx-os | 14.2\(1j\) | |
cisco | nx-os | 14.2\(1l\) | |
cisco | nx-os | 14.2\(2e\) | |
cisco | nx-os | 14.2\(2f\) | |
cisco | nx-os | 14.2\(2g\) | |
cisco | nx-os | 14.2\(3j\) | |
cisco | nx-os | 14.2\(3l\) | |
cisco | nx-os | 14.2\(3n\) | |
cisco | nx-os | 14.2\(3q\) | |
cisco | nx-os | 14.2\(4i\) | |
cisco | nx-os | 14.2\(4k\) | |
cisco | nx-os | 14.2\(4o\) | |
cisco | nx-os | 14.2\(4p\) | |
cisco | nx-os | 14.2\(5k\) | |
cisco | nx-os | 14.2\(5l\) | |
cisco | nx-os | 14.2\(5n\) | |
cisco | nx-os | 14.2\(6d\) | |
cisco | nx-os | 14.2\(6g\) | |
cisco | nx-os | 14.2\(6h\) | |
cisco | nx-os | 14.2\(6l\) | |
cisco | nx-os | 14.2\(6o\) | |
cisco | nx-os | 14.2\(7f\) | |
cisco | nx-os | 14.2\(7l\) | |
cisco | nx-os | 14.2\(7q\) | |
cisco | nx-os | 14.2\(7r\) | |
cisco | nx-os | 14.2\(7s\) | |
cisco | nx-os | 14.2\(7t\) | |
cisco | nx-os | 14.2\(7u\) | |
cisco | nx-os | 14.2\(7v\) | |
cisco | nx-os | 14.2\(7w\) | |
cisco | nx-os | 15.0\(1k\) | |
cisco | nx-os | 15.0\(1l\) | |
cisco | nx-os | 15.0\(2e\) | |
cisco | nx-os | 15.0\(2h\) | |
cisco | nx-os | 15.1\(1h\) | |
cisco | nx-os | 15.1\(2e\) | |
cisco | nx-os | 15.1\(3e\) | |
cisco | nx-os | 15.1\(4c\) | |
cisco | nx-os | 15.2\(1g\) | |
cisco | nx-os | 15.2\(2e\) | |
cisco | nx-os | 15.2\(2f\) | |
cisco | nx-os | 15.2\(2g\) | |
cisco | nx-os | 15.2\(2h\) | |
cisco | nx-os | 15.2\(3e\) | |
cisco | nx-os | 15.2\(3f\) | |
cisco | nx-os | 15.2\(3g\) | |
cisco | nx-os | 15.2\(4d\) | |
cisco | nx-os | 15.2\(4e\) | |
cisco | nx-os | 15.2\(4f\) | |
cisco | nx-os | 15.2\(5c\) | |
cisco | nx-os | 15.2\(5d\) | |
cisco | nx-os | 15.2\(5e\) | |
cisco | nx-os | 15.2\(6e\) | |
cisco | nx-os | 15.2\(6g\) | |
cisco | nx-os | 15.2\(7f\) | |
cisco | nx-os | 15.2\(7g\) | |
cisco | nx-os | 15.2\(8d\) | |
cisco | nx-os | 15.2\(8e\) | |
cisco | nx-os | 15.2\(8f\) | |
cisco | nx-os | 15.2\(8g\) | |
cisco | nx-os | 15.3\(1d\) | |
cisco | nx-os | 16.0\(1g\) | |
cisco | nx-os | 16.0\(1j\) | |
cisco | nx-os | 16.0\(2h\) | |
cisco | nx-os | 16.0\(2j\) | |
cisco | nx-os | 16.0\(3d\) | |
cisco | nx-os | 16.0\(3e\) | |
cisco | nexus_93108tc-ex | - | |
cisco | nexus_93108tc-ex-24 | - | |
cisco | nexus_93108tc-fx | - | |
cisco | nexus_93108tc-fx-24 | - | |
cisco | nexus_93108tc-fx3p | - | |
cisco | nexus_93120tx | - | |
cisco | nexus_9316d-gx | - | |
cisco | nexus_93180lc-ex | - | |
cisco | nexus_93180yc-ex | - | |
cisco | nexus_93180yc-ex-24 | - | |
cisco | nexus_93180yc-fx | - | |
cisco | nexus_93180yc-fx-24 | - | |
cisco | nexus_93180yc-fx3 | - | |
cisco | nexus_93216tc-fx2 | - | |
cisco | nexus_93240yc-fx2 | - | |
cisco | nexus_9332c | - | |
cisco | nexus_9332d-gx2b | - | |
cisco | nexus_9332pq | - | |
cisco | nexus_93360yc-fx2 | - | |
cisco | nexus_9336c-fx2 | - | |
cisco | nexus_9336pq_aci_spine | - | |
cisco | nexus_9348d-gx2a | - | |
cisco | nexus_9348gc-fxp | - | |
cisco | nexus_93600cd-gx | - | |
cisco | nexus_9364c | - | |
cisco | nexus_9364c-gx | - | |
cisco | nexus_9364d-gx2a | - | |
cisco | nexus_9372px-e | - | |
cisco | nexus_9372tx-e | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9516 | - | |
cisco | unified_computing_system | 3.1\(1e\) | |
cisco | unified_computing_system | 3.1\(1g\) | |
cisco | unified_computing_system | 3.1\(1h\) | |
cisco | unified_computing_system | 3.1\(1k\) | |
cisco | unified_computing_system | 3.1\(1l\) | |
cisco | unified_computing_system | 3.1\(2b\) | |
cisco | unified_computing_system | 3.1\(2c\) | |
cisco | unified_computing_system | 3.1\(2d\) | |
cisco | unified_computing_system | 3.1\(2e\) | |
cisco | unified_computing_system | 3.1\(2f\) | |
cisco | unified_computing_system | 3.1\(2g\) | |
cisco | unified_computing_system | 3.1\(2h\) | |
cisco | unified_computing_system | 3.1\(3a\) | |
cisco | unified_computing_system | 3.1\(3b\) | |
cisco | unified_computing_system | 3.1\(3c\) | |
cisco | unified_computing_system | 3.1\(3d\) | |
cisco | unified_computing_system | 3.1\(3e\) | |
cisco | unified_computing_system | 3.1\(3f\) | |
cisco | unified_computing_system | 3.1\(3h\) | |
cisco | unified_computing_system | 3.1\(3j\) | |
cisco | unified_computing_system | 3.1\(3k\) | |
cisco | unified_computing_system | 3.1\(3l\) | |
cisco | unified_computing_system | 3.2\(1d\) | |
cisco | unified_computing_system | 3.2\(2b\) | |
cisco | unified_computing_system | 3.2\(2c\) | |
cisco | unified_computing_system | 3.2\(2d\) | |
cisco | unified_computing_system | 3.2\(2e\) | |
cisco | unified_computing_system | 3.2\(2f\) | |
cisco | unified_computing_system | 3.2\(3a\) | |
cisco | unified_computing_system | 3.2\(3b\) | |
cisco | unified_computing_system | 3.2\(3d\) | |
cisco | unified_computing_system | 3.2\(3e\) | |
cisco | unified_computing_system | 3.2\(3g\) | |
cisco | unified_computing_system | 3.2\(3h\) | |
cisco | unified_computing_system | 3.2\(3i\) | |
cisco | unified_computing_system | 3.2\(3j\) | |
cisco | unified_computing_system | 3.2\(3k\) | |
cisco | unified_computing_system | 3.2\(3l\) | |
cisco | unified_computing_system | 3.2\(3n\) | |
cisco | unified_computing_system | 3.2\(3o\) | |
cisco | unified_computing_system | 3.2\(3p\) | |
cisco | unified_computing_system | 4.0\(1a\) | |
cisco | unified_computing_system | 4.0\(1b\) | |
cisco | unified_computing_system | 4.0\(1c\) | |
cisco | unified_computing_system | 4.0\(1d\) | |
cisco | unified_computing_system | 4.0\(2a\) | |
cisco | unified_computing_system | 4.0\(2b\) | |
cisco | unified_computing_system | 4.0\(2d\) | |
cisco | unified_computing_system | 4.0\(2e\) | |
cisco | unified_computing_system | 4.0\(4a\) | |
cisco | unified_computing_system | 4.0\(4b\) | |
cisco | unified_computing_system | 4.0\(4c\) | |
cisco | unified_computing_system | 4.0\(4d\) | |
cisco | unified_computing_system | 4.0\(4e\) | |
cisco | unified_computing_system | 4.0\(4f\) | |
cisco | unified_computing_system | 4.0\(4g\) | |
cisco | unified_computing_system | 4.0\(4h\) | |
cisco | unified_computing_system | 4.0\(4i\) | |
cisco | unified_computing_system | 4.0\(4k\) | |
cisco | unified_computing_system | 4.0\(4l\) | |
cisco | unified_computing_system | 4.0\(4m\) | |
cisco | unified_computing_system | 4.0\(4n\) | |
cisco | unified_computing_system | 4.0\(4o\) | |
cisco | unified_computing_system | 4.1\(1a\) | |
cisco | unified_computing_system | 4.1\(1b\) | |
cisco | unified_computing_system | 4.1\(1c\) | |
cisco | unified_computing_system | 4.1\(1d\) | |
cisco | unified_computing_system | 4.1\(1e\) | |
cisco | unified_computing_system | 4.1\(2a\) | |
cisco | unified_computing_system | 4.1\(2b\) | |
cisco | unified_computing_system | 4.1\(2c\) | |
cisco | unified_computing_system | 4.1\(3a\) | |
cisco | unified_computing_system | 4.1\(3b\) | |
cisco | unified_computing_system | 4.1\(3c\) | |
cisco | unified_computing_system | 4.1\(3d\) | |
cisco | unified_computing_system | 4.1\(3e\) | |
cisco | unified_computing_system | 4.1\(3f\) | |
cisco | unified_computing_system | 4.1\(3h\) | |
cisco | unified_computing_system | 4.1\(3i\) | |
cisco | unified_computing_system | 4.1\(3j\) | |
cisco | unified_computing_system | 4.1\(3k\) | |
cisco | unified_computing_system | 4.1\(3l\) | |
cisco | unified_computing_system | 4.2\(1c\) | |
cisco | unified_computing_system | 4.2\(1d\) | |
cisco | unified_computing_system | 4.2\(1f\) | |
cisco | unified_computing_system | 4.2\(1i\) | |
cisco | unified_computing_system | 4.2\(1k\) | |
cisco | unified_computing_system | 4.2\(1l\) | |
cisco | unified_computing_system | 4.2\(1m\) | |
cisco | unified_computing_system | 4.2\(1n\) | |
cisco | unified_computing_system | 4.2\(2a\) | |
cisco | unified_computing_system | 4.2\(2c\) | |
cisco | unified_computing_system | 4.2\(2d\) | |
cisco | unified_computing_system | 4.2\(2e\) | |
cisco | unified_computing_system | 4.2\(3b\) | |
cisco | unified_computing_system | 4.2\(3d\) | |
cisco | unified_computing_system | 4.2\(3e\) | |
cisco | unified_computing_system | 4.2\(3g\) | |
cisco | unified_computing_system | 4.2\(3h\) | |
cisco | unified_computing_system | 4.2\(3i\) | |
cisco | ucs_6248_up | - | |
cisco | ucs_6248up | - | |
cisco | ucs_6296_up | - | |
cisco | ucs_6296up | - | |
cisco | ucs_6324 | - | |
cisco | ucs_6332 | - | |
cisco | ucs_6332-16up | - | |
cisco | ucs_64108 | - | |
cisco | ucs_6454 | - | |
cisco | ucs_6536 | - | |
cisco | nx-os | 6.0\(2\)a3\(1\) | |
cisco | nx-os | 6.0\(2\)a3\(2\) | |
cisco | nx-os | 6.0\(2\)a3\(4\) | |
cisco | nx-os | 6.0\(2\)a4\(1\) | |
cisco | nx-os | 6.0\(2\)a4\(2\) | |
cisco | nx-os | 6.0\(2\)a4\(3\) | |
cisco | nx-os | 6.0\(2\)a4\(4\) | |
cisco | nx-os | 6.0\(2\)a4\(5\) | |
cisco | nx-os | 6.0\(2\)a4\(6\) | |
cisco | nx-os | 6.0\(2\)a6\(1\) | |
cisco | nx-os | 6.0\(2\)a6\(1a\) | |
cisco | nx-os | 6.0\(2\)a6\(2\) | |
cisco | nx-os | 6.0\(2\)a6\(2a\) | |
cisco | nx-os | 6.0\(2\)a6\(3\) | |
cisco | nx-os | 6.0\(2\)a6\(3a\) | |
cisco | nx-os | 6.0\(2\)a6\(4\) | |
cisco | nx-os | 6.0\(2\)a6\(4a\) | |
cisco | nx-os | 6.0\(2\)a6\(5\) | |
cisco | nx-os | 6.0\(2\)a6\(5a\) | |
cisco | nx-os | 6.0\(2\)a6\(5b\) | |
cisco | nx-os | 6.0\(2\)a6\(6\) | |
cisco | nx-os | 6.0\(2\)a6\(7\) | |
cisco | nx-os | 6.0\(2\)a6\(8\) | |
cisco | nx-os | 6.0\(2\)a7\(1\) | |
cisco | nx-os | 6.0\(2\)a7\(1a\) | |
cisco | nx-os | 6.0\(2\)a7\(2\) | |
cisco | nx-os | 6.0\(2\)a7\(2a\) | |
cisco | nx-os | 6.0\(2\)a8\(1\) | |
cisco | nx-os | 6.0\(2\)a8\(2\) | |
cisco | nx-os | 6.0\(2\)a8\(3\) | |
cisco | nx-os | 6.0\(2\)a8\(4\) | |
cisco | nx-os | 6.0\(2\)a8\(4a\) | |
cisco | nx-os | 6.0\(2\)a8\(5\) | |
cisco | nx-os | 6.0\(2\)a8\(6\) | |
cisco | nx-os | 6.0\(2\)a8\(7\) | |
cisco | nx-os | 6.0\(2\)a8\(7a\) | |
cisco | nx-os | 6.0\(2\)a8\(7b\) | |
cisco | nx-os | 6.0\(2\)a8\(8\) | |
cisco | nx-os | 6.0\(2\)a8\(9\) | |
cisco | nx-os | 6.0\(2\)a8\(10\) | |
cisco | nx-os | 6.0\(2\)a8\(10a\) | |
cisco | nx-os | 6.0\(2\)a8\(11\) | |
cisco | nx-os | 6.0\(2\)a8\(11a\) | |
cisco | nx-os | 6.0\(2\)a8\(11b\) | |
cisco | nx-os | 6.0\(2\)u2\(1\) | |
cisco | nx-os | 6.0\(2\)u2\(2\) | |
cisco | nx-os | 6.0\(2\)u2\(3\) | |
cisco | nx-os | 6.0\(2\)u2\(4\) | |
cisco | nx-os | 6.0\(2\)u2\(5\) | |
cisco | nx-os | 6.0\(2\)u2\(6\) | |
cisco | nx-os | 6.0\(2\)u3\(1\) | |
cisco | nx-os | 6.0\(2\)u3\(2\) | |
cisco | nx-os | 6.0\(2\)u3\(3\) | |
cisco | nx-os | 6.0\(2\)u3\(4\) | |
cisco | nx-os | 6.0\(2\)u3\(5\) | |
cisco | nx-os | 6.0\(2\)u3\(6\) | |
cisco | nx-os | 6.0\(2\)u3\(7\) | |
cisco | nx-os | 6.0\(2\)u3\(8\) | |
cisco | nx-os | 6.0\(2\)u3\(9\) | |
cisco | nx-os | 6.0\(2\)u4\(1\) | |
cisco | nx-os | 6.0\(2\)u4\(2\) | |
cisco | nx-os | 6.0\(2\)u4\(3\) | |
cisco | nx-os | 6.0\(2\)u4\(4\) | |
cisco | nx-os | 6.0\(2\)u5\(1\) | |
cisco | nx-os | 6.0\(2\)u5\(2\) | |
cisco | nx-os | 6.0\(2\)u5\(3\) | |
cisco | nx-os | 6.0\(2\)u5\(4\) | |
cisco | nx-os | 6.0\(2\)u6\(1\) | |
cisco | nx-os | 6.0\(2\)u6\(1a\) | |
cisco | nx-os | 6.0\(2\)u6\(2\) | |
cisco | nx-os | 6.0\(2\)u6\(2a\) | |
cisco | nx-os | 6.0\(2\)u6\(3\) | |
cisco | nx-os | 6.0\(2\)u6\(3a\) | |
cisco | nx-os | 6.0\(2\)u6\(4\) | |
cisco | nx-os | 6.0\(2\)u6\(4a\) | |
cisco | nx-os | 6.0\(2\)u6\(5\) | |
cisco | nx-os | 6.0\(2\)u6\(5a\) | |
cisco | nx-os | 6.0\(2\)u6\(5b\) | |
cisco | nx-os | 6.0\(2\)u6\(5c\) | |
cisco | nx-os | 6.0\(2\)u6\(6\) | |
cisco | nx-os | 6.0\(2\)u6\(7\) | |
cisco | nx-os | 6.0\(2\)u6\(8\) | |
cisco | nx-os | 6.0\(2\)u6\(9\) | |
cisco | nx-os | 6.0\(2\)u6\(10\) | |
cisco | nx-os | 6.2\(1\) | |
cisco | nx-os | 6.2\(2\) | |
cisco | nx-os | 6.2\(2a\) | |
cisco | nx-os | 6.2\(3\) | |
cisco | nx-os | 6.2\(5\) | |
cisco | nx-os | 6.2\(5a\) | |
cisco | nx-os | 6.2\(5b\) | |
cisco | nx-os | 6.2\(6\) | |
cisco | nx-os | 6.2\(6a\) | |
cisco | nx-os | 6.2\(6b\) | |
cisco | nx-os | 6.2\(7\) | |
cisco | nx-os | 6.2\(8\) | |
cisco | nx-os | 6.2\(8a\) | |
cisco | nx-os | 6.2\(8b\) | |
cisco | nx-os | 6.2\(9\) | |
cisco | nx-os | 6.2\(9a\) | |
cisco | nx-os | 6.2\(9b\) | |
cisco | nx-os | 6.2\(9c\) | |
cisco | nx-os | 6.2\(10\) | |
cisco | nx-os | 6.2\(11\) | |
cisco | nx-os | 6.2\(11b\) | |
cisco | nx-os | 6.2\(11c\) | |
cisco | nx-os | 6.2\(11d\) | |
cisco | nx-os | 6.2\(11e\) | |
cisco | nx-os | 6.2\(12\) | |
cisco | nx-os | 6.2\(13\) | |
cisco | nx-os | 6.2\(13a\) | |
cisco | nx-os | 6.2\(13b\) | |
cisco | nx-os | 6.2\(14\) | |
cisco | nx-os | 6.2\(15\) | |
cisco | nx-os | 6.2\(16\) | |
cisco | nx-os | 6.2\(17\) | |
cisco | nx-os | 6.2\(18\) | |
cisco | nx-os | 6.2\(19\) | |
cisco | nx-os | 6.2\(20\) | |
cisco | nx-os | 6.2\(20a\) | |
cisco | nx-os | 6.2\(21\) | |
cisco | nx-os | 6.2\(22\) | |
cisco | nx-os | 6.2\(23\) | |
cisco | nx-os | 6.2\(24\) | |
cisco | nx-os | 6.2\(24a\) | |
cisco | nx-os | 6.2\(25\) | |
cisco | nx-os | 6.2\(27\) | |
cisco | nx-os | 6.2\(29\) | |
cisco | nx-os | 6.2\(31\) | |
cisco | nx-os | 6.2\(33\) | |
cisco | nx-os | 7.0\(3\)f1\(1\) | |
cisco | nx-os | 7.0\(3\)f2\(1\) | |
cisco | nx-os | 7.0\(3\)f2\(2\) | |
cisco | nx-os | 7.0\(3\)f3\(1\) | |
cisco | nx-os | 7.0\(3\)f3\(2\) | |
cisco | nx-os | 7.0\(3\)f3\(3\) | |
cisco | nx-os | 7.0\(3\)f3\(3a\) | |
cisco | nx-os | 7.0\(3\)f3\(3c\) | |
cisco | nx-os | 7.0\(3\)f3\(4\) | |
cisco | nx-os | 7.0\(3\)f3\(5\) | |
cisco | nx-os | 7.0\(3\)i2\(1\) | |
cisco | nx-os | 7.0\(3\)i2\(1a\) | |
cisco | nx-os | 7.0\(3\)i2\(2\) | |
cisco | nx-os | 7.0\(3\)i2\(2a\) | |
cisco | nx-os | 7.0\(3\)i2\(2b\) | |
cisco | nx-os | 7.0\(3\)i2\(2c\) | |
cisco | nx-os | 7.0\(3\)i2\(2d\) | |
cisco | nx-os | 7.0\(3\)i2\(2e\) | |
cisco | nx-os | 7.0\(3\)i2\(3\) | |
cisco | nx-os | 7.0\(3\)i2\(4\) | |
cisco | nx-os | 7.0\(3\)i2\(5\) | |
cisco | nx-os | 7.0\(3\)i3\(1\) | |
cisco | nx-os | 7.0\(3\)i4\(1\) | |
cisco | nx-os | 7.0\(3\)i4\(2\) | |
cisco | nx-os | 7.0\(3\)i4\(3\) | |
cisco | nx-os | 7.0\(3\)i4\(4\) | |
cisco | nx-os | 7.0\(3\)i4\(5\) | |
cisco | nx-os | 7.0\(3\)i4\(6\) | |
cisco | nx-os | 7.0\(3\)i4\(7\) | |
cisco | nx-os | 7.0\(3\)i4\(8\) | |
cisco | nx-os | 7.0\(3\)i4\(8a\) | |
cisco | nx-os | 7.0\(3\)i4\(8b\) | |
cisco | nx-os | 7.0\(3\)i4\(8z\) | |
cisco | nx-os | 7.0\(3\)i4\(9\) | |
cisco | nx-os | 7.0\(3\)i5\(1\) | |
cisco | nx-os | 7.0\(3\)i5\(2\) | |
cisco | nx-os | 7.0\(3\)i6\(1\) | |
cisco | nx-os | 7.0\(3\)i6\(2\) | |
cisco | nx-os | 7.0\(3\)i7\(1\) | |
cisco | nx-os | 7.0\(3\)i7\(2\) | |
cisco | nx-os | 7.0\(3\)i7\(3\) | |
cisco | nx-os | 7.0\(3\)i7\(4\) | |
cisco | nx-os | 7.0\(3\)i7\(5\) | |
cisco | nx-os | 7.0\(3\)i7\(5a\) | |
cisco | nx-os | 7.0\(3\)i7\(6\) | |
cisco | nx-os | 7.0\(3\)i7\(7\) | |
cisco | nx-os | 7.0\(3\)i7\(8\) | |
cisco | nx-os | 7.0\(3\)i7\(9\) | |
cisco | nx-os | 7.0\(3\)i7\(10\) | |
cisco | nx-os | 7.1\(0\)n1\(1\) | |
cisco | nx-os | 7.1\(0\)n1\(1a\) | |
cisco | nx-os | 7.1\(0\)n1\(1b\) | |
cisco | nx-os | 7.1\(1\)n1\(1\) | |
cisco | nx-os | 7.1\(2\)n1\(1\) | |
cisco | nx-os | 7.1\(3\)n1\(1\) | |
cisco | nx-os | 7.1\(3\)n1\(2\) | |
cisco | nx-os | 7.1\(4\)n1\(1\) | |
cisco | nx-os | 7.1\(5\)n1\(1\) | |
cisco | nx-os | 7.1\(5\)n1\(1b\) | |
cisco | nx-os | 7.2\(0\)d1\(1\) | |
cisco | nx-os | 7.2\(1\)d1\(1\) | |
cisco | nx-os | 7.2\(2\)d1\(1\) | |
cisco | nx-os | 7.2\(2\)d1\(2\) | |
cisco | nx-os | 7.3\(0\)d1\(1\) | |
cisco | nx-os | 7.3\(0\)dx\(1\) | |
cisco | nx-os | 7.3\(0\)dy\(1\) | |
cisco | nx-os | 7.3\(0\)n1\(1\) | |
cisco | nx-os | 7.3\(1\)d1\(1\) | |
cisco | nx-os | 7.3\(1\)dy\(1\) | |
cisco | nx-os | 7.3\(1\)n1\(1\) | |
cisco | nx-os | 7.3\(2\)d1\(1\) | |
cisco | nx-os | 7.3\(2\)d1\(2\) | |
cisco | nx-os | 7.3\(2\)d1\(3\) | |
cisco | nx-os | 7.3\(2\)d1\(3a\) | |
cisco | nx-os | 7.3\(2\)n1\(1\) | |
cisco | nx-os | 7.3\(3\)d1\(1\) | |
cisco | nx-os | 7.3\(3\)n1\(1\) | |
cisco | nx-os | 7.3\(4\)d1\(1\) | |
cisco | nx-os | 7.3\(4\)n1\(1\) | |
cisco | nx-os | 7.3\(5\)d1\(1\) | |
cisco | nx-os | 7.3\(5\)n1\(1\) | |
cisco | nx-os | 7.3\(6\)d1\(1\) | |
cisco | nx-os | 7.3\(6\)n1\(1\) | |
cisco | nx-os | 7.3\(7\)d1\(1\) | |
cisco | nx-os | 7.3\(7\)n1\(1\) | |
cisco | nx-os | 7.3\(7\)n1\(1a\) | |
cisco | nx-os | 7.3\(7\)n1\(1b\) | |
cisco | nx-os | 7.3\(8\)d1\(1\) | |
cisco | nx-os | 7.3\(8\)n1\(1\) | |
cisco | nx-os | 7.3\(9\)d1\(1\) | |
cisco | nx-os | 7.3\(9\)n1\(1\) | |
cisco | nx-os | 7.3\(10\)n1\(1\) | |
cisco | nx-os | 7.3\(11\)n1\(1\) | |
cisco | nx-os | 7.3\(12\)n1\(1\) | |
cisco | nx-os | 7.3\(13\)n1\(1\) | |
cisco | nx-os | 8.0\(1\) | |
cisco | nx-os | 8.1\(1\) | |
cisco | nx-os | 8.1\(1a\) | |
cisco | nx-os | 8.1\(1b\) | |
cisco | nx-os | 8.1\(2\) | |
cisco | nx-os | 8.1\(2a\) | |
cisco | nx-os | 8.2\(1\) | |
cisco | nx-os | 8.2\(2\) | |
cisco | nx-os | 8.2\(3\) | |
cisco | nx-os | 8.2\(4\) | |
cisco | nx-os | 8.2\(5\) | |
cisco | nx-os | 8.2\(6\) | |
cisco | nx-os | 8.2\(7\) | |
cisco | nx-os | 8.2\(7a\) | |
cisco | nx-os | 8.2\(8\) | |
cisco | nx-os | 8.2\(9\) | |
cisco | nx-os | 8.2\(10\) | |
cisco | nx-os | 8.3\(1\) | |
cisco | nx-os | 8.3\(2\) | |
cisco | nx-os | 8.4\(1\) | |
cisco | nx-os | 8.4\(1a\) | |
cisco | nx-os | 8.4\(2\) | |
cisco | nx-os | 8.4\(2a\) | |
cisco | nx-os | 8.4\(2b\) | |
cisco | nx-os | 8.4\(2c\) | |
cisco | nx-os | 8.4\(2d\) | |
cisco | nx-os | 8.4\(2e\) | |
cisco | nx-os | 8.4\(2f\) | |
cisco | nx-os | 8.4\(3\) | |
cisco | nx-os | 8.4\(4\) | |
cisco | nx-os | 8.4\(4a\) | |
cisco | nx-os | 8.4\(5\) | |
cisco | nx-os | 8.4\(6\) | |
cisco | nx-os | 8.4\(6a\) | |
cisco | nx-os | 8.4\(7\) | |
cisco | nx-os | 8.5\(1\) | |
cisco | nx-os | 9.2\(1\) | |
cisco | nx-os | 9.2\(1a\) | |
cisco | nx-os | 9.2\(2\) | |
cisco | nx-os | 9.2\(2t\) | |
cisco | nx-os | 9.2\(2v\) | |
cisco | nx-os | 9.2\(3\) | |
cisco | nx-os | 9.2\(4\) | |
cisco | nx-os | 9.3\(1\) | |
cisco | nx-os | 9.3\(2\) | |
cisco | nx-os | 9.3\(2a\) | |
cisco | nx-os | 9.3\(3\) | |
cisco | nx-os | 9.3\(4\) | |
cisco | nx-os | 9.3\(5\) | |
cisco | nx-os | 9.3\(6\) | |
cisco | nx-os | 9.3\(7\) | |
cisco | nx-os | 9.3\(7a\) | |
cisco | nx-os | 9.3\(8\) | |
cisco | nx-os | 9.3\(9\) | |
cisco | nx-os | 9.3\(10\) | |
cisco | nx-os | 9.3\(11\) | |
cisco | nx-os | 10.1\(1\) | |
cisco | nx-os | 10.1\(2\) | |
cisco | nx-os | 10.1\(2t\) | |
cisco | nx-os | 10.2\(1\) | |
cisco | nx-os | 10.2\(1q\) | |
cisco | nx-os | 10.2\(2\) | |
cisco | nx-os | 10.2\(3\) | |
cisco | nx-os | 10.2\(3t\) | |
cisco | nx-os | 10.2\(3v\) | |
cisco | nx-os | 10.2\(4\) | |
cisco | nx-os | 10.2\(5\) | |
cisco | nx-os | 10.3\(1\) | |
cisco | nx-os | 10.3\(2\) | |
cisco | mds_9132t | - | |
cisco | mds_9134 | - | |
cisco | mds_9140 | - | |
cisco | mds_9148 | - | |
cisco | mds_9148s | - | |
cisco | mds_9148t | - | |
cisco | mds_9200 | - | |
cisco | mds_9216 | - | |
cisco | mds_9216a | - | |
cisco | mds_9216i | - | |
cisco | mds_9222i | - | |
cisco | mds_9250i | - | |
cisco | mds_9396s | - | |
cisco | mds_9396t | - | |
cisco | mds_9500 | - | |
cisco | mds_9506 | - | |
cisco | mds_9509 | - | |
cisco | mds_9513 | - | |
cisco | mds_9700 | - | |
cisco | mds_9706 | - | |
cisco | mds_9710 | - | |
cisco | mds_9718 | - | |
cisco | nexus_3016 | - | |
cisco | nexus_3016q | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3064-32t | - | |
cisco | nexus_3064-t | - | |
cisco | nexus_3064-x | - | |
cisco | nexus_3064t | - | |
cisco | nexus_3064x | - | |
cisco | nexus_3100 | - | |
cisco | nexus_3100-v | - | |
cisco | nexus_3100-z | - | |
cisco | nexus_3100v | - | |
cisco | nexus_31108pc-v | - | |
cisco | nexus_31108pv-v | - | |
cisco | nexus_31108tc-v | - | |
cisco | nexus_31128pq | - | |
cisco | nexus_3132c-z | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3132q-v | - | |
cisco | nexus_3132q-x | - | |
cisco | nexus_3132q-x\/3132q-xl | - | |
cisco | nexus_3132q-xl | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172 | - | |
cisco | nexus_3172pq | - | |
cisco | nexus_3172pq-xl | - | |
cisco | nexus_3172pq\/pq-xl | - | |
cisco | nexus_3172tq | - | |
cisco | nexus_3172tq-32t | - | |
cisco | nexus_3172tq-xl | - | |
cisco | nexus_3200 | - | |
cisco | nexus_3232 | - | |
cisco | nexus_3232c | - | |
cisco | nexus_3232c_ | - | |
cisco | nexus_3264c-e | - | |
cisco | nexus_3264q | - | |
cisco | nexus_3400 | - | |
cisco | nexus_3408-s | - | |
cisco | nexus_34180yc | - | |
cisco | nexus_34200yc-sm | - | |
cisco | nexus_3432d-s | - | |
cisco | nexus_3464c | - | |
cisco | nexus_3500 | - | |
cisco | nexus_3500_platform | - | |
cisco | nexus_3524 | - | |
cisco | nexus_3524-x | - | |
cisco | nexus_3524-x\/xl | - | |
cisco | nexus_3524-xl | - | |
cisco | nexus_3548 | - | |
cisco | nexus_3548-x | - | |
cisco | nexus_3548-x\/xl | - | |
cisco | nexus_3548-xl | - | |
cisco | nexus_3600 | - | |
cisco | nexus_36180yc-r | - | |
cisco | nexus_3636c-r | - | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5672up-16g | - | |
cisco | nexus_5696q | - | |
cisco | nexus_6000 | - | |
cisco | nexus_6001 | - | |
cisco | nexus_6001p | - | |
cisco | nexus_6001t | - | |
cisco | nexus_6004 | - | |
cisco | nexus_6004x | - | |
cisco | nexus_7000 | - | |
cisco | nexus_7000_10-slot | - | |
cisco | nexus_7000_18-slot | - | |
cisco | nexus_7000_4-slot | - | |
cisco | nexus_7000_9-slot | - | |
cisco | nexus_7000_supervisor_1 | - | |
cisco | nexus_7000_supervisor_2 | - | |
cisco | nexus_7000_supervisor_2e | - | |
cisco | nexus_7004 | - | |
cisco | nexus_7009 | - | |
cisco | nexus_7010 | - | |
cisco | nexus_7018 | - | |
cisco | nexus_7700 | - | |
cisco | nexus_7700_10-slot | - | |
cisco | nexus_7700_18-slot | - | |
cisco | nexus_7700_2-slot | - | |
cisco | nexus_7700_6-slot | - | |
cisco | nexus_7700_supervisor_2e | - | |
cisco | nexus_7700_supervisor_3e | - | |
cisco | nexus_7702 | - | |
cisco | nexus_7706 | - | |
cisco | nexus_7710 | - | |
cisco | nexus_7718 | - | |
cisco | nexus_9000v | - | |
cisco | nexus_9200 | - | |
cisco | nexus_9200yc | - | |
cisco | nexus_92160yc-x | - | |
cisco | nexus_92160yc_switch | - | |
cisco | nexus_9221c | - | |
cisco | nexus_92300yc | - | |
cisco | nexus_92300yc_switch | - | |
cisco | nexus_92304qc | - | |
cisco | nexus_92304qc_switch | - | |
cisco | nexus_9232e | - | |
cisco | nexus_92348gc-x | - | |
cisco | nexus_9236c | - | |
cisco | nexus_9236c_switch | - | |
cisco | nexus_9272q | - | |
cisco | nexus_9272q_switch | - | |
cisco | nexus_9300 | - | |
cisco | nexus_93108tc-ex | - | |
cisco | nexus_93108tc-ex-24 | - | |
cisco | nexus_93108tc-ex_switch | - | |
cisco | nexus_93108tc-fx | - | |
cisco | nexus_93108tc-fx-24 | - | |
cisco | nexus_93108tc-fx3 | - | |
cisco | nexus_93108tc-fx3h | - | |
cisco | nexus_93108tc-fx3p | - | |
cisco | nexus_93120tx | - | |
cisco | nexus_93120tx_switch | - | |
cisco | nexus_93128 | - | |
cisco | nexus_93128tx | - | |
cisco | nexus_93128tx_switch | - | |
cisco | nexus_9316d-gx | - | |
cisco | nexus_93180lc-ex | - | |
cisco | nexus_93180lc-ex_switch | - | |
cisco | nexus_93180tc-ex | - | |
cisco | nexus_93180yc-ex | - | |
cisco | nexus_93180yc-ex-24 | - | |
cisco | nexus_93180yc-ex_switch | - | |
cisco | nexus_93180yc-fx | - | |
cisco | nexus_93180yc-fx-24 | - | |
cisco | nexus_93180yc-fx3 | - | |
cisco | nexus_93180yc-fx3h | - | |
cisco | nexus_93180yc-fx3s | - | |
cisco | nexus_93216tc-fx2 | - | |
cisco | nexus_93240tc-fx2 | - | |
cisco | nexus_93240yc-fx2 | - | |
cisco | nexus_9332c | - | |
cisco | nexus_9332d-gx2b | - | |
cisco | nexus_9332d-h2r | - | |
cisco | nexus_9332pq | - | |
cisco | nexus_9332pq_switch | - | |
cisco | nexus_93360yc-fx2 | - | |
cisco | nexus_9336c-fx2 | - | |
cisco | nexus_9336c-fx2-e | - | |
cisco | nexus_9336pq | - | |
cisco | nexus_9336pq_aci | - | |
cisco | nexus_9336pq_aci_spine | - | |
cisco | nexus_9336pq_aci_spine_switch | - | |
cisco | nexus_93400ld-h1 | - | |
cisco | nexus_9348d-gx2a | - | |
cisco | nexus_9348gc-fx3 | - | |
cisco | nexus_9348gc-fx3ph | - | |
cisco | nexus_9348gc-fxp | - | |
cisco | nexus_93600cd-gx | - | |
cisco | nexus_9364c | - | |
cisco | nexus_9364c-gx | - | |
cisco | nexus_9364c-h1 | - | |
cisco | nexus_9364d-gx2a | - | |
cisco | nexus_9372px | - | |
cisco | nexus_9372px-e | - | |
cisco | nexus_9372px-e_switch | - | |
cisco | nexus_9372px_switch | - | |
cisco | nexus_9372tx | - | |
cisco | nexus_9372tx-e | - | |
cisco | nexus_9372tx-e_switch | - | |
cisco | nexus_9372tx_switch | - | |
cisco | nexus_9396px | - | |
cisco | nexus_9396px_switch | - | |
cisco | nexus_9396tx | - | |
cisco | nexus_9396tx_switch | - | |
cisco | nexus_9408 | - | |
cisco | nexus_9432pq | - | |
cisco | nexus_9500 | - | |
cisco | nexus_9500_16-slot | - | |
cisco | nexus_9500_4-slot | - | |
cisco | nexus_9500_8-slot | - | |
cisco | nexus_9500_supervisor_a | - | |
cisco | nexus_9500_supervisor_a\+ | - | |
cisco | nexus_9500_supervisor_b | - | |
cisco | nexus_9500_supervisor_b\+ | - | |
cisco | nexus_9500r | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9504_switch | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9508_switch | - | |
cisco | nexus_9516 | - | |
cisco | nexus_9516_switch | - | |
cisco | nexus_9536pq | - | |
cisco | nexus_9636pq | - | |
cisco | nexus_9716d-gx | - | |
cisco | nexus_9736pq | - | |
cisco | nexus_9800 | - | |
cisco | nexus_9804 | - | |
cisco | nexus_9808 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.63:*:*:*:*:*:*:*", "matchCriteriaId": "F91E1B6C-EB41-4DC4-91EB-1720E91B4F9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.66:*:*:*:*:*:*:*", "matchCriteriaId": "1EBE7861-6B3C-453B-83A9-7C4BBA304500", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.1.70:*:*:*:*:*:*:*", "matchCriteriaId": "48BFC104-4AF9-4D65-9E7F-D4598A1AA5FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "F2443793-9716-4578-9CEA-89198B78B443", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "A293674A-53A1-4106-89E9-632962C84160", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "600DEA78-F101-498C-9517-58449A119C64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.26:*:*:*:*:*:*:*", "matchCriteriaId": "0D6AEBB8-1531-426B-906B-04936F738491", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "86DDEB8F-BE20-4A57-923F-E028DF827C13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.54:*:*:*:*:*:*:*", "matchCriteriaId": "73BA961D-C759-40B9-A116-782E2C795D87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.60:*:*:*:*:*:*:*", "matchCriteriaId": "8BAB169D-25DE-40B0-9CE5-0450C2099CE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.71:*:*:*:*:*:*:*", "matchCriteriaId": "8C8493B6-0738-474D-90A4-26A3209F162D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.83:*:*:*:*:*:*:*", "matchCriteriaId": "AB2D4B10-8F59-4C86-86D8-3BDBE9D305C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.86:*:*:*:*:*:*:*", "matchCriteriaId": "957CFF62-9081-40F9-AC79-87D28286E95E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.91:*:*:*:*:*:*:*", "matchCriteriaId": "D000A6F0-1466-4197-A0D3-C97ABA28AD9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.97:*:*:*:*:*:*:*", "matchCriteriaId": "3FDB9B15-6B51-4F94-BBE1-0F843D2BCFDC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.101:*:*:*:*:*:*:*", "matchCriteriaId": "B32C0A02-7206-444E-AF36-BF1CF74E3B1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.137:*:*:*:*:*:*:*", "matchCriteriaId": "79333797-D58E-4A48-97BC-6FC7C549535E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.148:*:*:*:*:*:*:*", "matchCriteriaId": "DCBE0776-B4FF-4887-8F1E-69BAFF0E06F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.2.2.149:*:*:*:*:*:*:*", "matchCriteriaId": "2C510880-CEDB-4EE4-8CCC-723289B93260", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "71DAD6D7-191B-4695-846E-374527CD3BC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "9865003E-7FF2-47A4-9218-EF982083BB50", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.66:*:*:*:*:*:*:*", "matchCriteriaId": "7B2EC8E8-C033-4D6C-9F86-92D869707B4B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.73:*:*:*:*:*:*:*", "matchCriteriaId": "95F0CD7A-DCFF-4FFC-9400-C943E8D26DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.75:*:*:*:*:*:*:*", "matchCriteriaId": "DE7B80AA-C6CB-4AB2-8097-A8299A9BC1BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.88:*:*:*:*:*:*:*", "matchCriteriaId": "50D761FD-5ED7-4D66-88C5-E2FEBFCAD2D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.91:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E9A54-C266-40B5-A67D-5C3B4472CE39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.93:*:*:*:*:*:*:*", "matchCriteriaId": "7FBECB29-DE08-488E-A66E-B11C07DAEC2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.99:*:*:*:*:*:*:*", "matchCriteriaId": "5C994C3C-4BA4-435A-9E35-C2B9FD602692", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.110:*:*:*:*:*:*:*", "matchCriteriaId": "B0B98A28-A530-4244-9F45-C67A99383A1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.111:*:*:*:*:*:*:*", "matchCriteriaId": "1F689F91-04A5-4D4B-8407-03984F02161C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.130:*:*:*:*:*:*:*", "matchCriteriaId": "2095A601-DF01-4E41-9A6C-E145CE1C3694", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.144:*:*:*:*:*:*:*", "matchCriteriaId": "0814A727-ED4D-457E-86CC-1840A44D2B5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.145:*:*:*:*:*:*:*", "matchCriteriaId": "24544F3F-BAF3-41BF-83A0-0DCCE13BD15A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.155:*:*:*:*:*:*:*", "matchCriteriaId": "B07BC424-6E8C-4874-B5CF-62EBD60115AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.166:*:*:*:*:*:*:*", "matchCriteriaId": "C91FCF2F-5EAA-45E7-846C-CACEB1044D1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.173:*:*:*:*:*:*:*", "matchCriteriaId": "B879AF2E-D881-48C5-96EB-9965E06CF5E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.179:*:*:*:*:*:*:*", "matchCriteriaId": "38607798-8A66-4AC5-A7A9-4D763C5EB587", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.180:*:*:*:*:*:*:*", "matchCriteriaId": "2B5BBF21-3F50-47DB-9586-075018830070", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.190:*:*:*:*:*:*:*", "matchCriteriaId": "FAE88488-F094-4F68-A4B2-0F79B0B71F12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.215:*:*:*:*:*:*:*", "matchCriteriaId": "2A6FF44C-0601-4F43-A93E-59675D218135", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.216:*:*:*:*:*:*:*", "matchCriteriaId": "005EDD09-809E-4486-99C9-4806FC3EC0CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.219:*:*:*:*:*:*:*", "matchCriteriaId": "884CCD45-9ECE-41A5-91B2-7E0F2B52D983", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.3.1.230:*:*:*:*:*:*:*", "matchCriteriaId": "DB84572E-EAA6-4349-B7AD-895001EDD5F5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.131:*:*:*:*:*:*:*", "matchCriteriaId": "74CC121E-4723-4F45-9856-DBCB136CB71D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.157:*:*:*:*:*:*:*", "matchCriteriaId": "8739189D-2241-4FA5-8203-0932377A2706", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.166:*:*:*:*:*:*:*", "matchCriteriaId": "91DE79E4-210C-4772-AB9E-2CCE2A194892", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.169:*:*:*:*:*:*:*", "matchCriteriaId": "970B679D-6321-49EA-AABE-1219BEC1AFAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.174:*:*:*:*:*:*:*", "matchCriteriaId": "64D8028D-8E1B-4572-AC46-FF2E0F23FD0B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.187:*:*:*:*:*:*:*", "matchCriteriaId": "7D83A778-190F-4AB1-B46C-533DF4EDF8D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.192:*:*:*:*:*:*:*", "matchCriteriaId": "60D1A473-98FF-4F78-AB76-E3D78611F516", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.204:*:*:*:*:*:*:*", "matchCriteriaId": "DF401D27-D130-4696-949B-99D897233BDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.214:*:*:*:*:*:*:*", "matchCriteriaId": "EC650D78-D0E7-4573-A23E-F5241580D5B4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.224:*:*:*:*:*:*:*", "matchCriteriaId": "B58B645A-05D0-41D7-888E-9B2440A7AE33", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.229:*:*:*:*:*:*:*", "matchCriteriaId": "D7AB272E-1725-4B27-83DC-D0E24F530344", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.230:*:*:*:*:*:*:*", "matchCriteriaId": "A0842C78-7B30-4C57-B69B-D5006EADF049", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.238:*:*:*:*:*:*:*", "matchCriteriaId": "5BD1344C-1EDE-4327-A717-9170E2B88560", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.239:*:*:*:*:*:*:*", "matchCriteriaId": "E2C7B300-1283-4F69-8D3F-AC864651A674", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.254:*:*:*:*:*:*:*", "matchCriteriaId": "090C7325-46EB-400E-8E0E-792E2651F8DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.259:*:*:*:*:*:*:*", "matchCriteriaId": "5CD96042-B418-4D34-B2A9-1224428D9490", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.264:*:*:*:*:*:*:*", "matchCriteriaId": "4F8A3811-5435-422A-BC7B-930F55E0E0E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.6.1.265:*:*:*:*:*:*:*", "matchCriteriaId": "541F4BB4-8FE5-4958-BE51-8ADBFCE7208F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.105:*:*:*:*:*:*:*", "matchCriteriaId": "E09810C6-B6DC-478C-99EA-5B793BBA923C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.125:*:*:*:*:*:*:*", "matchCriteriaId": "1999CFBE-9FDB-4B38-8A81-A9735F40470C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.139:*:*:*:*:*:*:*", "matchCriteriaId": "81DA2928-FE71-4F55-A66B-9C5E9D8C3652", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.143:*:*:*:*:*:*:*", "matchCriteriaId": "6D05EBF1-676E-464D-B116-3E167105CF1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.152:*:*:*:*:*:*:*", "matchCriteriaId": "0D4C165B-8558-4824-8E04-6FEC2D09676C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.162:*:*:*:*:*:*:*", "matchCriteriaId": "CBE8B612-4563-444A-AF8D-AECC49F4427C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.164:*:*:*:*:*:*:*", "matchCriteriaId": "A9700595-0CCD-4D13-89F3-30030682036D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.172:*:*:*:*:*:*:*", "matchCriteriaId": "657A259B-8C1C-46FD-9F5A-5D305BF30B44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.186:*:*:*:*:*:*:*", "matchCriteriaId": "D7AB9D22-3C50-43E9-BCFC-9468B3C90E2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.190:*:*:*:*:*:*:*", "matchCriteriaId": "D37A62AD-490B-4E49-BFE0-02D835B7316B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.8.1.198:*:*:*:*:*:*:*", "matchCriteriaId": "CACBE711-8FBF-4D90-89A4-8FB9156DADAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.9.1.131:*:*:*:*:*:*:*", "matchCriteriaId": "F64F4E33-0358-4458-B803-E41DAC4BA483", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.9.1.135:*:*:*:*:*:*:*", "matchCriteriaId": "0D8FEAE7-147B-47FC-AA7C-AD52A30BACBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.9.1.143:*:*:*:*:*:*:*", "matchCriteriaId": "EC1C1B97-CA97-4BE9-96D7-05526D7DFC1D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.9.1.150:*:*:*:*:*:*:*", "matchCriteriaId": "77A5BC7F-C0B8-4464-A1FC-C6BDB79EDF88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.9.1.158:*:*:*:*:*:*:*", "matchCriteriaId": "70FB9B85-F1DF-421E-9854-40F2E5827169", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.10.1.159:*:*:*:*:*:*:*", "matchCriteriaId": "96B4087F-C81D-4130-98E7-18E79E45F62F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.10.1.166:*:*:*:*:*:*:*", "matchCriteriaId": "BEB4B31E-54B0-4CD1-9857-6ED8E8AAA5AC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.10.1.179:*:*:*:*:*:*:*", "matchCriteriaId": "60423450-D762-470D-907E-F561BA5F872D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.10.1.207:*:*:*:*:*:*:*", "matchCriteriaId": "517C80A7-1E3C-4741-933F-2431AF6A100E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.10.1.234:*:*:*:*:*:*:*", "matchCriteriaId": "7A85DDC6-EBF3-41C9-871F-BBC777B2F34F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.10.1.245:*:*:*:*:*:*:*", "matchCriteriaId": "E12416BB-A10E-4F7E-8A20-D3563883AE69", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.10.1.271:*:*:*:*:*:*:*", "matchCriteriaId": "C9A3949D-1993-45BF-8E89-DFDB8AEBBD52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.11.1.154:*:*:*:*:*:*:*", "matchCriteriaId": "00C57D17-05E9-4017-A975-6AC6223ED862", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.11.1.182:*:*:*:*:*:*:*", "matchCriteriaId": "A49AF7E9-287D-45DE-BE1E-716846AD2205", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.11.1.200:*:*:*:*:*:*:*", "matchCriteriaId": "129A0C6D-AF17-45F3-BF3C-EAE83D8FAF48", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.11.1.205:*:*:*:*:*:*:*", "matchCriteriaId": "7A8E6470-F855-4FE7-8A64-8B0B4C346D7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.12.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "63247EFC-4C1E-429D-A878-B0DC95BC0261", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.12.0.432:*:*:*:*:*:*:*", "matchCriteriaId": "B183261B-FACA-427C-91C2-2729C4BC760F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.12.0.450:*:*:*:*:*:*:*", "matchCriteriaId": "AD8F5BA4-257D-40EF-8A3E-8835939FCBB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.12.0.467:*:*:*:*:*:*:*", "matchCriteriaId": "085D8817-8065-44F1-B8BC-E8732234804E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.12.0.498:*:*:*:*:*:*:*", "matchCriteriaId": "B3CB74AF-B2A2-4A7E-B5E1-75EB80B84732", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.12.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "E0BE4592-8B52-49AA-BCB0-744B5AAD5EC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.12.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "DB738E38-CDA8-4B47-A5F8-8ACC47BE2275", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.13.0.198:*:*:*:*:*:*:*", "matchCriteriaId": "705523C7-5458-41CC-8689-11AE0671BC29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.13.0.212:*:*:*:*:*:*:*", "matchCriteriaId": "ADF7779D-0347-4745-9173-CF20B6D8575A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.13.0.243:*:*:*:*:*:*:*", "matchCriteriaId": "BDF7CE5F-4DAC-4672-ADF9-16CDFFE78F4D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:firepower_extensible_operating_system:2.14.1.131:*:*:*:*:*:*:*", "matchCriteriaId": "83C9D6F9-717A-420E-8043-616893E4BEE7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CBC7F5-7767-43B6-9384-BE143FCDBD7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:*", "matchCriteriaId": "957D64EB-D60E-4775-B9A8-B21CA48ED3B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:*", "matchCriteriaId": "A694AD51-9008-4AE6-8240-98B17AB527EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:*", "matchCriteriaId": "38AE6DC0-2B03-4D36-9856-42530312CC46", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:*", "matchCriteriaId": "71DCEF22-ED20-4330-8502-EC2DD4C9838F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DB2822B-B752-4CD9-A178-934957E306B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F4868A-6D62-479C-9C19-F9AABDBB6B24", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:*", "matchCriteriaId": "65378F3A-777C-4AE2-87FB-1E7402F9EA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "18048A84-BA0F-48EF-AFFB-635FF7F70C66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:*", "matchCriteriaId": "317DF3DD-C7CD-4CA2-804F-A738E048BEB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:*", "matchCriteriaId": "C13CF29B-9308-452B-B7E0-9E818B5A6C1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB527C2-855E-4BB9-BCA7-94BE86100D44", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:*", "matchCriteriaId": "421D91C3-8AB3-45E1-9E55-13ED1A4A623E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D741945-8B0A-408D-A5FE-D5B38DC6D46A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "0BEE5B22-F9D3-4EAA-A552-7F0271080632", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1n\\):*:*:*:*:*:*:*", "matchCriteriaId": "74DB471F-43AF-4E94-99B0-7D38CB3F5943", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1o\\):*:*:*:*:*:*:*", "matchCriteriaId": "9217FBFE-2708-440A-90F9-0562C159DE16", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1p\\):*:*:*:*:*:*:*", "matchCriteriaId": "5BA5F46C-3172-4509-856F-703E0B517E7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1q\\):*:*:*:*:*:*:*", "matchCriteriaId": "E07DC9A1-E4BA-474C-96C2-0B73704628AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1r\\):*:*:*:*:*:*:*", "matchCriteriaId": "027DCF27-E201-4713-A1AC-526C6CA04343", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2f\\):*:*:*:*:*:*:*", "matchCriteriaId": "40B05631-0319-4AFA-867A-2AECEAD449CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2g\\):*:*:*:*:*:*:*", "matchCriteriaId": "771CD71E-4F24-4ACC-8D86-11429379093B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2h\\):*:*:*:*:*:*:*", "matchCriteriaId": "906C7861-3266-445E-BBAB-64B757229A4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2l\\):*:*:*:*:*:*:*", "matchCriteriaId": "782E194A-E91E-4C72-A86A-5BD2B9CE19BA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2m\\):*:*:*:*:*:*:*", "matchCriteriaId": "4CE062A4-FD32-41E5-A5B2-06BED72140E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2n\\):*:*:*:*:*:*:*", "matchCriteriaId": "52016BB9-A37D-4F3A-BEB4-77CF84193652", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2o\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE8D042D-35C6-4BDF-9CD7-9125B19DC415", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(1h\\):*:*:*:*:*:*:*", "matchCriteriaId": "50F91C27-4625-4CCD-B2EB-7F34F286AB2C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(1i\\):*:*:*:*:*:*:*", "matchCriteriaId": "F65D3CE3-CA53-4A13-AD86-E59196B586FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "EC4633AD-6CBA-4E7B-BC9D-DCCBE1F2C7EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(2g\\):*:*:*:*:*:*:*", "matchCriteriaId": "04B6FAA5-D3CF-4463-9DE9-6F472DC78B2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(2k\\):*:*:*:*:*:*:*", "matchCriteriaId": "A1A8E4CF-2EF7-45E8-A4FE-5BEA54617D71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(3g\\):*:*:*:*:*:*:*", "matchCriteriaId": "B0A7F045-BE20-4B1D-8A0D-38A651B77EA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(3h\\):*:*:*:*:*:*:*", "matchCriteriaId": "E8DB4683-C8B2-4013-85C5-A1B5F01790B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(3j\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF031A0E-9C92-4931-8433-EAF9F9BA0DE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E66B8A3B-AE6E-4876-9C14-54B24F91229C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(1n\\):*:*:*:*:*:*:*", "matchCriteriaId": "A5288A19-E08E-4748-A6F8-C095746D8B92", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(1o\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DBC06D8-E9B3-4400-A7E5-7EE6A3B8C9BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "46C5D5D2-B2B9-4A9A-84D5-6F04E3F8694F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2f\\):*:*:*:*:*:*:*", "matchCriteriaId": "FDFA97CC-F9AD-42A8-8FBE-D986E729336C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2i\\):*:*:*:*:*:*:*", "matchCriteriaId": "49DCFBB0-E1DA-4F4D-877A-BC6075775EDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2j\\):*:*:*:*:*:*:*", "matchCriteriaId": "4E02BE71-98EB-494D-A808-42A3B2A0A72A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2k\\):*:*:*:*:*:*:*", "matchCriteriaId": "6B74C309-446F-4EAC-939E-43BC8167FE75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2q\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EA38368-8EE4-4480-9A9A-D12992108475", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3j\\):*:*:*:*:*:*:*", "matchCriteriaId": "BFCAE710-1789-4D3A-AC2E-E6A523037172", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3p\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E7A6830-C15E-4690-8C1A-5044A3B01C13", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3r\\):*:*:*:*:*:*:*", "matchCriteriaId": "69051EB0-D60F-4E30-8939-088E50422A0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3s\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5135CDF-5991-4CC9-9C4C-CC0DADEA8C5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3t\\):*:*:*:*:*:*:*", "matchCriteriaId": "00DF4FCE-1B71-4A28-989C-AE4C5F2B3343", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(4f\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6049CBB-7445-4A77-867B-5D59DF0C9332", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(4p\\):*:*:*:*:*:*:*", "matchCriteriaId": "58BE5188-775E-42A9-BCCF-0DBACDDFC045", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(4q\\):*:*:*:*:*:*:*", "matchCriteriaId": "762B4A37-3D8C-4172-A8FF-14F470CBDBFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(4r\\):*:*:*:*:*:*:*", "matchCriteriaId": "C9BCF174-6D01-4C1A-AF7F-B91EDD16E010", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1e\\):*:*:*:*:*:*:*", "matchCriteriaId": "94E4F174-8F51-41AF-82C7-0CA577753191", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1f\\):*:*:*:*:*:*:*", "matchCriteriaId": "353FD814-0812-4B90-B8F0-D372E85CF40B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1i\\):*:*:*:*:*:*:*", "matchCriteriaId": "71AF6628-3E98-4D66-B4A9-9EA16519719A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1l\\):*:*:*:*:*:*:*", "matchCriteriaId": "E52B312E-9C91-40F7-BACB-1550D6632477", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1o\\):*:*:*:*:*:*:*", "matchCriteriaId": "746D1151-BEC2-4404-A7CF-651D8BFA3412", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1p\\):*:*:*:*:*:*:*", "matchCriteriaId": "52CE3E73-8EC6-49D1-837F-2FBFDD51802C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.0\\(1k\\):*:*:*:*:*:*:*", "matchCriteriaId": "B774106E-DC00-4F79-A5F9-390483A9FBEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.0\\(2h\\):*:*:*:*:*:*:*", "matchCriteriaId": "26676350-6635-4B97-8A1E-250E06A177CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.0\\(2k\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA426885-C1FB-4DB5-900A-7C7882956BFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.0\\(2n\\):*:*:*:*:*:*:*", "matchCriteriaId": "AA5C1581-9C53-4093-BBCA-67F57CE24C67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(1i\\):*:*:*:*:*:*:*", "matchCriteriaId": "D548C85A-F98B-49BF-A6C3-ADEB60124822", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2m\\):*:*:*:*:*:*:*", "matchCriteriaId": "970718D9-4789-414B-8ED2-FBF914B4047C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2o\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C45D91E-5AA4-46B4-9A87-75480AC04732", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2p\\):*:*:*:*:*:*:*", "matchCriteriaId": "973B7EE9-6B18-4D1D-8DEE-3C43D0CEB89C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2q\\):*:*:*:*:*:*:*", "matchCriteriaId": "32083CFE-1DAE-4BE2-AFB9-B2806F809191", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2s\\):*:*:*:*:*:*:*", "matchCriteriaId": "B0D61DA2-28B2-49E5-8739-38113455BD09", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2t\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E20496D-D83C-4CD3-B1A3-EEE0D165F609", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2u\\):*:*:*:*:*:*:*", "matchCriteriaId": "71425F24-4C89-49C1-9B5E-68FAFE04F89C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2v\\):*:*:*:*:*:*:*", "matchCriteriaId": "310CF610-34E9-45F2-B01A-76DDEC40A040", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(1l\\):*:*:*:*:*:*:*", "matchCriteriaId": "09A32C04-1467-4564-A18E-EF2AAEF64244", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED378075-D761-4D0D-8852-93616EA2F9BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(2l\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C9BD58D-3AE9-49C7-AE94-74878CD109B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(2o\\):*:*:*:*:*:*:*", "matchCriteriaId": "46D16C20-D68E-4118-B8D4-D6A2044DCD32", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3i\\):*:*:*:*:*:*:*", "matchCriteriaId": "ABCDA33D-8576-4DF6-90A1-710CA3F78F68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3n\\):*:*:*:*:*:*:*", "matchCriteriaId": "CEBC0A74-551B-4BD1-A59A-80C119362D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3o\\):*:*:*:*:*:*:*", "matchCriteriaId": "F36E0CC9-7DD7-439B-B83F-F96DEF5B2A37", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3r\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F50E84B-7CAC-4832-96C5-9885F0F9DFC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3s\\):*:*:*:*:*:*:*", "matchCriteriaId": "DEB8A917-6F49-4636-AF8C-8C18BAACE661", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(4d\\):*:*:*:*:*:*:*", "matchCriteriaId": "79ECC89F-7F84-42E0-AF0F-4C9A609131E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(4e\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A9AC0D9-D8D4-480F-B1B7-84D17AF4ABC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(5d\\):*:*:*:*:*:*:*", "matchCriteriaId": "28A0A2C2-6E9F-4A08-9ED8-6FD4E8203053", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(5e\\):*:*:*:*:*:*:*", "matchCriteriaId": "FCE26439-5B15-48F4-8E02-CC45A76297A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(5f\\):*:*:*:*:*:*:*", "matchCriteriaId": "F8744322-4D27-44BB-9573-BDEC9E8F6B00", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(6i\\):*:*:*:*:*:*:*", "matchCriteriaId": "83C1841C-9D9B-4A22-9080-724BC75A004E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(7f\\):*:*:*:*:*:*:*", "matchCriteriaId": "3E54C78E-93FE-4E22-A37A-25D07AF7C7CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(7k\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED709475-D435-492E-A295-3F3202CB6CC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(9b\\):*:*:*:*:*:*:*", "matchCriteriaId": "B226BA8E-FC1E-44FF-9A91-837F355E53B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(9f\\):*:*:*:*:*:*:*", "matchCriteriaId": "1BA59F5B-43FE-4051-9D27-F83A7A39141E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(9h\\):*:*:*:*:*:*:*", "matchCriteriaId": "3883FD9C-0BCB-4865-81B6-854C8C4EC7DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(10e\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB3F72F4-7887-4BCB-A081-DE72D16CA5A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(10f\\):*:*:*:*:*:*:*", "matchCriteriaId": "F81EE017-9AF9-419B-AFE3-4A78B535C6DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(10g\\):*:*:*:*:*:*:*", "matchCriteriaId": "00D0CE22-EF65-4B33-986C-41347E5F1F96", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.0\\(1h\\):*:*:*:*:*:*:*", "matchCriteriaId": "B4F75D6B-D48A-4B5E-A1DF-EEBFEBFE6073", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.0\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "FB1B81AF-FC0F-42B6-98C0-BEC432C7BAC2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.0\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "87C5BB7A-3B2B-4AE3-A626-04FD1BB1E9C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.0\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "BDEB393A-9687-4E52-9837-B2C9E8F22D58", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(1i\\):*:*:*:*:*:*:*", "matchCriteriaId": "7E1BE98A-95AE-4D11-B427-68D25FE60720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(1j\\):*:*:*:*:*:*:*", "matchCriteriaId": "CD61CB15-1955-4A81-9F8E-02F207094260", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(1k\\):*:*:*:*:*:*:*", "matchCriteriaId": "455F4A6C-428C-494F-B70C-A891B83EBEF7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(1l\\):*:*:*:*:*:*:*", "matchCriteriaId": "322088F6-DF10-4C58-92F3-0FFBF469A6B7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2g\\):*:*:*:*:*:*:*", "matchCriteriaId": "20BFA5E5-0ECC-4A1F-A936-1F325A810334", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2m\\):*:*:*:*:*:*:*", "matchCriteriaId": "7ECA1140-9DE0-4BC9-A381-A8DCB5BEA4A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2o\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F5FCA86-82A3-4540-B827-BD752D9E0465", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2s\\):*:*:*:*:*:*:*", "matchCriteriaId": "6B8DE7D4-EFEC-487B-8250-251F9EA36BF6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2u\\):*:*:*:*:*:*:*", "matchCriteriaId": "83EA47AA-6F3B-4A48-81A0-2CA8D6696B27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2w\\):*:*:*:*:*:*:*", "matchCriteriaId": "89662D5F-AEEC-4DEB-AB8B-6A95D0A4B1D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2x\\):*:*:*:*:*:*:*", "matchCriteriaId": "40D5076C-6C6F-44F9-91D7-D8F2FEB21310", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(1i\\):*:*:*:*:*:*:*", "matchCriteriaId": "D8BA2854-BE27-45F8-AF6E-CF6C474CF15B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(1j\\):*:*:*:*:*:*:*", "matchCriteriaId": "8296DD01-9CE0-4734-97A1-43250AD87453", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(1l\\):*:*:*:*:*:*:*", "matchCriteriaId": "77FC6FCC-9C86-43CB-A008-82E5C3E5B791", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AD71858-CA76-4BE3-8B4F-626959F6A342", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(2f\\):*:*:*:*:*:*:*", "matchCriteriaId": "38F4C42B-D975-46B5-8A18-1D6F72A294F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(2g\\):*:*:*:*:*:*:*", "matchCriteriaId": "58277DB8-BBC7-4639-8967-FCBAB029641E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(3j\\):*:*:*:*:*:*:*", "matchCriteriaId": "7E6354B7-3CBA-4E09-93F6-B49717B2A78E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(3l\\):*:*:*:*:*:*:*", "matchCriteriaId": "C693C8FA-3324-4439-B177-6FAE387DB23D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(3n\\):*:*:*:*:*:*:*", "matchCriteriaId": "949C0F31-77ED-49CC-870D-70104AA908A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(3q\\):*:*:*:*:*:*:*", "matchCriteriaId": "007BDA28-37AD-4F37-B351-C3BE0B8418F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(4i\\):*:*:*:*:*:*:*", "matchCriteriaId": "9563DBDC-D2C0-4C7C-A246-EC95DC4581CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(4k\\):*:*:*:*:*:*:*", "matchCriteriaId": "09CF92FC-B053-4234-830F-683E06807545", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(4o\\):*:*:*:*:*:*:*", "matchCriteriaId": "61DF8B69-D0B7-455F-A50E-5930948BED49", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(4p\\):*:*:*:*:*:*:*", "matchCriteriaId": "724603DA-06C9-4E64-B495-A90AD9BF31E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(5k\\):*:*:*:*:*:*:*", "matchCriteriaId": "D1255013-E3BC-4048-BD50-4641C0048FA7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(5l\\):*:*:*:*:*:*:*", "matchCriteriaId": "829A7F53-0C09-497C-AC27-FDF7A573A502", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(5n\\):*:*:*:*:*:*:*", "matchCriteriaId": "11633F33-1BF8-440B-B1D2-F06E3613BEBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(6d\\):*:*:*:*:*:*:*", "matchCriteriaId": "84AC6EEF-633F-4F55-8C21-1B0782FF6596", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(6g\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F4CE8A3-2AC2-420B-983A-1D49CEEE5B95", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(6h\\):*:*:*:*:*:*:*", "matchCriteriaId": "844669D6-6180-4F39-9DA9-691322F43BAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(6l\\):*:*:*:*:*:*:*", "matchCriteriaId": "074D3027-0863-4738-AC5B-897A5D96BD71", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(6o\\):*:*:*:*:*:*:*", "matchCriteriaId": "9F9A0537-8897-4E4D-987A-3F298E4D2B37", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7f\\):*:*:*:*:*:*:*", "matchCriteriaId": "FD6D7D62-660F-49AB-96D7-189778A42394", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7l\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2043E85-0157-4CC3-8086-FA3D075C4EA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7q\\):*:*:*:*:*:*:*", "matchCriteriaId": "248E9B58-B96B-4344-AC9C-CEA3A8033569", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7r\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA29C49E-92BA-4878-83BA-BF31FF372EA4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7s\\):*:*:*:*:*:*:*", "matchCriteriaId": "60965FE5-CE51-4144-B644-E331CD243B05", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7t\\):*:*:*:*:*:*:*", "matchCriteriaId": "4B8989C9-2BCC-4E94-AFE0-7CB17E39602F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7u\\):*:*:*:*:*:*:*", "matchCriteriaId": "E587DD04-0B07-4225-8AC2-39764BD5C4C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7v\\):*:*:*:*:*:*:*", "matchCriteriaId": "281468EF-C7E6-45F2-9264-9AC9B45C9ABE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(7w\\):*:*:*:*:*:*:*", "matchCriteriaId": "49E6CD5F-C5A7-4A06-A87F-22C3E2B86068", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.0\\(1k\\):*:*:*:*:*:*:*", "matchCriteriaId": "ABBAFC12-85C7-4FD1-B46E-D8268D00DEE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.0\\(1l\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F988380-7BAE-4E9C-B1E2-D3F7389E2FB7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.0\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "11E2E40A-CCD5-4CA7-826E-10923BED72E8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.0\\(2h\\):*:*:*:*:*:*:*", "matchCriteriaId": "95A5C1D4-EAE5-4E3F-AFCC-96B1ECDA91EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.1\\(1h\\):*:*:*:*:*:*:*", "matchCriteriaId": "C78C9E79-C6DC-4FE3-8B79-A9BEBED9A67D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.1\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "636FE4FC-D76D-4EF1-8C36-8B0D35247A9D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.1\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "743B909F-18EC-4F75-A82B-D8AC1528A30C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.1\\(4c\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8157E7B-8AA2-45E7-9506-A0D5B0167031", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(1g\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4C90C63-E006-4101-A737-429B28A5ABD5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "0235897B-D881-4C22-AEC5-6B0D8552B47B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(2f\\):*:*:*:*:*:*:*", "matchCriteriaId": "77B4432C-D3C1-45DA-8E2B-1282A98D4D66", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(2g\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE2846A6-62B3-4035-968C-AA73FFA1EA67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(2h\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6DC1C38-8134-4548-9685-03664699B273", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "C46E10DB-6CA8-460F-9C6D-48684BDCCEA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(3f\\):*:*:*:*:*:*:*", "matchCriteriaId": "D027C394-ED7D-4302-92B1-F9A2F60C8568", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(3g\\):*:*:*:*:*:*:*", "matchCriteriaId": "3914D468-662E-4F82-910F-67800189462E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(4d\\):*:*:*:*:*:*:*", "matchCriteriaId": "6502FEA6-A959-48F3-84E7-6E2180D23956", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(4e\\):*:*:*:*:*:*:*", "matchCriteriaId": "1336D0EA-F391-411D-B140-040E805DF3DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(4f\\):*:*:*:*:*:*:*", "matchCriteriaId": "60BC734F-D9DB-42B9-82C4-4A23C2A3C14D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(5c\\):*:*:*:*:*:*:*", "matchCriteriaId": "F9F5D422-54B8-47F2-96E6-A820E27658DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(5d\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2BBBEDF-6869-4C99-A1D9-1AF53EFA82E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(5e\\):*:*:*:*:*:*:*", "matchCriteriaId": "CBB9500B-84F9-4B35-95C6-26F57BE8145C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(6e\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D467B51-129D-409D-B38F-198162C48BBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(6g\\):*:*:*:*:*:*:*", "matchCriteriaId": "070E4F81-493B-4F1F-BA9A-05F447E1C6F6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(7f\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFA1B066-7A7A-4291-9404-4482556B7CC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(7g\\):*:*:*:*:*:*:*", "matchCriteriaId": "9BD70DA9-9CF0-4CAA-B017-6CAF55DB2E3F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(8d\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB2F2F8C-A371-4A42-8D5A-011A7B4B3332", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(8e\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AC60CD0-F1D7-4684-B268-63B9848A99A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(8f\\):*:*:*:*:*:*:*", "matchCriteriaId": "079531AF-B9B2-425C-AC6F-C352C55D81EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.2\\(8g\\):*:*:*:*:*:*:*", "matchCriteriaId": "24AE9B54-22FA-44CB-B08B-BBC568224B6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:15.3\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "0F89EA3E-4C98-439D-9F52-727537D869EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:16.0\\(1g\\):*:*:*:*:*:*:*", "matchCriteriaId": "6B68CD3E-700F-43D2-960C-C53A6EE241B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:16.0\\(1j\\):*:*:*:*:*:*:*", "matchCriteriaId": "743AED05-E2D7-4322-8814-C803F0BD6265", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:16.0\\(2h\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C541E43-5457-402F-BA3C-5E0B08FC3A39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:16.0\\(2j\\):*:*:*:*:*:*:*", "matchCriteriaId": "17BCE5BD-1F25-44A2-98D1-2C804EB3C1AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:16.0\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "63080263-FDE4-4E8D-B32C-6145BA4D7CE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:16.0\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "E9137758-0F12-4688-86C3-A20C3362361E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E40F42-632A-47DF-BE33-DC25B826310B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBEF7F26-BB47-44BD-872E-130820557C23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "102F91CD-DFB6-43D4-AE5B-DA157A696230", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "5394DE31-3863-4CA9-B7B1-E5227183100D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C3CE6D-BD54-48B1-A188-8E53DA001424", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DC1E93-561E-490C-AE0E-B02BAB9A7C8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CF467E2-4567-426E-8F48-39669E0F514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D6DB7F-C025-4971-9615-73393ED61078", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(1e\\):*:*:*:*:*:*:*", "matchCriteriaId": "B3EAA85B-D32F-480A-8157-C52D50CFCE7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(1g\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0D47C90-0AD5-48B8-8D3B-4450CF9F3C40", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(1h\\):*:*:*:*:*:*:*", "matchCriteriaId": "90025023-21E9-49C7-BE5C-F64E9815E339", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(1k\\):*:*:*:*:*:*:*", "matchCriteriaId": "A53C95F7-FFD9-48E4-985A-7AA68936D7A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(1l\\):*:*:*:*:*:*:*", "matchCriteriaId": "E076C7BB-0A9B-4490-B068-216963D0171D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "3505BFC3-F603-454D-ACB8-D92DDB51DB14", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "39BA0882-06F3-4FA3-92E1-F348017ECF7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "2986E4AB-B295-4E1F-8CE5-997061BF1FFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "E29CB50B-6434-47D6-820B-E9B3CC8335B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(2f\\):*:*:*:*:*:*:*", "matchCriteriaId": "F77EC878-DC52-43E3-A261-02F708D117A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(2g\\):*:*:*:*:*:*:*", "matchCriteriaId": "49B404E9-00C7-4BE8-90BF-998B2928A932", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(2h\\):*:*:*:*:*:*:*", "matchCriteriaId": "86E4811B-1A76-439B-BA56-8311C8C62525", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9AED9CF-2C5D-4060-9DBB-8AE122EDB17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "89547608-E65D-4116-BD88-ED235F2A8F30", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F8BC560-D6FA-4E8D-A759-067DA66E1D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "273547BB-2E8A-4CCC-B90B-7C1949F346C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "E70D3E1C-C679-4756-B1C7-A2166A6E29C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3f\\):*:*:*:*:*:*:*", "matchCriteriaId": "22684E00-BABD-416F-BEF2-5F058B2248EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3h\\):*:*:*:*:*:*:*", "matchCriteriaId": "C24D2CA2-E875-4C56-B47C-CA3A720A1DBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3j\\):*:*:*:*:*:*:*", "matchCriteriaId": "58DDF534-D996-4813-928B-B28BCA3F5B46", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3k\\):*:*:*:*:*:*:*", "matchCriteriaId": "18698352-0F20-4713-9F9F-A76BBB309602", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.1\\(3l\\):*:*:*:*:*:*:*", "matchCriteriaId": "8BD67316-B6F2-429B-9819-1CFA20A391B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "914321EC-27D6-4950-8965-62E0EC097EA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "CBA3F51F-2B88-4B84-8747-AA185FB1B7CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "FB4EDBA7-9D40-4564-9FE7-35B4CF6DF596", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "CCEA95B1-C771-4F5E-91EA-5FB9E9706A81", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "11FC2E61-EF57-40A6-A636-852B9ED5F543", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(2f\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4BEC874-CBD8-4906-BA61-7F1E6144A662", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "4822C7BF-D62E-4AE5-98B2-29C7846D25DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "DB589998-A7DD-46A9-B76D-411E90B77A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "43DA44B1-DCFB-4B34-A781-DE5EEEED0A64", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0E33324-72F1-48EB-9DC5-D76D41DC8D11", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3g\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED31AB54-8E4B-44EF-ADD5-179E6219AA5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3h\\):*:*:*:*:*:*:*", "matchCriteriaId": "291A7644-3D51-4218-BEA2-6548E2B85415", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3i\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CADD-A8A0-42DB-BE04-C3BA885110A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3j\\):*:*:*:*:*:*:*", "matchCriteriaId": "C50AB5E7-0F57-4789-8267-810E81415BE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3k\\):*:*:*:*:*:*:*", "matchCriteriaId": "6737F2E0-CF77-48E6-96F9-D0205EBEFB38", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3l\\):*:*:*:*:*:*:*", "matchCriteriaId": "EE021363-7626-4083-BEBB-C311C93499BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3n\\):*:*:*:*:*:*:*", "matchCriteriaId": "6C5243E3-8196-4080-A41A-61908F23E40C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3o\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D6780F0-90FD-40F7-97F7-D8344C07A472", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:3.2\\(3p\\):*:*:*:*:*:*:*", "matchCriteriaId": "3B6E2F70-D477-4065-BFD7-5CF644B56DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9AE28A2D-D4DE-474E-A514-C4C615A6ABE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "986404D3-32FB-4E10-89E6-AD8472B5F0E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "6558BAB8-EF40-4F95-A9D2-8E6466CAB9CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "4DB2E4DC-79E6-4134-8C92-2805DD7245F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FF58927-D0F5-4A3D-A6D7-73010E67F6CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A0A8A2A-DF1C-459A-95AC-EE3F129F5F2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "D82A6A44-AB31-4E26-926F-2886EE43FD02", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "B622BA6A-D9E5-484B-A463-94167874291A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3E4C4BCF-22F6-40FE-BC9A-0179FBF640FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4b\\):*:*:*:*:*:*:*", "matchCriteriaId": "539B8E60-29DF-4702-9DCA-7BEC4ECE2C43", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4c\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C55674A-4411-463E-B064-388AFA67198E", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4d\\):*:*:*:*:*:*:*", "matchCriteriaId": "C671D9D2-E2F3-4C26-94C4-6BE7101C0C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4e\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B62733B-8786-4D3F-878E-FEF6BD3A77A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4f\\):*:*:*:*:*:*:*", "matchCriteriaId": "2E959214-4A0F-4C28-A3E1-8F64D0846495", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4g\\):*:*:*:*:*:*:*", "matchCriteriaId": "CE73DA82-28F0-4239-AD8E-D49F0A812F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4h\\):*:*:*:*:*:*:*", "matchCriteriaId": "BBF2BD10-5503-4EE2-8187-10B457A8C1C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4i\\):*:*:*:*:*:*:*", "matchCriteriaId": "80E4394B-6FD9-4E8C-8A91-506B6ECC542C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4k\\):*:*:*:*:*:*:*", "matchCriteriaId": "EAD1306C-AFFB-4A03-9A25-444C250D9084", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4l\\):*:*:*:*:*:*:*", "matchCriteriaId": "11AE1132-3ED8-43EA-8EE9-5B0301693161", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4m\\):*:*:*:*:*:*:*", "matchCriteriaId": "3356EF91-2091-446D-8B1C-008526B0896C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4n\\):*:*:*:*:*:*:*", "matchCriteriaId": "95EF2B9D-9F79-45B5-8C81-1DBBB6872479", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.0\\(4o\\):*:*:*:*:*:*:*", "matchCriteriaId": "1EB265E8-8738-4C48-B1B9-4CC83F5391B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E9922D1A-DE59-41ED-A590-BCB9EE011300", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C10BD99-AFAE-4059-BAEB-78CB98C4151D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "01D712D7-7D32-4C31-9E89-79DCD7ED8A4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "79B21C68-06D0-4DB5-B1B5-CE18FA50FB0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(1e\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED0C934F-0E58-4706-B3C8-A1D4FE9CCFD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CB04F9F4-A379-4B0F-ABDA-6118D3A0A7A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "CBCCFCCA-A90C-4CDF-84BE-208F52CA6B6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "7E8A143C-9DB6-43EC-92A7-D253137F991A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BAD3C39-376C-4353-BE7C-1D410EA68D27", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "2DCDB7FF-4095-48DF-B2A5-F934EDDE8451", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "12AA385D-152F-4C4E-865C-D266B97915A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "03C5D98C-2CAC-43F1-B52B-57E4722BA7AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "C4277F6F-5DA0-4109-B890-60B9E89E72DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3f\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FCC1C6A-DAD2-45BE-A3A7-DD89BB2FB59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3h\\):*:*:*:*:*:*:*", "matchCriteriaId": "83109B12-A9FD-48AB-B658-523A368EBF07", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3i\\):*:*:*:*:*:*:*", "matchCriteriaId": "220FBC66-C17E-433A-B5D3-87ED8D971639", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3j\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2FA7A5B-4A4C-4F44-95C9-7026E4BB9715", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3k\\):*:*:*:*:*:*:*", "matchCriteriaId": "8037F2FA-60A2-4589-BF71-481F1A8B65ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.1\\(3l\\):*:*:*:*:*:*:*", "matchCriteriaId": "50C3B4EE-88E7-4FC5-BE86-9ED89B90AA3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1c\\):*:*:*:*:*:*:*", "matchCriteriaId": "7FFA5A44-790F-45BD-987A-95E52CC829F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1d\\):*:*:*:*:*:*:*", "matchCriteriaId": "3AFF7EA7-7360-4B9B-94EC-08D109B3F6DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1f\\):*:*:*:*:*:*:*", "matchCriteriaId": "A00A126E-BC7F-4C75-896A-C8B0DA0B925D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1i\\):*:*:*:*:*:*:*", "matchCriteriaId": "B711E297-EFA6-43CA-A086-A1810F937101", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1k\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8B97A1-47CA-4336-BA0A-06A131907B91", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1l\\):*:*:*:*:*:*:*", "matchCriteriaId": "550D6CF1-A6E8-45AD-81A3-AF00BD847702", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1m\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F744FE0-7CD9-4ECD-AD31-65C10A671FA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(1n\\):*:*:*:*:*:*:*", "matchCriteriaId": "A0088576-161D-4A1A-A360-B61D4E36FDEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6146B191-2B42-4EB9-97E3-08F4B9447E0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "8EDBDA0B-C31F-4F8D-BCA2-CA0E419E8064", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "23DAA93F-202F-405C-BCB4-E15F1684145A", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "537D24CC-52C4-4A35-BF4C-57AAB1B81D3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3b\\):*:*:*:*:*:*:*", "matchCriteriaId": "AFB3EEB2-49B2-4850-B2E7-771D1694CD66", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3d\\):*:*:*:*:*:*:*", "matchCriteriaId": "34D07D7C-CD97-4B9A-8265-E40A22D7AEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3e\\):*:*:*:*:*:*:*", "matchCriteriaId": "97B88CF8-4E88-429B-BDBA-7991CB7D032B", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3g\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A7C816E-3191-4D44-AB8B-4719EC642742", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3h\\):*:*:*:*:*:*:*", "matchCriteriaId": "64713265-61F4-44D0-B1B4-6609A837F718", "vulnerable": true }, { "criteria": "cpe:2.3:a:cisco:unified_computing_system:4.2\\(3i\\):*:*:*:*:*:*:*", "matchCriteriaId": "A488703E-EB6E-49BE-86A5-0DE444460417", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ucs_6248_up:-:*:*:*:*:*:*:*", "matchCriteriaId": "4838224B-13BE-4C7D-AF4D-D7F0A501919F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:*", "matchCriteriaId": "49112D3F-DFAD-4E71-992B-9E0640FA388C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6296_up:-:*:*:*:*:*:*:*", "matchCriteriaId": "C33489B6-5D3A-43EE-8248-4582590D1561", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:*", "matchCriteriaId": "38A1D8F2-A4A6-4BAC-8326-9F9DE9572FA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82093C6-B36D-4E4E-AD7F-8C107646B8D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:*", "matchCriteriaId": "E406DDCE-6753-43E9-B6F0-7A038DE84E41", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:*", "matchCriteriaId": "054D8EB2-97A3-4725-9DFF-27A4D231D90A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_64108:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC04D48B-8B2F-45E1-A445-A87E92E790B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FD096B7-6F8E-4E48-9EC4-9A10AA7D9AA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ucs_6536:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C36A364-DBC0-44DA-9DB0-6CC8E9D074BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF658ED7-F77C-405B-B06A-74B46FBDAD98", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F0FDDF2-912C-4900-B0B7-20AF5D2F1B52", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "7295EC54-FA19-4658-8510-3C072804D9E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B31E39D5-147B-4965-ACB6-34F1244143F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D672928-6AE8-488B-A2A5-257074BAB2D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C928C35-4E24-4DBE-ADEA-D449B88ECB6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "E64D8992-CA79-4ADF-BF3B-A76E944EC740", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "11A35378-54EB-422F-B0DD-211B214803D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a4\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "1E46D326-665C-4DB7-89A0-0F1B987D4A18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73B9FE4E-0C82-4511-9A4A-DCBFEB93DE87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB8F0200-7BCA-49E9-98E0-D825630D77FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "61FCA143-FDAB-472D-B9E1-F7CB4041BBE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "61F736DD-44FE-4A20-AF89-4B29725608A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "8844860D-427F-4B01-980A-59B082F26034", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CCA96B43-0793-4784-A971-DD442EBFF6BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B13305C9-008F-488A-ADC7-0724AFB313DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "50DFAF49-0688-4A5A-9023-E2543164D89C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "46376F5C-2CF0-46F1-ADCF-870065A24D12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "5EB6C0E3-9B92-4768-93BB-8B8626EB164A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4EA572E-5F4F-45F1-B7A1-346F723C2BDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6EA3CBB-EAF7-4837-96AF-0258220C4A5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "5E6FB730-84CD-496D-9140-BC9375548D14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD712B88-298A-4488-A053-67CB45190F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4ED5F397-D3E6-4A4A-BF38-6B295A6AB9BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a7\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "11D98EBD-9D82-492E-A3A6-62D95404D5C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a7\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "56D91C38-76AB-47F5-BDDE-E940D87C34F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a7\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF78015A-5C28-4FD2-915E-EC343201A9D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31308B18-062C-4DB8-9241-F15661C06398", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED17D340-9C18-4B1E-BA15-CAE2ADAAD38E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "310856A9-CA62-4C1A-A4C9-B6EECC36F496", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D295366-662E-4C8E-9758-3DB801E0ABA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F09360A9-3FB1-465F-977E-643942D01FE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A97A6BE-A27A-4D53-AB63-2A2631F20EAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F034BF4-31E6-46FB-B082-EA22FFE51AAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "063BB311-EC8D-43E5-9B9D-56C96121EB9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "003AAC03-306E-4D12-B4C7-7ECA4ED88884", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7b\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB0DAA33-3841-4C14-A137-93E1810CC866", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "ACD5B480-2780-48EB-B361-4EF4833D97E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "B0500999-E48F-4FE1-9B92-C1E179651CE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "629488D4-D8A4-4152-A4D3-E951F199C6DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(10a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8F0A63-8229-46E8-94A6-CDBB1E8F91E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FAD3C773-0B71-4FF2-9DCD-2875CFDE3308", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B07F6A0D-82C3-4C2C-9715-3D07083E6F56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11b\\):*:*:*:*:*:*:*", "matchCriteriaId": "03901678-2CCB-4ED5-AF04-D8469BF12804", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "618861BD-8FEE-4EF8-BFFB-A5BCBA8EA3EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6459DD6B-6DC1-4C14-A8E7-4503ED5F69BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA600413-FC70-4776-99DF-180C96D4FD24", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "ECC9066F-3082-48A0-BA52-9ED9420EA47A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "78611E25-E33E-4C88-A681-97B5A2A01B51", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "780B04ED-412E-441F-8717-D8F9257F5699", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FC6A3647-2AF0-4D45-BCC9-24618B43ACBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD2AABBD-8680-4615-A4E2-B607CB1B0979", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "693F444B-FA34-489C-BB45-E9185DE47816", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "13669043-3F12-4439-812F-6DE35F70B159", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "58A8BDE0-2F73-4E0C-B73A-918DB3352067", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "5CC4DC15-3045-4CE3-A7B5-4E6ED35BF51F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "625BE6B1-12A7-4A8A-A816-E82C026E0457", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "4EAC2920-462B-44F0-8E93-7875C2F74592", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u3\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "35957A41-D8F2-4BC1-986B-C3E271327D64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "10BFAE68-01C5-4EF8-8B86-F470092E9034", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D02FC11-EB21-45CD-A070-89C4862240BC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "8C67AE59-380A-402B-9B2A-F595E001637B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "4301927C-7A6D-4DA9-9470-9182E7FB234A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C71ED401-6786-4AAE-A98F-BE4732256A7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "E2B5EC76-A4A7-41C0-9F37-5EC85FD1EB5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "66BC7FC9-1167-41C5-9B0E-7D68400F3C39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u5\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6EB46CC-2939-4326-8CB9-504D7C7EF05E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8845147E-D3B1-41B9-BBD2-77B2823F3AD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F7B2F23-F532-40D2-884E-D86785B33296", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FC4F349-9E1C-4DD8-BC07-6CB67053BCDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "D498C133-AA11-49C4-B065-F27CE776D318", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "08032AAC-F094-4717-A56F-89289FBD1F3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C5ADD4D3-206C-4609-AB2A-F6945D56627B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "07645F73-AC79-4BB8-A98E-1740F7D6EC5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9DC56869-4665-49D1-89F2-8ED97727BD94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "147D1A4A-6404-47E3-B1A6-4C001C8DD9E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1162691A-6C92-448A-8F1B-2DEFB623F1ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "57524BA3-CF08-4F0F-95C9-F1417B4B83E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5c\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0E214C2-24CF-43EC-BC27-2E6AA77254DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB0D74A0-C4B2-46EC-A9FF-562A997E3150", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "817A45B4-7C79-4D1A-B889-18A937CF8361", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "155F3CB7-A85B-4897-A4E2-F485FDF44AD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D34CAB5-0832-45B1-B13F-49B763AFB74F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C0DB182-F37A-4230-BD6F-461C3195FAF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD54E122-6102-451E-92BF-AF71D98AEBE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FDE8EF9-47CF-451D-9570-3D369D74D44F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "55A760CE-5E63-4A6B-8DA3-A473BC3900E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C857C0F-B023-4CF7-9916-6735C40425F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4C558C0-ECA4-408D-A5DF-2A175E48EAE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C4947F0C-B1F5-4BA0-A6F0-F08C25554E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "BC281019-3BB1-4539-BFA3-1D13E2ABE720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0E738E86-B75F-48BF-9E76-C7DD470F3688", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*", "matchCriteriaId": "11E66F3E-9482-4F30-8480-F036F3C68B61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*", "matchCriteriaId": "68C6090F-0B05-46F0-8A67-928FE1C36D5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "07863B2B-D780-4641-BADE-A5AFFAD95E57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "FBD345BD-83EF-4913-A0F3-74E52AD76BBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*", "matchCriteriaId": "46B2B97B-DDB7-4208-BF1A-D10C8A075A14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*", "matchCriteriaId": "317C8BE8-84DA-43D5-AE93-7E7DCDE6883E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4F7ADD7-C438-40A4-883E-BFAAA9BA0029", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(9a\\):*:*:*:*:*:*:*", "matchCriteriaId": "31C3DDB7-119B-4AF8-9896-8DF08303E04E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(9b\\):*:*:*:*:*:*:*", "matchCriteriaId": "05C1E8F0-3840-406F-A3F6-BB50735B0214", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(9c\\):*:*:*:*:*:*:*", "matchCriteriaId": "01D17E16-271E-4642-9577-32B58EEFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED7B1216-4C4F-4A23-9474-23876649ABF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "BA4A04DF-1668-42FC-9C81-11FFB93B43D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11b\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF349FDA-DFEC-45AA-A236-F0C8D0B3AD83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11c\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F5A0E74-C0C2-4593-9ACB-4A94E5BA4A29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11d\\):*:*:*:*:*:*:*", "matchCriteriaId": "C926C2EC-1838-4B94-945D-69315B645B39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11e\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D3C6E19-4A5A-45D4-9BE0-97BE969D8BFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "57892CBB-8C95-4E56-90F8-B77BBBDC03FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F52D1CE-0F00-401B-86AE-1E93F7259B02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(13a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA749833-7D3B-4FFD-9A5F-9D9966D1DDBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(13b\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FEDA299-FD35-46A0-A7A3-50D526D445C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "A555382D-9D35-4931-B3B0-DD4D956AB7AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "411C176B-3A5D-4EFB-8DCB-753E7BAC6AF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "985752BE-AC65-47BC-97F5-36C2E44E55D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "CACD51E7-FCA3-4870-94E0-FAB505743C8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "BEC60C3C-8689-47EC-B944-F0FB9D38E4F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "9110930C-AA37-42F1-8B7E-E06033133D42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6A61F7E-9929-48F5-85BA-72E744AF30B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA24A851-F051-41A8-A33E-7296AD199306", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "8540E153-4041-4CBA-ABA2-6E78BD3A6E6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "52E6911E-3DD8-4FCC-A1B5-613098B25337", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(23\\):*:*:*:*:*:*:*", "matchCriteriaId": "B8F9A602-F5E5-432D-8304-19964DC373A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*", "matchCriteriaId": "FEA235F0-95C4-471A-BBD6-EDB723E6E7CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(24a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F558EAFA-C4A3-4EC3-85E6-225D3EBB0D90", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(25\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B86774A-900E-4A02-B671-C13C18965358", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(27\\):*:*:*:*:*:*:*", "matchCriteriaId": "D23ADF50-748F-4795-B564-6D934B95F8D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(29\\):*:*:*:*:*:*:*", "matchCriteriaId": "1D4A2531-F5F0-4AB8-A812-7ADE7D558B77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(31\\):*:*:*:*:*:*:*", "matchCriteriaId": "95777BFD-0F3B-49F8-9131-34EB83F7ED67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(33\\):*:*:*:*:*:*:*", "matchCriteriaId": "FF43590F-5F94-49EC-BE3A-55635ECD3176", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "21F43A5A-52A2-4094-8D36-39450B8F0E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "674D15C8-3946-4C2F-9B62-BC6E5BC67673", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "990FA11F-5158-4717-B716-C5D6D2D23D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5DD2941-AD1E-4C13-8DAA-C5524B96AAB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A37F82-44B3-426C-A344-9054599BB426", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "907A3DEC-27F8-4D0A-9EE4-4681B6D9BADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "53378B5F-4A5B-425D-B8BE-455FAF924551", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8F6C744-6501-4FAD-AF4F-12D3EA8F5BE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "076216C6-C115-4C7C-A9E3-46A3986DA2AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A819AE96-3933-4AD2-AF30-36E199393E01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C8C0FF6-E9E5-4191-8C21-E8CB3F6BF7D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "D2BA7EF9-FDA1-4A2D-88B2-67042367C90C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A2FBF6CB-DE31-453D-BF47-89D0766D3020", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "046E260B-F842-41BA-914B-ACD7B71AB62F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "AAF537FC-B681-4F52-9324-9A4AC29651AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6B2E736-F9D2-453A-9998-38800CC875F4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "3E8CEAC9-1C53-46A6-A18A-2A970D587C0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "851E1B4E-40C4-4639-8FC6-C9DEC6FB2744", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "7E5FED85-FDCD-44BE-9C38-53F6EF6212EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED4C8DC0-0DBF-410E-ABC7-53CD5AD04EE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "6AA776A7-40B3-4104-8F55-1B905D36653A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DBAC49A1-91FC-4D55-BD74-42C918CCFDC9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4142F873-0492-4ACC-88F9-3A243128D0EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9CD31FC-C2D0-4B29-90D5-7C3CB218DF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "30A500F4-1899-4F96-98E3-9330146A7963", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE52C974-3930-4AC9-907B-8E6B325D6A1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FAD07DE9-5C98-4A63-A741-8E69E9F125D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0DA113F-3706-4FF3-88F9-5D3CD48F8CE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B3BBE1B1-062A-4D00-B646-FAB4BA85BF6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A35B6DA-BF07-4579-8D6A-65CD8E052482", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF0B3DB8-8121-4FDC-8A11-42AB619101EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8b\\):*:*:*:*:*:*:*", "matchCriteriaId": "70830AB5-C86B-4726-A982-6F104910153E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8z\\):*:*:*:*:*:*:*", "matchCriteriaId": "87EB3AE2-8A92-4B16-8A22-A0F5B55D12E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0904B27-2FA3-4B8D-9706-98B0376B5FC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B1D86994-83EE-4D09-B79A-70CB22C077C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1BEB5BAE-0BB6-4201-9229-47DE631AAF3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "00953B63-7DBB-4A67-B41D-321C2ECDE79A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "83B2E7F6-9641-4B55-8B7D-6B0E020DD4A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C9388C2C-75F4-487F-A7D8-4E17FD39A166", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "80B54786-DA2A-4E2D-9835-6A7939931928", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "7688EC58-4647-4A08-9E86-A71EA7C41B88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5AD2254-158D-4BEE-B36C-242813F4BA37", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "4480D800-595F-44CB-85ED-7E17A34A5BEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF7AB4C3-54E0-4445-974C-4AE337B7B7DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD015889-3893-4781-B18D-6125A9B6CE39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "89541F84-0C10-4757-8D25-80FC4464EC23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "371AEAF3-39CA-4837-BA5A-D80826933C9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C1BC928-7DB9-499A-8CF4-90C98218E9D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3779AD1A-7E6D-4213-A35E-7E9E461AE6FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DE199525-4C2D-48C2-A76C-BD14BF2851F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E3644F66-F964-4D50-A6E0-EE8784490BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "72AD166D-7CBF-4A4D-A376-907DDA1BB504", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A20D72B-E2C6-47B6-A54D-FA435F29D7F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "77D9EEFA-D652-45D2-8AF5-8A72825E7ED0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AEB91EC-E548-4C53-920F-C4871BC464B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0282F963-2C1F-44F7-A0D0-4929685051AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9103A92E-C9F3-401B-AE30-66466210ADED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B5ED7424-EB12-4C21-97C8-082156716C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "16359104-2DB6-41D6-97A8-8CA1C3AB5688", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BF973CD-3315-4D86-8F89-05DC97C736AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C18A0045-87F3-4782-81C5-0BF615EA9346", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2768DEF1-3DFA-4683-9D8D-C5915D8E7365", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3CD05045-E867-4B7E-ACE4-7B6EA69971AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7FD733DD-EC40-48EC-A8A6-AE09657EEFC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)dx\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "18CE33FF-6C81-4B38-8C47-6DEBD4D4223C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)dy\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "ADC3F316-982A-4D7C-BE3B-C3D87F58B298", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "569B3CE7-CA06-4636-8043-7ED7635195A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A7B0A8C-ED8F-411C-843F-B801CBBBB6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)dy\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9B515AF-915A-4BAE-AA51-CF57F7316A63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D72F0B8-D229-4995-A053-62FA6591DCBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FADC755B-3AB3-43D6-8495-1FABCBD548E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "03607526-7F9E-43F5-94ED-3ED0B4D29DF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "8890C4B8-2E5C-46D6-80DE-6B5256FA1CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F8A3FFE-D017-43F7-B481-AF25B8B2BE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D8025943-EA09-47E6-9109-7DAF078F8F26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "98FC292D-27D3-40CF-98C5-AF47686FC134", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EE35B51-2D13-4A8B-BFF5-0596DBDCD261", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C23B353-3500-4FA4-90CE-624A29B1048F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69FE85C9-A0AC-4FD4-A6EE-F0868B69503B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "29002523-6405-4198-A5E5-630A4B661767", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF1257BF-D534-4899-937F-DCBD033A7D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF0DFA7E-9B40-4E82-9EB9-886C79B2D61C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "86E5CF27-5661-41DF-B339-740718760AC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FA615483-9E8E-4E74-B2A1-FCA555523DC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9ACD2D0D-7A38-4FCD-9E24-5588BACF8DA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "586E9024-C983-4CFF-9A3F-A39256E09910", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2B7951C-8376-49C3-BF50-E6B65909A739", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(8\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E991E535-5FB6-40FE-B599-9CFFDA6438DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(8\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0E8D1718-F6B6-4AF6-86EE-0DFF5C6F5AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(9\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "90444CE8-2D46-432F-8713-6B4A05D03AF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(9\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4D9EA4B1-4E06-404A-8989-0BA8BE611211", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(10\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F304E6D1-6FA6-452C-AC49-27173F22966B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(11\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "58895A84-EA72-40EA-BD7A-AE2EA362BA8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(12\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5F7966B0-2CAC-4249-98B4-EDAA2F0BF3EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(13\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7937350E-C774-46F0-88EF-E0464EF868B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C83E090-7C99-465A-A477-C2949B137720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB556839-151C-492E-B4C3-C024276D5AB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A8D89C0-8C65-487B-9F2D-FFE31AE5BBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "409A92B8-F9A5-401E-B77F-177C48B22F23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "298709C4-69BF-48BA-A317-4251B5461A0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EF15089-A16E-47CC-AB52-78AB85F681BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FB0B238-4F3A-4569-89B0-ED80533D87C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF90B861-F48B-45DF-ACB8-F91030106181", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "CAB301FC-988F-4FC3-A097-E926E541F098", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6CFA19E0-0121-4422-83AF-94039520A0F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "03201B37-841C-432F-8643-352833381373", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6AD86DF-7D7A-4097-8DBF-9EF07EF5509A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "9CF6FCE1-D9F7-4A1C-8570-1A1529BFFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "224696A4-D5A9-4E5F-B0D4-68F27A1CD6A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A54DB25-6479-4B1B-AEE6-9F4EB1A0E90C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0ED62FC-4C6D-4777-934F-0A9A32194E0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "84FE4C8A-61BC-4F5A-B4E1-8525FAD55CB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6B8E31F-6B33-43E0-9585-5736D54FE876", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C828C0E-99E6-4DEF-9EB3-672DEB61F479", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2636B1F1-8C40-44A4-B96B-C84EC244685E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0A868C7-1060-4A48-819E-013F435F08D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "411B58EB-2BCD-47CA-AB5A-538BCEAEF75F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E85905-A3F0-43C0-A578-6E9C14033D3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "64E228E3-B088-4E1B-9E46-ECC8835CD9A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "17679F98-B8D5-4FDD-AA8F-9FCF703B466B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "BCCF180B-0710-4368-B588-86C0971883A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0E1A760-CAB3-4313-9315-26AD75C43CC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2f\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8DBDA3B-E8A6-4709-81F0-32908100D975", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1D725607-74D5-4700-B4B7-0C35D119F9BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "189BE025-7434-4790-94E3-4F4F07C76937", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A2E2364-1C5B-494B-B7DA-752F9E9D5464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1C2124A-A7B3-4D2A-870C-76EFCE0D0B9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F45511E-5224-4919-B6D9-83EE7493D0E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(6a\\):*:*:*:*:*:*:*", "matchCriteriaId": "52F8EDCD-45C9-4408-BD20-71C70CDE367C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A39C505E-ABEB-4481-8A8A-1B1F3C5E0A81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8BC7435D-C9E9-4895-A958-F8F78DAE93A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD96C7AE-EECC-43F4-9132-1E7F8047C701", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "728C0D94-CCCF-4313-98F0-1E25F7FA2464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1D43B9D6-0991-4370-9369-C0A1EDBF6627", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*", "matchCriteriaId": "6EB58108-78E4-4208-A549-C86B37422828", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*", "matchCriteriaId": "46427F06-FAB1-4AB8-A6BF-3EE10608B4D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "5FB6ADC7-97AC-4DD8-8F1B-448A63D8BE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6E2484E7-24ED-4238-8ED3-FFFB7C479F18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A589031-946F-4016-AFC9-92FB033420D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "20FF2A5A-CB80-4F58-856D-724AACB0864C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "89FC0A74-2435-4977-BBB7-906B812382EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FF50BFC-2DB3-4954-BC59-8B3D27D418E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F97A62E0-8A96-43A3-8FB1-FDC1B8A08049", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A2F42DB-B22B-4880-BA73-D0E0295190DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "85A8B2D7-BCF2-4B2E-8208-7D2FDF717C65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8A71DEB-93CD-4827-9F9E-3A0DFFAD145A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1A56DB8-CDDD-4AB8-8694-B6CC967B7F62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B448FDB-C2F5-454F-A275-E985C3FCDBCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AEE47A7-B23A-4C9A-A25C-0983D94FB569", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "350F10D8-221B-4A47-8BF6-CCC421878243", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0B4E497-95AE-45FC-8F89-A7959CA9AF4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D7B192CE-F0B4-415F-9A33-B639A7B56ED4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A1D6DFF-D8CC-4912-BFE6-8454AB95AD7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.1\\(2t\\):*:*:*:*:*:*:*", "matchCriteriaId": "B6C6D9CC-211B-4CAA-B2AB-16DE5A34E21E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DB904E-9FAF-4A23-82E9-367BDBFC57D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(1q\\):*:*:*:*:*:*:*", "matchCriteriaId": "A5736375-4050-40A5-A504-688B182C9A75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "54AB751B-77DE-4513-B961-378458F74164", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "63AB92C1-D2F7-4025-88B6-EFA1D3C07F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(3t\\):*:*:*:*:*:*:*", "matchCriteriaId": "305A6637-16EA-4A66-A044-19BE643D6CA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(3v\\):*:*:*:*:*:*:*", "matchCriteriaId": "8AB69D4C-6993-42E6-A4E4-99CE309CD55A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "69C445A7-B836-493D-8056-86D4F31847EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C3018A70-3236-4885-8EB1-708442F74981", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F69EF43C-0F06-40B8-94AE-870E182E26CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CE0E36D-08A6-48D5-A364-AC066F30F3CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*", "matchCriteriaId": "56426D35-FCFD-406E-9144-2E66C8C86EFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9134:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB00911-C0B0-4A4E-A0B9-413EC9D9C25A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:*", "matchCriteriaId": "F762E87A-BF80-4D33-ADDA-84369E068005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148:-:*:*:*:*:*:*:*", "matchCriteriaId": "22E6B85A-3988-4EC5-B788-9664772CE64E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D25FA4A8-408B-4E94-B7D9-7DC54B61322F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*", "matchCriteriaId": "831B6D0F-A975-4CBA-B5BB-0AC4AD718FE8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "B25B92ED-37C0-4653-9C5E-B4C13C46464C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A72BDC4-6640-45CC-A128-0CDEE38D3ADC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*", "matchCriteriaId": "90094569-AA2C-4D35-807F-9551FACE255F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*", "matchCriteriaId": "306AFBC9-A236-4D03-A1EB-CE7E838D8415", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*", "matchCriteriaId": "12DB1A25-A7C9-412F-88BC-E89588896395", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CD5738-029B-43AA-9342-63719DC16138", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF9DC03-5370-46FD-9CA8-AC4DF5E922FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E81D2CC1-376A-4D87-88EA-6E1831741EC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*", "matchCriteriaId": "3925D2CF-9D7C-4498-8AF2-45E15D5D009F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*", "matchCriteriaId": "C677D356-86C9-4491-A6CA-5E6306B2BB70", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A3C579-7AAD-41A4-947F-CCB9B09402A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*", "matchCriteriaId": "5182CB50-4D32-4835-B1A8-817D989F919F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*", "matchCriteriaId": "36B3B617-7554-4C36-9B41-19AA3BD2F6E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*", "matchCriteriaId": "B88879A9-A7F5-41E0-8A38-0E09E3FD27F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "09AC2BAD-F536-48D0-A2F0-D4E290519EB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8FF2EC4-0C09-4C00-9956-A2A4A894F63D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14D4B4E-120E-4607-A4F1-447C7BF3052E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "15702ACB-29F3-412D-8805-E107E0729E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B34855-D8D2-4114-80D2-A4D159C62458", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C97C29EE-9426-4BBE-8D84-AB5FF748703D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E142C18F-9FB5-4D96-866A-141D7D16CAF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFC116A-627F-4E05-B631-651D161217C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "32A532C0-B0E3-484A-B356-88970E7D0248", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C84D24C-2256-42AF-898A-221EBE9FE1E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*", "matchCriteriaId": "D008CA1C-6F5A-40EA-BB12-A9D84D5AF700", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*", "matchCriteriaId": "43913A0E-50D5-47DD-94D8-DD3391633619", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA52D5C1-13D8-4D23-B022-954CCEF491F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E1073F-D374-4311-8F12-AD8C72FAA293", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3500_platform:-:*:*:*:*:*:*:*", "matchCriteriaId": "B72E8456-A9BD-447B-8F33-4BEB052A82D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E505C0B1-2119-4C6A-BF96-C282C633D169", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "915EF8F6-6039-4DD0-B875-30D911752B74", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "97217080-455C-48E4-8CE1-6D5B9485864F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "57572E4A-78D5-4D1A-938B-F05F01759612", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*", "matchCriteriaId": "367C2A49-4C4D-471B-9B34-AFAFA5AE9503", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A58223F-3B15-420B-A6D4-841451CF0380", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51EAD169-9036-496E-B740-45D79546F6D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E01F0DE-EA8A-451F-BADF-1A7A48B0C633", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F557E38-09F6-42C6-BABA-3C3168B38BBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F182AD1-6E51-456A-A8F7-8F3B92DBE4D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEACA55F-4335-4478-B608-EB92EE1D6C6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "993AFE99-DFC3-4D92-90C8-D3A6495547BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7453E0FA-B05D-4888-AFB0-8FE8B8040DFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*", "matchCriteriaId": "108DB6B5-CB29-477F-84FC-52116F295878", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:*", "matchCriteriaId": "36145717-6348-466D-87B4-B1A19F17BA55", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:*", "matchCriteriaId": "4831C5F4-AF09-4951-B7AC-9DAF1C7045B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBDCF9-562C-44BA-B709-F91346F6F99F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:*", "matchCriteriaId": "276BD181-125C-48EC-984C-29BAE20C21F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5ABB175-81BE-4C46-BD2D-70016508BE22", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F93299-A715-4E97-87FE-B1E248EA98BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D71B228-FFE5-45F7-ADCF-6D359ADA6D31", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3AD807-5A0F-4DF5-9A7A-748205F409E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBB9435-1CD4-469E-BF16-AD98ADC99AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ABB93D-2C3A-4029-B545-B638B6C7788E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596B885-5312-489B-BBDB-A5374E525DE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7706:-:*:*:*:*:*:*:*", "matchCriteriaId": "42EC10DA-FE01-4BA3-B49F-B164F697D4BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7710:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1655CC-9BD5-4BD5-B113-776E4335D556", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7718:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA6F9ED-50A1-4D61-BC83-438585646856", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "532CE4B0-A3C9-4613-AAAF-727817D06FB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "24CA1A59-2681-4507-AC74-53BD481099B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4283E433-7F8C-4410-B565-471415445811", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF9147C9-5D8B-40F5-9AAA-66A3495A0AD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFB9FDE8-8533-4F65-BF32-4066D042B2F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80AB6FB-32FD-43D7-A9F1-80FA47696210", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AA5389A-8AD1-476E-983A-54DF573C30F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1B1A8F1-45B1-4E64-A254-7191FA93CB6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DA8BFA-D7A2-476C-A6F5-CAE610033BC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB2FFD26-8255-4351-8594-29D2AEFC06EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "61E10975-B47E-4F4D-8096-AEC7B7733612", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "92E2CB2B-DA11-4CF7-9D57-3D4D48990DC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E40F42-632A-47DF-BE33-DC25B826310B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C67B7A6-9BB2-41FC-8FA3-8D0DF67CBC68", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C70911ED-371A-4EB6-8DDD-DCE3A21FDBAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C64136-89C2-443C-AF7B-BED81D3DE25A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBEF7F26-BB47-44BD-872E-130820557C23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "182000E0-8204-4D8B-B7DE-B191AFE12E28", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*", "matchCriteriaId": "F309E7B9-B828-4CD2-9D2B-8966EE5B9CC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDC208BC-7E19-48C6-A20E-A79A51B7362C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "102F91CD-DFB6-43D4-AE5B-DA157A696230", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "084D0191-563B-4FF0-B589-F35DA118E1C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DB6FC5-762A-4F16-AE8C-69330EFCF640", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "5394DE31-3863-4CA9-B7B1-E5227183100D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "968390BC-B430-4903-B614-13104BFAE635", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6678B8A-D905-447E-BE7E-6BFB4CC5DAFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CE49B45-F2E9-491D-9C29-1B46E9CE14E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFAD21E-59EE-4CCE-8F1E-621D2EA50905", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C3CE6D-BD54-48B1-A188-8E53DA001424", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*", "matchCriteriaId": "498991F7-39D6-428C-8C7D-DD8DC72A0346", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7B90D36-5124-4669-8462-4EAF35B0F53D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F1127D2-12C0-454F-91EF-5EE334070D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6EB963-E0F2-4A02-8765-AB2064BE19E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEAAF99B-5406-4722-81FB-A91CBAC2DF41", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93400ld-h1:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D2DFCA0-36D8-48BC-B20D-84509EB5FF66", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DC1E93-561E-490C-AE0E-B02BAB9A7C8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "12DA2DE5-8ADA-4D6A-BC1A-9C06FA163B1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fx3ph:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D68E7FE-BD46-4245-8DEE-1AD32159E045", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CF467E2-4567-426E-8F48-39669E0F514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c-h1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F2EC055-B309-4F1F-A646-FA47AE344D27", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D6DB7F-C025-4971-9615-73393ED61078", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "737C724A-B6CD-4FF7-96E0-EBBF645D660E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "7067AEC7-DFC8-4437-9338-C5165D9A8F36", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "71D4CF15-B293-4403-A1A9-96AD3933BAEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBCC1515-2DBE-4DF2-8E83-29A869170F36", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "7282AAFF-ED18-4992-AC12-D953C35EC328", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "360409CC-4172-4878-A76B-EA1C1F8C7A79", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D5D5E2-B40B-475D-9EF3-8441016E37E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA8E1F0-74A6-4725-B6AA-A1112EFC5D0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "63BE0266-1C00-4D6A-AD96-7F82532ABAA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "73F59A4B-AE92-4533-8EDC-D1DD850309FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "492A2C86-DD38-466B-9965-77629A73814F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB7AA46-4018-4925-963E-719E1037F759", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*", "matchCriteriaId": "31B9D1E4-10B9-4B6F-B848-D93ABF6486D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB270C45-756E-400A-979F-D07D750C881A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8A085C-2DBA-4269-AB01-B16019FBB4DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79DD582-AF68-44F1-B640-766B46EF2BE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*", "matchCriteriaId": "B04484DA-AA59-4833-916E-6A8C96D34F0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07B5399-44C7-468D-9D57-BB5B5E26CE50", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "B76FB64F-16F0-4B0B-B304-B46258D434BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E128053-834B-4DD5-A517-D14B4FC2B56F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "163743A1-09E7-4EC5-8ECA-79E4B9CE173B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE340E4C-DC48-4FC8-921B-EE304DB5AE0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "C367BBE0-D71F-4CB5-B50E-72B033E73FE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E1D224-4751-4233-A127-A041068C804A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD31B075-01B1-429E-83F4-B999356A0EB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*", "matchCriteriaId": "A10C9C0A-C96A-4B45-90D0-6ED457EB5F4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*", "matchCriteriaId": "3284D16F-3275-4F8D-8AE4-D413DE19C4FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device and having an authenticated user retrieve LLDP statistics from the affected device through CLI show commands or Simple Network Management Protocol (SNMP) requests. A successful exploit could allow the attacker to cause the LLDP service to crash and stop running on the affected device. In certain situations, the LLDP crash may result in a reload of the affected device.\r\n\r Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol)." }, { "lang": "es", "value": "Una vulnerabilidad en la funci\u00f3n Link Layer Discovery Protocol (LLDP) del software Cisco FXOS y el software Cisco NX-OS podr\u00eda permitir que un atacante adyacente no autenticado cause una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe al manejo inadecuado de campos espec\u00edficos en un framework LLDP. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete LLDP manipulado a una interfaz de un dispositivo afectado y haciendo que un usuario autenticado recupere estad\u00edsticas LLDP del dispositivo afectado a trav\u00e9s de comandos show CLI o solicitudes del Protocolo simple de administraci\u00f3n de red (SNMP). Un exploit exitoso podr\u00eda permitir al atacante provocar que el servicio LLDP falle y deje de ejecutarse en el dispositivo afectado. En determinadas situaciones, el fallo de LLDP puede provocar una recarga del dispositivo afectado. Nota: LLDP es un protocolo de enlace de Capa 2. Para aprovechar esta vulnerabilidad, un atacante necesitar\u00eda estar conectado directamente a una interfaz de un dispositivo afectado, ya sea f\u00edsica o l\u00f3gicamente (por ejemplo, a trav\u00e9s de un t\u00fanel de capa 2 configurado para transportar el protocolo LLDP)." } ], "id": "CVE-2024-20294", "lastModified": "2025-05-21T17:48:35.950", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-29T01:43:59.207", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-805" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-08-30 09:15
Modified
2024-11-21 04:37
Severity ?
Summary
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nx-os | 7.3 | |
cisco | nx-os | 8.1 | |
cisco | nx-os | 8.2 | |
cisco | nx-os | 8.3 | |
cisco | mds_9000 | - | |
cisco | mds_9100 | - | |
cisco | mds_9140 | - | |
cisco | mds_9200 | - | |
cisco | mds_9500 | - | |
cisco | mds_9700 | - | |
cisco | nx-os | 6.1\(2\)i2 | |
cisco | nx-os | 6.1\(2\)i3 | |
cisco | nx-os | 7.0\(3\)i4 | |
cisco | nx-os | 7.0\(3\)i7 | |
cisco | nx-os | 9.2 | |
cisco | nexus_3016 | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3064-t | - | |
cisco | nexus_31108pc-v | - | |
cisco | nexus_31108tc-v | - | |
cisco | nexus_31128pq | - | |
cisco | nexus_3132c-z | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3132q-v | - | |
cisco | nexus_3132q-xl | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172 | - | |
cisco | nexus_3172pq-xl | - | |
cisco | nexus_3172tq | - | |
cisco | nexus_3172tq-32t | - | |
cisco | nexus_3172tq-xl | - | |
cisco | nexus_3232c | - | |
cisco | nexus_3264c-e | - | |
cisco | nexus_3264q | - | |
cisco | nexus_3408-s | - | |
cisco | nexus_34180yc | - | |
cisco | nexus_3432d-s | - | |
cisco | nexus_3464c | - | |
cisco | nexus_9000v | - | |
cisco | nexus_92160yc-x | - | |
cisco | nexus_92300yc | - | |
cisco | nexus_92304qc | - | |
cisco | nexus_92348gc-x | - | |
cisco | nexus_9236c | - | |
cisco | nexus_9272q | - | |
cisco | nexus_93108tc-ex | - | |
cisco | nexus_93108tc-fx | - | |
cisco | nexus_93120tx | - | |
cisco | nexus_93128tx | - | |
cisco | nexus_93180lc-ex | - | |
cisco | nexus_93180yc-ex | - | |
cisco | nexus_93180yc-fx | - | |
cisco | nexus_93216tc-fx2 | - | |
cisco | nexus_93240yc-fx2 | - | |
cisco | nexus_9332c | - | |
cisco | nexus_9332pq | - | |
cisco | nexus_93360yc-fx2 | - | |
cisco | nexus_9336c-fx2 | - | |
cisco | nexus_9336pq_aci_spine | - | |
cisco | nexus_9348gc-fxp | - | |
cisco | nexus_9364c | - | |
cisco | nexus_9372px | - | |
cisco | nexus_9372px-e | - | |
cisco | nexus_9372tx | - | |
cisco | nexus_9372tx-e | - | |
cisco | nexus_9396px | - | |
cisco | nexus_9396tx | - | |
cisco | nx-os | 6.0\(2\)a8 | |
cisco | nx-os | 7.0\(3\)i7 | |
cisco | nx-os | 9.2 | |
cisco | nexus_3524 | - | |
cisco | nexus_3524-x | - | |
cisco | nexus_3524-xl | - | |
cisco | nexus_3548 | - | |
cisco | nexus_3548-x | - | |
cisco | nexus_3548-xl | - | |
cisco | nx-os | 7.0\(3\)f | |
cisco | nx-os | 9.2 | |
cisco | nexus_36180yc-r | - | |
cisco | nexus_3636c-r | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9516 | - | |
cisco | nx-os | 7.1 | |
cisco | nx-os | 7.2 | |
cisco | nx-os | 7.3 | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5696q | - | |
cisco | nexus_6001 | - | |
cisco | nexus_6004 | - | |
cisco | nx-os | 7.2 | |
cisco | nx-os | 7.3 | |
cisco | nx-os | 8.0 | |
cisco | nx-os | 8.1 | |
cisco | nx-os | 8.2 | |
cisco | nx-os | 8.3 | |
cisco | nexus_7000 | - | |
cisco | nexus_7000_10-slot | - | |
cisco | nexus_7000_18-slot | - | |
cisco | nexus_7000_4-slot | - | |
cisco | nexus_7000_9-slot | - | |
cisco | nexus_7700 | - | |
cisco | nexus_7700_10-slot | - | |
cisco | nexus_7700_18-slot | - | |
cisco | nexus_7700_2-slot | - | |
cisco | nexus_7700_6-slot | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "9501608B-3811-4C33-BDA1-721045284C7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F363BEDD-A8AC-4FB6-87DC-708F97F8375E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "E40D9097-C95A-4813-9DEE-89CA75820524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "399568C2-4198-4D2C-B694-FF4EFE5E4710", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FD00AB9-F2DD-4D07-8DFF-E7B34824D66A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:*", "matchCriteriaId": "F762E87A-BF80-4D33-ADDA-84369E068005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "B25B92ED-37C0-4653-9C5E-B4C13C46464C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i2:*:*:*:*:*:*:*", "matchCriteriaId": "C8C2A169-117C-4F64-A6F0-748E7686260A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(2\\)i3:*:*:*:*:*:*:*", "matchCriteriaId": "DC1A9850-0AF6-48B1-8D7B-309135DE7A27", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4:*:*:*:*:*:*:*", "matchCriteriaId": "E42217F8-C85B-45D4-BA3B-F4303947E355", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBF467-C2E2-4ED9-8E8A-02E062E734D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9E648A2-AFB2-4F84-B27A-F8AC7F67B36F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4283E433-7F8C-4410-B565-471415445811", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80AB6FB-32FD-43D7-A9F1-80FA47696210", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8:*:*:*:*:*:*:*", "matchCriteriaId": "9DCBF1FE-C124-4DBA-B127-D484D5C9110C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7:*:*:*:*:*:*:*", "matchCriteriaId": "5DEBF467-C2E2-4ED9-8E8A-02E062E734D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9E648A2-AFB2-4F84-B27A-F8AC7F67B36F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f:*:*:*:*:*:*:*", "matchCriteriaId": "E575893D-81E5-47E6-9531-50E044C2C3D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C9E648A2-AFB2-4F84-B27A-F8AC7F67B36F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "57572E4A-78D5-4D1A-938B-F05F01759612", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF918D59-4D57-4C18-9FF5-AE6636F24484", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "5EE85C54-276F-462E-808A-23D3E54D31BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "9501608B-3811-4C33-BDA1-721045284C7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F557E38-09F6-42C6-BABA-3C3168B38BBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "5EE85C54-276F-462E-808A-23D3E54D31BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "9501608B-3811-4C33-BDA1-721045284C7D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B36B056-C068-4413-B648-1D1D6026B823", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F363BEDD-A8AC-4FB6-87DC-708F97F8375E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2:*:*:*:*:*:*:*", "matchCriteriaId": "E40D9097-C95A-4813-9DEE-89CA75820524", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "399568C2-4198-4D2C-B694-FF4EFE5E4710", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEACA55F-4335-4478-B608-EB92EE1D6C6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5ABB175-81BE-4C46-BD2D-70016508BE22", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F93299-A715-4E97-87FE-B1E248EA98BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D71B228-FFE5-45F7-ADCF-6D359ADA6D31", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3AD807-5A0F-4DF5-9A7A-748205F409E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default." }, { "lang": "es", "value": "Una vulnerabilidad en la funcionalidad NX-API de Cisco NX-OS Software, podr\u00eda permitir a un atacante remoto no autenticado causar que un proceso del sistema NX-API se reinicie inesperadamente. La vulnerabilidad es debido a una comprobaci\u00f3n incorrecta del encabezado HTTP de una petici\u00f3n que se env\u00eda a NX-API. Un atacante podr\u00eda explotar esta vulnerabilidad enviando una petici\u00f3n HTTP especialmente dise\u00f1ada a NX-API en un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el servicio NX-API; sin embargo, el dispositivo NX-OS en s\u00ed todav\u00eda estar\u00eda disponible y pasando el tr\u00e1fico de red. Nota: La funcionalidad NX-API est\u00e1 deshabilitada por defecto." } ], "id": "CVE-2019-1968", "lastModified": "2024-11-21T04:37:47.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "psirt@cisco.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-08-30T09:15:20.380", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-api-dos" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-api-dos" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-23 20:15
Modified
2024-11-21 07:40
Severity ?
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cli-cmdinject-euQVK9u | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cli-cmdinject-euQVK9u | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nx-os | - | |
cisco | mds_9000 | - | |
cisco | mds_9100 | - | |
cisco | mds_9132t | - | |
cisco | mds_9134 | - | |
cisco | mds_9140 | - | |
cisco | mds_9148 | - | |
cisco | mds_9148s | - | |
cisco | mds_9148t | - | |
cisco | mds_9200 | - | |
cisco | mds_9216 | - | |
cisco | mds_9216a | - | |
cisco | mds_9216i | - | |
cisco | mds_9222i | - | |
cisco | mds_9250i | - | |
cisco | mds_9396s | - | |
cisco | mds_9396t | - | |
cisco | mds_9500 | - | |
cisco | mds_9506 | - | |
cisco | mds_9509 | - | |
cisco | mds_9513 | - | |
cisco | mds_9700 | - | |
cisco | mds_9706 | - | |
cisco | mds_9710 | - | |
cisco | mds_9718 | - | |
cisco | nexus_1000_virtual_edge | - | |
cisco | nexus_1000v | - | |
cisco | nexus_1000v | - | |
cisco | nexus_5500 | - | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_5600 | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5672up-16g | - | |
cisco | nexus_5696q | - | |
cisco | nexus_6000 | - | |
cisco | nexus_6001 | - | |
cisco | nexus_6001p | - | |
cisco | nexus_6001t | - | |
cisco | nexus_6004 | - | |
cisco | nexus_6004x | - | |
cisco | nx-os | * | |
cisco | nexus_7000 | - | |
cisco | nexus_7004 | - | |
cisco | nexus_7009 | - | |
cisco | nexus_7010 | - | |
cisco | nexus_7018 | - | |
cisco | nexus_7700 | - | |
cisco | nexus_7702 | - | |
cisco | nexus_7706 | - | |
cisco | nexus_7710 | - | |
cisco | nexus_7718 | - | |
cisco | nx-os | * | |
cisco | nexus_3016 | - | |
cisco | nexus_3016q | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3064-32t | - | |
cisco | nexus_3064-t | - | |
cisco | nexus_3064-x | - | |
cisco | nexus_3064t | - | |
cisco | nexus_3064x | - | |
cisco | nexus_3100 | - | |
cisco | nexus_3100-v | - | |
cisco | nexus_3100-z | - | |
cisco | nexus_3100v | - | |
cisco | nexus_31108pc-v | - | |
cisco | nexus_31108pv-v | - | |
cisco | nexus_31108tc-v | - | |
cisco | nexus_31128pq | - | |
cisco | nexus_3132c-z | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3132q-v | - | |
cisco | nexus_3132q-x | - | |
cisco | nexus_3132q-x\/3132q-xl | - | |
cisco | nexus_3132q-xl | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172 | - | |
cisco | nexus_3172pq | - | |
cisco | nexus_3172pq-xl | - | |
cisco | nexus_3172pq\/pq-xl | - | |
cisco | nexus_3172tq | - | |
cisco | nexus_3172tq-32t | - | |
cisco | nexus_3172tq-xl | - | |
cisco | nexus_3200 | - | |
cisco | nexus_3232c | - | |
cisco | nexus_3232c_ | - | |
cisco | nexus_3264c-e | - | |
cisco | nexus_3264q | - | |
cisco | nexus_3400 | - | |
cisco | nexus_3408-s | - | |
cisco | nexus_34180yc | - | |
cisco | nexus_34200yc-sm | - | |
cisco | nexus_3432d-s | - | |
cisco | nexus_3464c | - | |
cisco | nexus_3500 | - | |
cisco | nexus_3524 | - | |
cisco | nexus_3524-x | - | |
cisco | nexus_3524-x\/xl | - | |
cisco | nexus_3524-xl | - | |
cisco | nexus_3548 | - | |
cisco | nexus_3548-x | - | |
cisco | nexus_3548-x\/xl | - | |
cisco | nexus_3548-xl | - | |
cisco | nexus_3600 | - | |
cisco | nexus_36180yc-r | - | |
cisco | nexus_3636c-r | - | |
cisco | nexus_9000 | - | |
cisco | nexus_9000v | - | |
cisco | nx-os | * | |
cisco | nexus_3016 | - | |
cisco | nexus_3016q | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3064-32t | - | |
cisco | nexus_3064-t | - | |
cisco | nexus_3064-x | - | |
cisco | nexus_3064t | - | |
cisco | nexus_3064x | - | |
cisco | nexus_3100 | - | |
cisco | nexus_3100-v | - | |
cisco | nexus_3100-z | - | |
cisco | nexus_3100v | - | |
cisco | nexus_31108pc-v | - | |
cisco | nexus_31108pv-v | - | |
cisco | nexus_31108tc-v | - | |
cisco | nexus_31128pq | - | |
cisco | nexus_3132c-z | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3132q-v | - | |
cisco | nexus_3132q-x | - | |
cisco | nexus_3132q-x\/3132q-xl | - | |
cisco | nexus_3132q-xl | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172 | - | |
cisco | nexus_3172pq | - | |
cisco | nexus_3172pq-xl | - | |
cisco | nexus_3172pq\/pq-xl | - | |
cisco | nexus_3172tq | - | |
cisco | nexus_3172tq-32t | - | |
cisco | nexus_3172tq-xl | - | |
cisco | nexus_3200 | - | |
cisco | nexus_3232c | - | |
cisco | nexus_3232c_ | - | |
cisco | nexus_3264c-e | - | |
cisco | nexus_3264q | - | |
cisco | nexus_3400 | - | |
cisco | nexus_3408-s | - | |
cisco | nexus_34180yc | - | |
cisco | nexus_34200yc-sm | - | |
cisco | nexus_3432d-s | - | |
cisco | nexus_3464c | - | |
cisco | nexus_3500 | - | |
cisco | nexus_3524 | - | |
cisco | nexus_3524-x | - | |
cisco | nexus_3524-x\/xl | - | |
cisco | nexus_3524-xl | - | |
cisco | nexus_3548 | - | |
cisco | nexus_3548-x | - | |
cisco | nexus_3548-x\/xl | - | |
cisco | nexus_3548-xl | - | |
cisco | nexus_3600 | - | |
cisco | nexus_36180yc-r | - | |
cisco | nexus_3636c-r | - | |
cisco | nexus_9000 | - | |
cisco | nexus_9000v | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FD00AB9-F2DD-4D07-8DFF-E7B34824D66A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*", "matchCriteriaId": "56426D35-FCFD-406E-9144-2E66C8C86EFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9134:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB00911-C0B0-4A4E-A0B9-413EC9D9C25A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:*", "matchCriteriaId": "F762E87A-BF80-4D33-ADDA-84369E068005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148:-:*:*:*:*:*:*:*", "matchCriteriaId": "22E6B85A-3988-4EC5-B788-9664772CE64E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D25FA4A8-408B-4E94-B7D9-7DC54B61322F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*", "matchCriteriaId": "831B6D0F-A975-4CBA-B5BB-0AC4AD718FE8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "B25B92ED-37C0-4653-9C5E-B4C13C46464C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A72BDC4-6640-45CC-A128-0CDEE38D3ADC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*", "matchCriteriaId": "90094569-AA2C-4D35-807F-9551FACE255F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*", "matchCriteriaId": "306AFBC9-A236-4D03-A1EB-CE7E838D8415", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*", "matchCriteriaId": "12DB1A25-A7C9-412F-88BC-E89588896395", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CD5738-029B-43AA-9342-63719DC16138", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF9DC03-5370-46FD-9CA8-AC4DF5E922FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E81D2CC1-376A-4D87-88EA-6E1831741EC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*", "matchCriteriaId": "3925D2CF-9D7C-4498-8AF2-45E15D5D009F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*", "matchCriteriaId": "C677D356-86C9-4491-A6CA-5E6306B2BB70", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A3C579-7AAD-41A4-947F-CCB9B09402A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*", "matchCriteriaId": "5182CB50-4D32-4835-B1A8-817D989F919F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*", "matchCriteriaId": "36B3B617-7554-4C36-9B41-19AA3BD2F6E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*", "matchCriteriaId": "B88879A9-A7F5-41E0-8A38-0E09E3FD27F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_1000_virtual_edge:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "5481E367-6692-48A3-8475-5299C5EE0822", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:hyper-v:*:*", "matchCriteriaId": "69E1B4D2-4200-4C05-9E64-57A18823AF38", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:microsoft_hyper-v:*:*", "matchCriteriaId": "B7063CEF-58CC-449E-BFDA-39371BA088AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC8699E-81C0-4374-B827-71B3916B910D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "870F4379-68F6-4B34-B99B-107DFE0DBD63", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*", "matchCriteriaId": "367C2A49-4C4D-471B-9B34-AFAFA5AE9503", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A58223F-3B15-420B-A6D4-841451CF0380", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51EAD169-9036-496E-B740-45D79546F6D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E01F0DE-EA8A-451F-BADF-1A7A48B0C633", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F557E38-09F6-42C6-BABA-3C3168B38BBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F182AD1-6E51-456A-A8F7-8F3B92DBE4D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "5793DAEA-2828-4312-BE9E-187F76E89DDA", "versionEndExcluding": "8.2\\(9\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:*", "matchCriteriaId": "36145717-6348-466D-87B4-B1A19F17BA55", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:*", "matchCriteriaId": "4831C5F4-AF09-4951-B7AC-9DAF1C7045B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBDCF9-562C-44BA-B709-F91346F6F99F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:*", "matchCriteriaId": "276BD181-125C-48EC-984C-29BAE20C21F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596B885-5312-489B-BBDB-A5374E525DE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7706:-:*:*:*:*:*:*:*", "matchCriteriaId": "42EC10DA-FE01-4BA3-B49F-B164F697D4BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7710:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1655CC-9BD5-4BD5-B113-776E4335D556", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7718:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA6F9ED-50A1-4D61-BC83-438585646856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "D66D0919-8EF6-4D1D-8648-C0A72634F10D", "versionEndExcluding": "9.3\\(10\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "09AC2BAD-F536-48D0-A2F0-D4E290519EB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8FF2EC4-0C09-4C00-9956-A2A4A894F63D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14D4B4E-120E-4607-A4F1-447C7BF3052E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "15702ACB-29F3-412D-8805-E107E0729E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B34855-D8D2-4114-80D2-A4D159C62458", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C97C29EE-9426-4BBE-8D84-AB5FF748703D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E142C18F-9FB5-4D96-866A-141D7D16CAF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFC116A-627F-4E05-B631-651D161217C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "32A532C0-B0E3-484A-B356-88970E7D0248", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*", "matchCriteriaId": "D008CA1C-6F5A-40EA-BB12-A9D84D5AF700", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*", "matchCriteriaId": "43913A0E-50D5-47DD-94D8-DD3391633619", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA52D5C1-13D8-4D23-B022-954CCEF491F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E1073F-D374-4311-8F12-AD8C72FAA293", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E505C0B1-2119-4C6A-BF96-C282C633D169", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "915EF8F6-6039-4DD0-B875-30D911752B74", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "97217080-455C-48E4-8CE1-6D5B9485864F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "57572E4A-78D5-4D1A-938B-F05F01759612", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EBEBA5B-5589-417B-BF3B-976083E9FE54", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A1B63BF-C405-4C35-8573-5A1C31CAC4A9", "versionEndExcluding": "10.2\\(4\\)", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "09AC2BAD-F536-48D0-A2F0-D4E290519EB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8FF2EC4-0C09-4C00-9956-A2A4A894F63D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14D4B4E-120E-4607-A4F1-447C7BF3052E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "15702ACB-29F3-412D-8805-E107E0729E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B34855-D8D2-4114-80D2-A4D159C62458", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C97C29EE-9426-4BBE-8D84-AB5FF748703D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E142C18F-9FB5-4D96-866A-141D7D16CAF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFC116A-627F-4E05-B631-651D161217C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "32A532C0-B0E3-484A-B356-88970E7D0248", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*", "matchCriteriaId": "D008CA1C-6F5A-40EA-BB12-A9D84D5AF700", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*", "matchCriteriaId": "43913A0E-50D5-47DD-94D8-DD3391633619", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA52D5C1-13D8-4D23-B022-954CCEF491F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E1073F-D374-4311-8F12-AD8C72FAA293", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E505C0B1-2119-4C6A-BF96-C282C633D169", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "915EF8F6-6039-4DD0-B875-30D911752B74", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "97217080-455C-48E4-8CE1-6D5B9485864F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "57572E4A-78D5-4D1A-938B-F05F01759612", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EBEBA5B-5589-417B-BF3B-976083E9FE54", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user." } ], "id": "CVE-2023-20050", "lastModified": "2024-11-21T07:40:26.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-23T20:15:13.483", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cli-cmdinject-euQVK9u" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cli-cmdinject-euQVK9u" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-06-10 18:32
Modified
2025-04-09 00:30
Severity ?
Summary
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
References
▶ | URL | Tags | |
---|---|---|---|
cret@cert.org | http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html | ||
cret@cert.org | http://lists.ingate.com/pipermail/productinfo/2008/000021.html | ||
cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html | ||
cret@cert.org | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
cret@cert.org | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
cret@cert.org | http://rhn.redhat.com/errata/RHSA-2008-0528.html | ||
cret@cert.org | http://secunia.com/advisories/30574 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30596 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30612 | ||
cret@cert.org | http://secunia.com/advisories/30615 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30626 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30647 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30648 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30665 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/30802 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/31334 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/31351 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/31467 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/31568 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/32664 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/33003 | Vendor Advisory | |
cret@cert.org | http://secunia.com/advisories/35463 | ||
cret@cert.org | http://security.gentoo.org/glsa/glsa-200808-02.xml | ||
cret@cert.org | http://securityreason.com/securityalert/3933 | ||
cret@cert.org | http://sourceforge.net/forum/forum.php?forum_id=833770 | ||
cret@cert.org | http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380 | ||
cret@cert.org | http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1 | ||
cret@cert.org | http://support.apple.com/kb/HT2163 | ||
cret@cert.org | http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm | ||
cret@cert.org | http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml | Vendor Advisory | |
cret@cert.org | http://www.debian.org/security/2008/dsa-1663 | Patch | |
cret@cert.org | http://www.kb.cert.org/vuls/id/878044 | US Government Resource | |
cret@cert.org | http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q | US Government Resource | |
cret@cert.org | http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z | US Government Resource | |
cret@cert.org | http://www.kb.cert.org/vuls/id/MIMG-7ETS87 | US Government Resource | |
cret@cert.org | http://www.mandriva.com/security/advisories?name=MDVSA-2008:118 | ||
cret@cert.org | http://www.ocert.org/advisories/ocert-2008-006.html | ||
cret@cert.org | http://www.openwall.com/lists/oss-security/2008/06/09/1 | ||
cret@cert.org | http://www.redhat.com/support/errata/RHSA-2008-0529.html | ||
cret@cert.org | http://www.securityfocus.com/archive/1/493218/100/0/threaded | ||
cret@cert.org | http://www.securityfocus.com/archive/1/497962/100/0/threaded | ||
cret@cert.org | http://www.securityfocus.com/bid/29623 | Exploit, Patch | |
cret@cert.org | http://www.securitytracker.com/id?1020218 | ||
cret@cert.org | http://www.ubuntu.com/usn/usn-685-1 | ||
cret@cert.org | http://www.us-cert.gov/cas/techalerts/TA08-162A.html | US Government Resource | |
cret@cert.org | http://www.vmware.com/security/advisories/VMSA-2008-0013.html | ||
cret@cert.org | http://www.vmware.com/security/advisories/VMSA-2008-0017.html | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1787/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1788/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1797/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1800/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1801/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1836/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/1981/references | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/2361 | ||
cret@cert.org | http://www.vupen.com/english/advisories/2008/2971 | ||
cret@cert.org | http://www.vupen.com/english/advisories/2009/1612 | ||
cret@cert.org | https://bugzilla.redhat.com/show_bug.cgi?id=447974 | ||
cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820 | ||
cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785 | ||
cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414 | ||
cret@cert.org | https://www.exploit-db.com/exploits/5790 | ||
cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html | ||
cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html | ||
cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.ingate.com/pipermail/productinfo/2008/000021.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=127730470825399&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2008-0528.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30574 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30596 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30612 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30615 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30626 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30647 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30648 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30665 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/30802 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31334 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31351 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31467 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31568 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32664 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33003 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35463 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200808-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3933 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/forum/forum.php?forum_id=833770 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT2163 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1663 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/878044 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MIMG-7ETS87 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2008:118 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ocert.org/advisories/ocert-2008-006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2008/06/09/1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0529.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/493218/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/497962/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/29623 | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020218 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-685-1 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA08-162A.html | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0013.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2008-0017.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1787/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1788/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1797/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1800/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1801/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1836/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/1981/references | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2361 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2971 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1612 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=447974 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/5790 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | catos | 7.1.1 | |
cisco | catos | 7.3.1 | |
cisco | catos | 7.4.1 | |
cisco | catos | 8.3 | |
cisco | cisco_ios | 12.0 | |
cisco | cisco_ios | 12.0 | |
cisco | cisco_ios | 12.1 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.2 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.3 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | cisco_ios | 12.4 | |
cisco | ios | 10.0 | |
cisco | ios | 11.0 | |
cisco | ios | 11.1 | |
cisco | ios | 11.3 | |
cisco | ios | 12.2 | |
cisco | ios_xr | 2.0 | |
cisco | ios_xr | 3.0 | |
cisco | ios_xr | 3.2 | |
cisco | ios_xr | 3.3 | |
cisco | ios_xr | 3.4 | |
cisco | ios_xr | 3.5 | |
cisco | ios_xr | 3.6 | |
cisco | ios_xr | 3.7 | |
cisco | nx_os | 4.0 | |
cisco | nx_os | 4.0.1 | |
cisco | nx_os | 4.0.2 | |
ecos_sourceware | ecos | 1.1 | |
ecos_sourceware | ecos | 1.2.1 | |
ecos_sourceware | ecos | 1.3.1 | |
ecos_sourceware | ecos | 2.0 | |
ecos_sourceware | ecos | 2.0 | |
net-snmp | net_snmp | 5.0 | |
net-snmp | net_snmp | 5.0.1 | |
net-snmp | net_snmp | 5.0.2 | |
net-snmp | net_snmp | 5.0.3 | |
net-snmp | net_snmp | 5.0.4 | |
net-snmp | net_snmp | 5.0.5 | |
net-snmp | net_snmp | 5.0.6 | |
net-snmp | net_snmp | 5.0.7 | |
net-snmp | net_snmp | 5.0.8 | |
net-snmp | net_snmp | 5.0.9 | |
net-snmp | net_snmp | 5.1 | |
net-snmp | net_snmp | 5.1.1 | |
net-snmp | net_snmp | 5.1.2 | |
net-snmp | net_snmp | 5.2 | |
net-snmp | net_snmp | 5.3 | |
net-snmp | net_snmp | 5.3.0.1 | |
net-snmp | net_snmp | 5.4 | |
sun | solaris | 10.0 | |
sun | sunos | 5.10 | |
cisco | ace_10_6504_bundle_with_4_gbps_throughput | * | |
cisco | ace_10_6509_bundle_with_8_gbps_throughput | * | |
cisco | ace_10_service_module | * | |
cisco | ace_20_6504_bundle_with__4gbps_throughput | * | |
cisco | ace_20_6509_bundle_with_8gbps_throughput | * | |
cisco | ace_20_service_module | * | |
cisco | ace_4710 | * | |
cisco | ace_xml_gateway | 5.2 | |
cisco | ace_xml_gateway | 6.0 | |
cisco | mds_9120 | * | |
cisco | mds_9124 | * | |
cisco | mds_9134 | * | |
cisco | mds_9140 | * | |
ingate | ingate_firewall | 2.2.0 | |
ingate | ingate_firewall | 2.2.1 | |
ingate | ingate_firewall | 2.2.2 | |
ingate | ingate_firewall | 2.3.0 | |
ingate | ingate_firewall | 2.4.0 | |
ingate | ingate_firewall | 2.4.1 | |
ingate | ingate_firewall | 2.5.0 | |
ingate | ingate_firewall | 2.6.0 | |
ingate | ingate_firewall | 2.6.1 | |
ingate | ingate_firewall | 3.0.2 | |
ingate | ingate_firewall | 3.1.0 | |
ingate | ingate_firewall | 3.1.1 | |
ingate | ingate_firewall | 3.1.3 | |
ingate | ingate_firewall | 3.1.4 | |
ingate | ingate_firewall | 3.2.0 | |
ingate | ingate_firewall | 3.2.1 | |
ingate | ingate_firewall | 3.2.2 | |
ingate | ingate_firewall | 3.3.1 | |
ingate | ingate_firewall | 4.1.0 | |
ingate | ingate_firewall | 4.1.3 | |
ingate | ingate_firewall | 4.2.1 | |
ingate | ingate_firewall | 4.2.2 | |
ingate | ingate_firewall | 4.2.3 | |
ingate | ingate_firewall | 4.3.1 | |
ingate | ingate_firewall | 4.4.1 | |
ingate | ingate_firewall | 4.4.2 | |
ingate | ingate_firewall | 4.5.1 | |
ingate | ingate_firewall | 4.5.2 | |
ingate | ingate_firewall | 4.6.0 | |
ingate | ingate_firewall | 4.6.1 | |
ingate | ingate_firewall | 4.6.2 | |
ingate | ingate_siparator | 2.2.0 | |
ingate | ingate_siparator | 2.2.1 | |
ingate | ingate_siparator | 2.2.2 | |
ingate | ingate_siparator | 2.3.0 | |
ingate | ingate_siparator | 2.4.0 | |
ingate | ingate_siparator | 2.4.1 | |
ingate | ingate_siparator | 2.5.0 | |
ingate | ingate_siparator | 2.6.0 | |
ingate | ingate_siparator | 2.6.1 | |
ingate | ingate_siparator | 3.0.2 | |
ingate | ingate_siparator | 3.1.0 | |
ingate | ingate_siparator | 3.1.1 | |
ingate | ingate_siparator | 3.1.3 | |
ingate | ingate_siparator | 3.1.4 | |
ingate | ingate_siparator | 3.2.0 | |
ingate | ingate_siparator | 3.2.1 | |
ingate | ingate_siparator | 3.2.2 | |
ingate | ingate_siparator | 3.3.1 | |
ingate | ingate_siparator | 4.1.0 | |
ingate | ingate_siparator | 4.1.3 | |
ingate | ingate_siparator | 4.2.1 | |
ingate | ingate_siparator | 4.2.2 | |
ingate | ingate_siparator | 4.2.3 | |
ingate | ingate_siparator | 4.3.1 | |
ingate | ingate_siparator | 4.3.4 | |
ingate | ingate_siparator | 4.4.1 | |
ingate | ingate_siparator | 4.4.2 | |
ingate | ingate_siparator | 4.5.1 | |
ingate | ingate_siparator | 4.5.2 | |
ingate | ingate_siparator | 4.6.0 | |
ingate | ingate_siparator | 4.6.1 | |
ingate | ingate_siparator | 4.6.2 | |
juniper | session_and_resource_control | 1.0 | |
juniper | session_and_resource_control | 2.0 | |
juniper | src_pe | 1.0 | |
juniper | src_pe | 2.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5CAC7FBF-2493-42CA-9B23-20AF09F0DDA8", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE64E4C4-BACE-404F-966D-415976781DC4", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "377F951F-C2D8-441D-A532-F62E23937F94", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:*", "matchCriteriaId": "34A3A284-36A9-4E8C-815D-6E2FE4C158DF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:*", "matchCriteriaId": "A5823F33-7FB3-465B-8017-1866D9EF3AA6", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:*", "matchCriteriaId": "94870E9E-C883-4051-8854-CDE0AE7A64B6", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:*", "matchCriteriaId": "85C2FF9C-7730-4DBF-8C86-1EF0F1E71D8C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:*", "matchCriteriaId": "4A4AFC06-85C5-4AD0-A409-27F9AF398D7D", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:*", "matchCriteriaId": "EB593071-BB5A-47AD-B9C6-59D2010F6280", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:*", "matchCriteriaId": "74382B2D-E9A6-453D-9C07-F959EAB4C075", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:*", "matchCriteriaId": "B3D93383-BD5A-4052-B724-055F6FCFC314", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:*", "matchCriteriaId": "6B1E3C39-163D-4A99-AC96-2EE388305000", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:*", "matchCriteriaId": "90710000-F963-4F36-9EE1-C3CE1CECDCA2", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:*", "matchCriteriaId": "5F4F8B9E-B2AB-4545-8ACF-8F03E636E842", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:*", "matchCriteriaId": "6E2D6402-D2AF-4817-8A46-1FA9B17B720C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxb:*:*:*:*:*:*", "matchCriteriaId": "79BB5494-735D-424B-8B41-2FAECE1A7AD4", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxd:*:*:*:*:*:*", "matchCriteriaId": "FD6178BC-9741-4FC1-87DA-A5407B3A4F40", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:sxf:*:*:*:*:*:*", "matchCriteriaId": "2A419BD7-6345-43D8-B69C-2255E2EF6FD7", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zl:*:*:*:*:*:*", "matchCriteriaId": "B472DEEE-148A-46B4-BCBC-0A9F62F38B31", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.2:zy:*:*:*:*:*:*", "matchCriteriaId": "23305EBA-11D5-417E-823E-39D0D052839D", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8A8D0F64-5DE1-4A6F-91F0-8A8509BF077F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*", "matchCriteriaId": "95418AD2-FB85-4E20-B874-D82DDF88BC91", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*", "matchCriteriaId": "14D1B81D-95E4-4945-94F2-C36FD7C0DC55", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*", "matchCriteriaId": "452FF154-F6C0-4BC4-969E-1D49AA3CCE49", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*", "matchCriteriaId": "3AB6C57C-8805-443F-8ACE-83DAA48878CA", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*", "matchCriteriaId": "554C9611-55F1-40AF-9862-7E902D5CE1D1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*", "matchCriteriaId": "F89C185A-D3B3-4F5F-9249-F8EE89E8DD04", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*", "matchCriteriaId": "EEB0B55E-3579-4929-862F-C5FF9F796AE1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*", "matchCriteriaId": "8E8E34D3-0BCB-4D19-A41C-0375941E1B21", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*", "matchCriteriaId": "09CBD68E-2A5C-43DF-9AD6-DE07815821B3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*", "matchCriteriaId": "01393D91-ED1D-460D-8621-10260F0CBDD0", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*", "matchCriteriaId": "8AB2FF53-5991-4264-B5CC-D1E45460BFCE", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*", "matchCriteriaId": "1A1FAF42-B7B1-40B0-A0F7-5DF821E6193F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*", "matchCriteriaId": "1BE94EA2-E0CC-4760-94A8-DE56C8181F74", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*", "matchCriteriaId": "929836AD-8128-4174-872D-B9638B54611C", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*", "matchCriteriaId": "5ED5B53D-930D-477E-A0F6-76167AE67641", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*", "matchCriteriaId": "84983F6A-64F6-4720-9291-FC84CA10EE25", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*", "matchCriteriaId": "E6A60117-E4D1-4741-98A2-E643A26616A7", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*", "matchCriteriaId": "156B91B9-1F5B-4E83-A2B7-A5B7F272D5B1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*", "matchCriteriaId": "C9E90E83-1732-4BEF-BC5B-401769DC8880", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*", "matchCriteriaId": "51679B26-DF28-4E41-9801-E1599F250FFD", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*", "matchCriteriaId": "E989900F-BE66-47E4-9A1B-11B9785F89BB", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*", "matchCriteriaId": "95A01B7E-8231-4001-A340-31CE66474FDA", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*", "matchCriteriaId": "3CC62D3B-A287-4DED-A44D-3351452D4A55", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:cisco_ios:12.4:xw:*:*:*:*:*:*", "matchCriteriaId": "687E91FF-957E-449F-BDD6-85AA59E1E0D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "79528F96-FD42-4A76-82EE-4B1324D53B5F", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "D626B494-6210-4F74-8D17-BA480B6665C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*", "matchCriteriaId": "82B6315D-7BEF-419F-9B93-3CF669E986D1", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4BC49F2-3DCB-45F0-9030-13F6415EE178", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9FB31FAC-D720-4BF1-BFCC-0A9B714E292A", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "904CA41E-8168-41DE-AE84-941962A7BB71", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D69F8FA-D58A-4F53-86D8-A20C73E9B299", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "AD331C50-DB93-4001-B56A-C1012F894CDF", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "75538529-611A-43B5-AC4D-089C4E2E2ACC", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F992D03D-1DB8-44C1-B59D-1C09A32A2C91", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "7A8BC298-4AF9-4281-9AD9-0D8F621E46B0", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:ios_xr:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "F2FE436B-2117-4FB4-B550-8454848D1D58", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "69D2BD63-C110-4E89-B239-4A59E20AB78E", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0.1:a:*:*:*:*:*:*", "matchCriteriaId": "43E5FFB6-861D-4F91-B3C9-C5E57DDD25C3", "vulnerable": false }, { "criteria": "cpe:2.3:o:cisco:nx_os:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1BD3BD3D-767D-483D-9FFE-D23AA2E228E6", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6762126F-55E4-4963-99F5-206A46979E7C", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1945B97A-8276-4EE2-8F76-5F0C0956DF18", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "7C8CA81F-2AB6-45F8-8AAE-BF6A7EDA73D5", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2452913-0513-46BB-A52E-8FA12D77B570", "vulnerable": false }, { "criteria": "cpe:2.3:o:ecos_sourceware:ecos:2.0:b1:*:*:*:*:*:*", "matchCriteriaId": "5D967624-23B1-48BB-91DB-1E1C18AAAD85", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "18CCF3B9-CA7D-4D37-BD2C-1B74586B98A7", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5A0AB8C2-EE95-48AA-98B7-B6ED40494A0A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "77930529-89BE-463D-8259-3D67D153284A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "743DEB17-3BE3-4278-A54B-2CE547DB9F31", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "0DCAF8C2-0E4E-4474-BD1E-F28A6EAEF8F8", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D2BCA127-F5F3-418F-890D-6B1C03019590", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "AA5A2C2F-ABF4-46B0-80AB-867B97AE5237", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BE83150C-456E-462A-A0F1-ED8EAD60D671", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "BF5B2431-335C-461B-B07F-88267EA71DCD", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9DBA8E67-021A-4D07-94B9-943A8E1C4468", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "905D1F04-CDFD-4BAD-8939-5ABC70A874E6", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "00878E69-2721-43E3-A853-D3DCFE5C258D", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C51799BB-D931-436C-8C94-558956AC880A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "A1ACC549-B5AF-4F5C-A3FE-257AA6D80C7A", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "D498D406-A453-4119-BBA1-4709CF5862AE", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "8D68555E-BEB9-4F1E-8D6D-C313FB501523", "vulnerable": false }, { "criteria": "cpe:2.3:o:net-snmp:net_snmp:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "7B44A0D4-3020-414B-81D7-679E8441E182", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:solaris:10.0:unkown:x86:*:*:*:*:*", "matchCriteriaId": "B76A8BD4-E53F-49A6-946B-6E672DD0419C", "vulnerable": false }, { "criteria": "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "matchCriteriaId": "E75493D0-F060-4CBA-8AB0-C4FE8B2A8C9B", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:ace_10_6504_bundle_with_4_gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1C6B46B-13E2-4DA4-9EF2-007893034269", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_10_6509_bundle_with_8_gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1C501EB-CF9F-437D-A7C0-2A12F1D5E171", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_10_service_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "538FE81A-2FD9-4A7C-AEC7-8FCE98DADBE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_6504_bundle_with__4gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "15D3471D-6267-4481-8BBD-BFC106E8F30B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_6509_bundle_with_8gbps_throughput:*:*:*:*:*:*:*:*", "matchCriteriaId": "13FB3C8A-87D3-4601-BD97-2B9F9FA8CA47", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_20_service_module:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0292228-80D8-4BA4-8662-698D7003D7D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_4710:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBFD21CF-CC38-477F-A78B-10CFEFF81E0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_xml_gateway:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "522C9080-86A6-40A8-905C-73187DAF83F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:ace_xml_gateway:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C1B7A18-F230-44D4-801E-8284085CA1DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9120:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E62CC4C-89A7-4594-BDD8-394211889220", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9124:*:*:*:*:*:*:*:*", "matchCriteriaId": "E152F995-BCD2-4725-A47C-1A5E7D6B9005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9134:*:*:*:*:*:*:*:*", "matchCriteriaId": "51E38404-ED69-4B0E-A035-2AF5E0649CC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*", "matchCriteriaId": "A90F0A06-A634-4BD0-A477-90BD3384B7D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "346E0D1B-CF9E-48BC-AE7A-F8CEF09F6741", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "0123D2ED-3983-45D3-B54A-3E75FCE99C6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "66CA6C29-1DF1-46E3-BDCA-9ED72D3E6731", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E50E974E-87F5-45A2-88BA-B1E4913E3DAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4AB25CC-BB96-4675-98D7-C5FF30C24014", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9C7C95AD-3D5F-458B-A761-5D7779FEA327", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E9E4A3F6-5D89-47D0-84AD-601682399D8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C700A36D-5FB4-475D-BE85-74511830870A", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "02060365-1D67-4611-8D79-B9FC354EBF99", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "194BD880-F672-4492-8356-B14C8DA8C2DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1D769FC-3081-48F8-BBF1-3964F3F8B569", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A966DB26-8A52-4F4D-9C0E-8A8719A195AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E6675DF0-963A-4091-9786-7CE3337EE47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "77A94931-8584-4021-A5BB-83FF22D54955", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F06FB120-9BB3-4363-B2A2-A3475993FDFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8229DE3A-B9CB-44FF-8409-51E09DDED479", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1AAD7A89-294A-45DA-B5F5-C69F7FCC4A5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "2699E7A6-7B3A-4C4C-9472-B8B6B547624D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D913348F-351C-4D78-A0AA-27B355D52235", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C3E88A46-CEC7-46D5-9697-232E18531FD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F16B8D0-81F5-4ECE-8276-EC30DDCCE1A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "0ECFBAFE-9267-469A-A97F-F716969B247C", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "48F839C7-7B33-4BF6-9ACF-76F32F5D7C72", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE1559E6-E7B6-4B5B-8841-CF502E05BA46", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "F041246F-5B7F-4F63-9E81-02465C9062C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADB78013-DEE9-438E-ABD1-5E3D932177BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D77447C3-AA72-4CAB-A0B1-0883D41AD064", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "473038C0-1644-4FF2-A1DA-BCB8A7CD1CA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9C3F04F-7581-4DCA-970D-9FCBB56EA724", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7ABF04A7-8230-4AB9-8D66-DF1463037823", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_firewall:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC205E36-7027-4A9B-8574-9BB9C68007A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "69C55DD7-986A-4AB6-8F61-5A5D26531011", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84DDD7E4-D5D7-4341-9482-2B918306578D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "14A3C59C-6A3D-477B-B425-1C085D6951E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "31AA57F4-5023-4333-9F19-C9D362E8E495", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "063034FF-0AB8-4D78-9822-0DCA9657C853", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "67477EC7-363E-45B5-BA53-1A4E9FB20CDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "78E11F95-E635-465C-BD7F-5F7E9192DEAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "74F145F0-573E-4CBC-AB69-3B77D6F9A540", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "49DA7D86-8845-43CA-80DC-3D794322CB28", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "ABD34FEB-7956-44AE-A510-2E5F9EF61651", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DEF5098-3791-4CEB-A436-2809A4385D27", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5D895880-FB98-4472-A164-458CE086F339", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D7912AA3-0469-479E-9C5A-53F20E504956", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8677C6C8-39CA-492A-A196-9DFAF892120C", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "51FA6F2A-8444-4BB2-B7F2-B97AEFFF9E27", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "60E46CAD-0032-4CD6-AA2A-871E1DFC3A35", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "22CE55DE-00CA-4F87-9CA0-80A360E332FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "63DC81FA-A6B4-41DC-8097-8944D06A2451", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CB87853E-CAFF-48D8-9C56-A2DE325235D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "61E35451-BEE3-412A-8706-5522C00BE1DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "E599E0CE-CCB7-4A30-8AA9-45BBC11AFEC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F45326B3-CC4E-4C3A-9819-28936A0432F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "CDBF1A78-7190-4326-84BD-C18CC354DA38", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D97FFBA0-2E80-40EF-A4AC-F26D3490371E", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A442F5B-5A1A-4CD0-B693-851FFB917E5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "074BCB70-AD66-4141-9DD3-9DE73BDCB0F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "646BF70F-CB7B-48E3-8563-E089E1CECD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "1CD34A7B-508C-45F2-8725-FE42398D3652", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D2785732-A5C7-434E-B45D-13138B574F45", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "989A4E8A-F23D-4BF5-B860-FB7B04A1CE56", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A07E1241-24BE-48D3-B737-56B2AAA3AF64", "vulnerable": false }, { "criteria": "cpe:2.3:h:ingate:ingate_siparator:4.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "EFB751FD-CCCA-4131-A24F-65DEF1128B26", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:session_and_resource_control:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D106F4E4-4B41-4002-8C34-6A9C3A0FF640", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:session_and_resource_control:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "863583DC-DD93-46DC-BA06-0B838CDB2565", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:src_pe:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D50E1B4-A64E-45D5-8A44-947DE7B8AAD4", "vulnerable": true }, { "criteria": "cpe:2.3:a:juniper:src_pe:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "ED5F1A8F-5ED9-4ED0-A336-A0E4A439E6F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte." }, { "lang": "es", "value": "Una comprobaci\u00f3n SNMPv3 HMAC en (1) Net-SNMP versi\u00f3n 5.2.x anterior a 5.2.4.1, versi\u00f3n 5.3.x anterior a 5.3.2.1 y versi\u00f3n 5.4.x anterior a 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series versi\u00f3n 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (tambi\u00e9n se conoce como Network Appliance) ONTAP versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versi\u00f3n anterior a 16.2; (7) m\u00faltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall versi\u00f3n 3.1.0 y posterior y SIParator versi\u00f3n 3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent versi\u00f3n 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticaci\u00f3n SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte." } ], "id": "CVE-2008-0960", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-06-10T18:32:00.000", "references": [ { "source": "cret@cert.org", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "source": "cret@cert.org", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "source": "cret@cert.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "source": "cret@cert.org", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "cret@cert.org", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "cret@cert.org", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30574" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30596" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/30612" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30615" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30626" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30647" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30648" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30665" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30802" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31334" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31351" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31467" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31568" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32664" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33003" }, { "source": "cret@cert.org", "url": "http://secunia.com/advisories/35463" }, { "source": "cret@cert.org", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "source": "cret@cert.org", "url": "http://securityreason.com/securityalert/3933" }, { "source": "cret@cert.org", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "source": "cret@cert.org", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "source": "cret@cert.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "source": "cret@cert.org", "url": "http://support.apple.com/kb/HT2163" }, { "source": "cret@cert.org", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "source": "cret@cert.org", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "source": "cret@cert.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "source": "cret@cert.org", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "source": "cret@cert.org", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "source": "cret@cert.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "source": "cret@cert.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/29623" }, { "source": "cret@cert.org", "url": "http://www.securitytracker.com/id?1020218" }, { "source": "cret@cert.org", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "source": "cret@cert.org", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "source": "cret@cert.org", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "source": "cret@cert.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "source": "cret@cert.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "source": "cret@cert.org", "url": "https://www.exploit-db.com/exploits/5790" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "source": "cret@cert.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.ingate.com/pipermail/productinfo/2008/000021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=127730470825399\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2008-0528.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30574" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31334" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31467" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200808-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/forum/forum.php?forum_id=833770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=1989089\u0026group_id=12694\u0026atid=456380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT2163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2008/dsa-1663" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/878044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/MIMG-7ETS87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ocert.org/advisories/ocert-2008-006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/06/09/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0529.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493218/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/497962/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/29623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-685-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-162A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2008-0017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1787/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1788/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1797/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1800/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1801/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1836/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1981/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/2971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=447974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-07-03 10:59
Modified
2025-04-12 10:46
Severity ?
Summary
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv08434, and CSCuv08436.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/viewAlert.x?alertId=39583 | Vendor Advisory | |
psirt@cisco.com | http://www.securitytracker.com/id/1032775 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/viewAlert.x?alertId=39583 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1032775 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nx-os | 7.2\(0\)zz\(99.3\) | |
cisco | nexus_93120tx | - | |
cisco | nexus_93128tx | - | |
cisco | nexus_9332pq | - | |
cisco | nexus_9336pq_aci_spine | - | |
cisco | nexus_9372px | - | |
cisco | nexus_9372tx | - | |
cisco | nexus_9396px | - | |
cisco | nexus_9396tx | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9516 | - | |
cisco | nx-os | 7.2\(0\)zz\(99.1\) | |
cisco | nexus_3016 | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172 | - | |
cisco | nexus_3232c | - | |
cisco | nexus_3524 | - | |
cisco | nexus_3548 | - | |
cisco | nx-os | 6.2\(11b\) | |
cisco | mds_9100 | - | |
cisco | mds_9140 | * | |
cisco | mds_9500 | - | |
cisco | mds_9700 | - | |
cisco | nx-os | 9.1\(1\)sv1\(3.1.8\) | |
cisco | nexus_1000v | - | |
cisco | nx-os | 7.2\(0\)zz\(99.1\) | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5696q | - | |
cisco | nx-os | 6.2\(12\) | |
cisco | nexus_7000 | - | |
cisco | nexus_7700 | - | |
cisco | nx-os | 4.1\(2\)e1\(1\) | |
cisco | nexus_4001i | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)zz\\(99.3\\):*:*:*:*:*:*:*", "matchCriteriaId": "DDE99C10-B3DF-4BF1-B3D5-01CA37F16132", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)zz\\(99.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6E2E6964-B258-42D4-8181-BB4765B58AE5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11b\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF349FDA-DFEC-45AA-A236-F0C8D0B3AD83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:*:*:*:*:*:*:*:*", "matchCriteriaId": "A90F0A06-A634-4BD0-A477-90BD3384B7D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:9.1\\(1\\)sv1\\(3.1.8\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0B0A63C-1CB7-4A99-9AC0-9748E6261252", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E705638-8D0A-40D6-9A51-4FDB6C03F71E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)zz\\(99.1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6E2E6964-B258-42D4-8181-BB4765B58AE5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "57892CBB-8C95-4E56-90F8-B77BBBDC03FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:4.1\\(2\\)e1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7AC41532-1F38-4540-8398-7DD66D92D041", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_4001i:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB68FC53-5CD6-445F-9BB5-1F3724D92A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv08434, and CSCuv08436." }, { "lang": "es", "value": "El analizador sint\u00e1ctico CLI en Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), y 9.1(1)SV1(3.1.8) en los dispositivos Nexus permite a usuarios locales ejecutar comandos del sistema operativo arbitrarios a trav\u00e9s de caracteres manipulados en un nombre de fichero, tambi\u00e9n conocido como Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv08434, y CSCuv08436." } ], "id": "CVE-2015-4237", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-07-03T10:59:03.060", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583" }, { "source": "psirt@cisco.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=39583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032775" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" }, { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-08-23 19:15
Modified
2024-11-21 07:40
Severity ?
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Summary
A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nx-os | 9.3\(11\) | |
cisco | nx-os | 10.2\(5\) | |
cisco | nexus_3048 | - | |
cisco | nexus_31108pc-v | - | |
cisco | nexus_31108tc-v | - | |
cisco | nexus_31128pq | - | |
cisco | nexus_3132c-z | - | |
cisco | nexus_3132q-v | - | |
cisco | nexus_3132q-xl | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172pq | - | |
cisco | nexus_3172pq-xl | - | |
cisco | nexus_3172tq | - | |
cisco | nexus_3172tq-32t | - | |
cisco | nexus_3172tq-xl | - | |
cisco | nexus_3232 | - | |
cisco | nexus_3264c-e | - | |
cisco | nexus_3264q | - | |
cisco | nexus_3408-s | - | |
cisco | nexus_34180yc | - | |
cisco | nexus_34200yc-sm | - | |
cisco | nexus_3432d-s | - | |
cisco | nexus_3464c | - | |
cisco | nexus_3524 | - | |
cisco | nexus_3524-x | - | |
cisco | nexus_3524-xl | - | |
cisco | nexus_3548 | - | |
cisco | nexus_3548-x | - | |
cisco | nexus_3548-xl | - | |
cisco | nexus_36180yc-r | - | |
cisco | nexus_9232e | - | |
cisco | nexus_92348gc-x | - | |
cisco | nexus_9408 | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9516 | - | |
cisco | nx-os | - | |
cisco | mds_9000 | - | |
cisco | mds_9100 | - | |
cisco | mds_9132t | - | |
cisco | mds_9134 | - | |
cisco | mds_9140 | - | |
cisco | mds_9148 | - | |
cisco | mds_9148s | - | |
cisco | mds_9148t | - | |
cisco | mds_9200 | - | |
cisco | mds_9216 | - | |
cisco | mds_9216a | - | |
cisco | mds_9216i | - | |
cisco | mds_9222i | - | |
cisco | mds_9250i | - | |
cisco | mds_9396s | - | |
cisco | mds_9396t | - | |
cisco | mds_9500 | - | |
cisco | mds_9506 | - | |
cisco | mds_9509 | - | |
cisco | mds_9513 | - | |
cisco | mds_9700 | - | |
cisco | mds_9706 | - | |
cisco | mds_9710 | - | |
cisco | mds_9718 | - | |
cisco | nexus_1000_virtual_edge | - | |
cisco | nexus_1000v | - | |
cisco | nexus_1000v | - | |
cisco | nexus_5500 | - | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_5600 | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5672up-16g | - | |
cisco | nexus_5696q | - | |
cisco | nexus_6000 | - | |
cisco | nexus_6001 | - | |
cisco | nexus_6001p | - | |
cisco | nexus_6001t | - | |
cisco | nexus_6004 | - | |
cisco | nexus_6004x | - | |
cisco | nexus_7000 | - | |
cisco | nexus_7004 | - | |
cisco | nexus_7009 | - | |
cisco | nexus_7010 | - | |
cisco | nexus_7018 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0B4E497-95AE-45FC-8F89-A7959CA9AF4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C3018A70-3236-4885-8EB1-708442F74981", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C84D24C-2256-42AF-898A-221EBE9FE1E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA52D5C1-13D8-4D23-B022-954CCEF491F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DA8BFA-D7A2-476C-A6F5-CAE610033BC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D5D5E2-B40B-475D-9EF3-8441016E37E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA35D4AA-24B3-428E-84ED-804EF941E9A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FD00AB9-F2DD-4D07-8DFF-E7B34824D66A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*", "matchCriteriaId": "56426D35-FCFD-406E-9144-2E66C8C86EFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9134:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB00911-C0B0-4A4E-A0B9-413EC9D9C25A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:*", "matchCriteriaId": "F762E87A-BF80-4D33-ADDA-84369E068005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148:-:*:*:*:*:*:*:*", "matchCriteriaId": "22E6B85A-3988-4EC5-B788-9664772CE64E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D25FA4A8-408B-4E94-B7D9-7DC54B61322F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*", "matchCriteriaId": "831B6D0F-A975-4CBA-B5BB-0AC4AD718FE8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "B25B92ED-37C0-4653-9C5E-B4C13C46464C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A72BDC4-6640-45CC-A128-0CDEE38D3ADC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*", "matchCriteriaId": "90094569-AA2C-4D35-807F-9551FACE255F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*", "matchCriteriaId": "306AFBC9-A236-4D03-A1EB-CE7E838D8415", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*", "matchCriteriaId": "12DB1A25-A7C9-412F-88BC-E89588896395", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CD5738-029B-43AA-9342-63719DC16138", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF9DC03-5370-46FD-9CA8-AC4DF5E922FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E81D2CC1-376A-4D87-88EA-6E1831741EC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*", "matchCriteriaId": "3925D2CF-9D7C-4498-8AF2-45E15D5D009F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*", "matchCriteriaId": "C677D356-86C9-4491-A6CA-5E6306B2BB70", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A3C579-7AAD-41A4-947F-CCB9B09402A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*", "matchCriteriaId": "5182CB50-4D32-4835-B1A8-817D989F919F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*", "matchCriteriaId": "36B3B617-7554-4C36-9B41-19AA3BD2F6E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*", "matchCriteriaId": "B88879A9-A7F5-41E0-8A38-0E09E3FD27F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_1000_virtual_edge:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "5481E367-6692-48A3-8475-5299C5EE0822", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:microsoft_hyper-v:*:*", "matchCriteriaId": "B7063CEF-58CC-449E-BFDA-39371BA088AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "9A5FFC5B-6F90-4E8F-9AE2-B4DA4C7A144B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC8699E-81C0-4374-B827-71B3916B910D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "870F4379-68F6-4B34-B99B-107DFE0DBD63", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*", "matchCriteriaId": "367C2A49-4C4D-471B-9B34-AFAFA5AE9503", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A58223F-3B15-420B-A6D4-841451CF0380", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51EAD169-9036-496E-B740-45D79546F6D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E01F0DE-EA8A-451F-BADF-1A7A48B0C633", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F557E38-09F6-42C6-BABA-3C3168B38BBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_6004x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F182AD1-6E51-456A-A8F7-8F3B92DBE4D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:*", "matchCriteriaId": "36145717-6348-466D-87B4-B1A19F17BA55", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:*", "matchCriteriaId": "4831C5F4-AF09-4951-B7AC-9DAF1C7045B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBDCF9-562C-44BA-B709-F91346F6F99F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:*", "matchCriteriaId": "276BD181-125C-48EC-984C-29BAE20C21F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. " } ], "id": "CVE-2023-20168", "lastModified": "2024-11-21T07:40:43.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.5, "impactScore": 4.0, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-23T19:15:07.777", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-01 17:15
Modified
2025-01-27 20:57
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.
This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.
Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:
Nexus 3000 Series Switches
Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later
Nexus 9000 Series Switches in standalone NX-OS mode
References
▶ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | nx-os | 6.2\(2\) | |
cisco | nx-os | 6.2\(2a\) | |
cisco | nx-os | 6.2\(6\) | |
cisco | nx-os | 6.2\(6a\) | |
cisco | nx-os | 6.2\(6b\) | |
cisco | nx-os | 6.2\(8\) | |
cisco | nx-os | 6.2\(8a\) | |
cisco | nx-os | 6.2\(8b\) | |
cisco | nx-os | 6.2\(10\) | |
cisco | nx-os | 6.2\(12\) | |
cisco | nx-os | 6.2\(14\) | |
cisco | nx-os | 6.2\(16\) | |
cisco | nx-os | 6.2\(18\) | |
cisco | nx-os | 6.2\(20\) | |
cisco | nx-os | 6.2\(20a\) | |
cisco | nx-os | 6.2\(22\) | |
cisco | nx-os | 6.2\(24\) | |
cisco | nx-os | 6.2\(24a\) | |
cisco | nx-os | 7.2\(0\)d1\(1\) | |
cisco | nx-os | 7.2\(1\)d1\(1\) | |
cisco | nx-os | 7.2\(2\)d1\(1\) | |
cisco | nx-os | 7.2\(2\)d1\(2\) | |
cisco | nx-os | 7.3\(0\)d1\(1\) | |
cisco | nx-os | 7.3\(0\)dx\(1\) | |
cisco | nx-os | 7.3\(1\)d1\(1\) | |
cisco | nx-os | 7.3\(2\)d1\(1\) | |
cisco | nx-os | 7.3\(2\)d1\(2\) | |
cisco | nx-os | 7.3\(2\)d1\(3\) | |
cisco | nx-os | 7.3\(2\)d1\(3a\) | |
cisco | nx-os | 7.3\(3\)d1\(1\) | |
cisco | nx-os | 7.3\(4\)d1\(1\) | |
cisco | nx-os | 7.3\(5\)d1\(1\) | |
cisco | nx-os | 7.3\(6\)d1\(1\) | |
cisco | nx-os | 7.3\(7\)d1\(1\) | |
cisco | nx-os | 7.3\(8\)d1\(1\) | |
cisco | nx-os | 7.3\(9\)d1\(1\) | |
cisco | nx-os | 8.0\(1\) | |
cisco | nx-os | 8.1\(1\) | |
cisco | nx-os | 8.1\(2\) | |
cisco | nx-os | 8.1\(2a\) | |
cisco | nx-os | 8.2\(1\) | |
cisco | nx-os | 8.2\(2\) | |
cisco | nx-os | 8.2\(3\) | |
cisco | nx-os | 8.2\(4\) | |
cisco | nx-os | 8.2\(5\) | |
cisco | nx-os | 8.2\(6\) | |
cisco | nx-os | 8.2\(7\) | |
cisco | nx-os | 8.2\(7a\) | |
cisco | nx-os | 8.2\(8\) | |
cisco | nx-os | 8.2\(9\) | |
cisco | nx-os | 8.2\(10\) | |
cisco | nx-os | 8.2\(11\) | |
cisco | nx-os | 8.3\(1\) | |
cisco | nx-os | 8.3\(2\) | |
cisco | nx-os | 8.4\(1\) | |
cisco | nx-os | 8.4\(2\) | |
cisco | nx-os | 8.4\(3\) | |
cisco | nx-os | 8.4\(4\) | |
cisco | nx-os | 8.4\(4a\) | |
cisco | nx-os | 8.4\(5\) | |
cisco | nx-os | 8.4\(6\) | |
cisco | nx-os | 8.4\(6a\) | |
cisco | nx-os | 8.4\(7\) | |
cisco | nx-os | 8.4\(8\) | |
cisco | nx-os | 8.4\(9\) | |
cisco | nexus_7000 | - | |
cisco | nexus_7000_10-slot | - | |
cisco | nexus_7000_18-slot | - | |
cisco | nexus_7000_4-slot | - | |
cisco | nexus_7000_9-slot | - | |
cisco | nexus_7000_supervisor_1 | - | |
cisco | nexus_7000_supervisor_2 | - | |
cisco | nexus_7000_supervisor_2e | - | |
cisco | nexus_7004 | - | |
cisco | nexus_7009 | - | |
cisco | nexus_7010 | - | |
cisco | nexus_7018 | - | |
cisco | nexus_7700 | - | |
cisco | nexus_7700_10-slot | - | |
cisco | nexus_7700_18-slot | - | |
cisco | nexus_7700_2-slot | - | |
cisco | nexus_7700_6-slot | - | |
cisco | nexus_7700_supervisor_2e | - | |
cisco | nexus_7700_supervisor_3e | - | |
cisco | nexus_7702 | - | |
cisco | nexus_7706 | - | |
cisco | nexus_7710 | - | |
cisco | nexus_7718 | - | |
cisco | nx-os | 6.2\(1\) | |
cisco | nx-os | 6.2\(3\) | |
cisco | nx-os | 6.2\(5\) | |
cisco | nx-os | 6.2\(5a\) | |
cisco | nx-os | 6.2\(5b\) | |
cisco | nx-os | 6.2\(7\) | |
cisco | nx-os | 6.2\(9\) | |
cisco | nx-os | 6.2\(9a\) | |
cisco | nx-os | 6.2\(9b\) | |
cisco | nx-os | 6.2\(9c\) | |
cisco | nx-os | 6.2\(11\) | |
cisco | nx-os | 6.2\(11b\) | |
cisco | nx-os | 6.2\(11c\) | |
cisco | nx-os | 6.2\(11d\) | |
cisco | nx-os | 6.2\(11e\) | |
cisco | nx-os | 6.2\(13\) | |
cisco | nx-os | 6.2\(13a\) | |
cisco | nx-os | 6.2\(13b\) | |
cisco | nx-os | 6.2\(15\) | |
cisco | nx-os | 6.2\(17\) | |
cisco | nx-os | 6.2\(19\) | |
cisco | nx-os | 6.2\(21\) | |
cisco | nx-os | 6.2\(23\) | |
cisco | nx-os | 6.2\(25\) | |
cisco | nx-os | 6.2\(27\) | |
cisco | nx-os | 6.2\(29\) | |
cisco | nx-os | 6.2\(31\) | |
cisco | nx-os | 6.2\(33\) | |
cisco | nx-os | 7.3\(0\)d1\(1\) | |
cisco | nx-os | 7.3\(0\)dy\(1\) | |
cisco | nx-os | 7.3\(1\)d1\(1\) | |
cisco | nx-os | 7.3\(1\)dy\(1\) | |
cisco | nx-os | 8.1\(1\) | |
cisco | nx-os | 8.1\(1a\) | |
cisco | nx-os | 8.1\(1b\) | |
cisco | nx-os | 8.2\(1\) | |
cisco | nx-os | 8.2\(2\) | |
cisco | nx-os | 8.3\(1\) | |
cisco | nx-os | 8.3\(2\) | |
cisco | nx-os | 8.4\(1\) | |
cisco | nx-os | 8.4\(1a\) | |
cisco | nx-os | 8.4\(2\) | |
cisco | nx-os | 8.4\(2a\) | |
cisco | nx-os | 8.4\(2b\) | |
cisco | nx-os | 8.4\(2c\) | |
cisco | nx-os | 8.4\(2d\) | |
cisco | nx-os | 8.4\(2e\) | |
cisco | nx-os | 8.4\(2f\) | |
cisco | nx-os | 8.5\(1\) | |
cisco | nx-os | 9.2\(1\) | |
cisco | nx-os | 9.2\(1a\) | |
cisco | nx-os | 9.2\(2\) | |
cisco | nx-os | 9.3\(1\) | |
cisco | nx-os | 9.3\(2\) | |
cisco | nx-os | 9.3\(2a\) | |
cisco | nx-os | 9.4\(1\) | |
cisco | nx-os | 9.4\(1a\) | |
cisco | nx-os | 9.4\(2\) | |
cisco | mds_9000 | - | |
cisco | mds_9100 | - | |
cisco | mds_9132t | - | |
cisco | mds_9134 | - | |
cisco | mds_9140 | - | |
cisco | mds_9148 | - | |
cisco | mds_9148s | - | |
cisco | mds_9148t | - | |
cisco | mds_9200 | - | |
cisco | mds_9216 | - | |
cisco | mds_9216a | - | |
cisco | mds_9216i | - | |
cisco | mds_9222i | - | |
cisco | mds_9250i | - | |
cisco | mds_9396s | - | |
cisco | mds_9396t | - | |
cisco | mds_9500 | - | |
cisco | mds_9506 | - | |
cisco | mds_9509 | - | |
cisco | mds_9513 | - | |
cisco | mds_9700 | - | |
cisco | mds_9706 | - | |
cisco | mds_9710 | - | |
cisco | mds_9718 | - | |
cisco | nx-os | 6.0\(2\)a6\(1\) | |
cisco | nx-os | 6.0\(2\)a6\(1a\) | |
cisco | nx-os | 6.0\(2\)a6\(2\) | |
cisco | nx-os | 6.0\(2\)a6\(2a\) | |
cisco | nx-os | 6.0\(2\)a6\(3\) | |
cisco | nx-os | 6.0\(2\)a6\(3a\) | |
cisco | nx-os | 6.0\(2\)a6\(4\) | |
cisco | nx-os | 6.0\(2\)a6\(4a\) | |
cisco | nx-os | 6.0\(2\)a6\(5\) | |
cisco | nx-os | 6.0\(2\)a6\(5a\) | |
cisco | nx-os | 6.0\(2\)a6\(5b\) | |
cisco | nx-os | 6.0\(2\)a6\(6\) | |
cisco | nx-os | 6.0\(2\)a6\(7\) | |
cisco | nx-os | 6.0\(2\)a6\(8\) | |
cisco | nx-os | 6.0\(2\)a8\(1\) | |
cisco | nx-os | 6.0\(2\)a8\(2\) | |
cisco | nx-os | 6.0\(2\)a8\(3\) | |
cisco | nx-os | 6.0\(2\)a8\(4\) | |
cisco | nx-os | 6.0\(2\)a8\(4a\) | |
cisco | nx-os | 6.0\(2\)a8\(5\) | |
cisco | nx-os | 6.0\(2\)a8\(6\) | |
cisco | nx-os | 6.0\(2\)a8\(7\) | |
cisco | nx-os | 6.0\(2\)a8\(7a\) | |
cisco | nx-os | 6.0\(2\)a8\(7b\) | |
cisco | nx-os | 6.0\(2\)a8\(8\) | |
cisco | nx-os | 6.0\(2\)a8\(9\) | |
cisco | nx-os | 6.0\(2\)a8\(10\) | |
cisco | nx-os | 6.0\(2\)a8\(10a\) | |
cisco | nx-os | 6.0\(2\)a8\(11\) | |
cisco | nx-os | 6.0\(2\)a8\(11a\) | |
cisco | nx-os | 6.0\(2\)a8\(11b\) | |
cisco | nx-os | 6.0\(2\)u6\(1\) | |
cisco | nx-os | 6.0\(2\)u6\(1a\) | |
cisco | nx-os | 6.0\(2\)u6\(2\) | |
cisco | nx-os | 6.0\(2\)u6\(2a\) | |
cisco | nx-os | 6.0\(2\)u6\(3\) | |
cisco | nx-os | 6.0\(2\)u6\(3a\) | |
cisco | nx-os | 6.0\(2\)u6\(4\) | |
cisco | nx-os | 6.0\(2\)u6\(4a\) | |
cisco | nx-os | 6.0\(2\)u6\(5\) | |
cisco | nx-os | 6.0\(2\)u6\(5a\) | |
cisco | nx-os | 6.0\(2\)u6\(5b\) | |
cisco | nx-os | 6.0\(2\)u6\(5c\) | |
cisco | nx-os | 6.0\(2\)u6\(6\) | |
cisco | nx-os | 6.0\(2\)u6\(7\) | |
cisco | nx-os | 6.0\(2\)u6\(8\) | |
cisco | nx-os | 6.0\(2\)u6\(9\) | |
cisco | nx-os | 6.0\(2\)u6\(10\) | |
cisco | nx-os | 7.0\(3\)f1\(1\) | |
cisco | nx-os | 7.0\(3\)f2\(1\) | |
cisco | nx-os | 7.0\(3\)f2\(2\) | |
cisco | nx-os | 7.0\(3\)f3\(1\) | |
cisco | nx-os | 7.0\(3\)f3\(2\) | |
cisco | nx-os | 7.0\(3\)f3\(3\) | |
cisco | nx-os | 7.0\(3\)f3\(3a\) | |
cisco | nx-os | 7.0\(3\)f3\(3c\) | |
cisco | nx-os | 7.0\(3\)f3\(4\) | |
cisco | nx-os | 7.0\(3\)f3\(5\) | |
cisco | nx-os | 7.0\(3\)i4\(1\) | |
cisco | nx-os | 7.0\(3\)i4\(2\) | |
cisco | nx-os | 7.0\(3\)i4\(3\) | |
cisco | nx-os | 7.0\(3\)i4\(4\) | |
cisco | nx-os | 7.0\(3\)i4\(5\) | |
cisco | nx-os | 7.0\(3\)i4\(6\) | |
cisco | nx-os | 7.0\(3\)i4\(7\) | |
cisco | nx-os | 7.0\(3\)i4\(8\) | |
cisco | nx-os | 7.0\(3\)i4\(8a\) | |
cisco | nx-os | 7.0\(3\)i4\(8b\) | |
cisco | nx-os | 7.0\(3\)i4\(8z\) | |
cisco | nx-os | 7.0\(3\)i4\(9\) | |
cisco | nx-os | 7.0\(3\)i5\(1\) | |
cisco | nx-os | 7.0\(3\)i5\(2\) | |
cisco | nx-os | 7.0\(3\)i6\(1\) | |
cisco | nx-os | 7.0\(3\)i6\(2\) | |
cisco | nx-os | 7.0\(3\)i7\(1\) | |
cisco | nx-os | 7.0\(3\)i7\(2\) | |
cisco | nx-os | 7.0\(3\)i7\(3\) | |
cisco | nx-os | 7.0\(3\)i7\(4\) | |
cisco | nx-os | 7.0\(3\)i7\(5\) | |
cisco | nx-os | 7.0\(3\)i7\(5a\) | |
cisco | nx-os | 7.0\(3\)i7\(6\) | |
cisco | nx-os | 7.0\(3\)i7\(7\) | |
cisco | nx-os | 7.0\(3\)i7\(8\) | |
cisco | nx-os | 7.0\(3\)i7\(9\) | |
cisco | nx-os | 7.0\(3\)i7\(10\) | |
cisco | nx-os | 9.2\(1\) | |
cisco | nx-os | 9.2\(2\) | |
cisco | nx-os | 9.2\(2t\) | |
cisco | nx-os | 9.2\(2v\) | |
cisco | nx-os | 9.2\(3\) | |
cisco | nx-os | 9.2\(4\) | |
cisco | nx-os | 9.3\(1\) | |
cisco | nx-os | 9.3\(2\) | |
cisco | nx-os | 9.3\(3\) | |
cisco | nx-os | 9.3\(4\) | |
cisco | nx-os | 9.3\(5\) | |
cisco | nx-os | 9.3\(6\) | |
cisco | nx-os | 9.3\(7\) | |
cisco | nx-os | 9.3\(7a\) | |
cisco | nx-os | 9.3\(8\) | |
cisco | nx-os | 9.3\(9\) | |
cisco | nx-os | 9.3\(10\) | |
cisco | nx-os | 9.3\(11\) | |
cisco | nx-os | 9.3\(12\) | |
cisco | nx-os | 9.3\(13\) | |
cisco | nx-os | 10.1\(1\) | |
cisco | nx-os | 10.1\(2\) | |
cisco | nx-os | 10.2\(1\) | |
cisco | nx-os | 10.2\(1q\) | |
cisco | nx-os | 10.2\(2\) | |
cisco | nx-os | 10.2\(3\) | |
cisco | nx-os | 10.2\(4\) | |
cisco | nx-os | 10.2\(5\) | |
cisco | nx-os | 10.2\(6\) | |
cisco | nx-os | 10.2\(7\) | |
cisco | nx-os | 10.2\(8\) | |
cisco | nx-os | 10.3\(1\) | |
cisco | nx-os | 10.3\(2\) | |
cisco | nx-os | 10.3\(3\) | |
cisco | nx-os | 10.3\(4a\) | |
cisco | nx-os | 10.3\(5\) | |
cisco | nx-os | 10.3\(99w\) | |
cisco | nx-os | 10.3\(99x\) | |
cisco | nx-os | 10.4\(1\) | |
cisco | nx-os | 10.4\(2\) | |
cisco | nexus_3000 | - | |
cisco | nexus_3016 | - | |
cisco | nexus_3016q | - | |
cisco | nexus_3048 | - | |
cisco | nexus_3064 | - | |
cisco | nexus_3064-32t | - | |
cisco | nexus_3064-t | - | |
cisco | nexus_3064-x | - | |
cisco | nexus_3064t | - | |
cisco | nexus_3064x | - | |
cisco | nexus_3100 | - | |
cisco | nexus_3100-v | - | |
cisco | nexus_3100-z | - | |
cisco | nexus_3100v | - | |
cisco | nexus_31108pc-v | - | |
cisco | nexus_31108pv-v | - | |
cisco | nexus_31108tc-v | - | |
cisco | nexus_31128pq | - | |
cisco | nexus_3132c-z | - | |
cisco | nexus_3132q | - | |
cisco | nexus_3132q-v | - | |
cisco | nexus_3132q-x | - | |
cisco | nexus_3132q-x\/3132q-xl | - | |
cisco | nexus_3132q-xl | - | |
cisco | nexus_3164q | - | |
cisco | nexus_3172 | - | |
cisco | nexus_3172pq | - | |
cisco | nexus_3172pq-xl | - | |
cisco | nexus_3172pq\/pq-xl | - | |
cisco | nexus_3172tq | - | |
cisco | nexus_3172tq-32t | - | |
cisco | nexus_3172tq-xl | - | |
cisco | nexus_3200 | - | |
cisco | nexus_3232 | - | |
cisco | nexus_3232c | - | |
cisco | nexus_3232c_ | - | |
cisco | nexus_3264c-e | - | |
cisco | nexus_3264q | - | |
cisco | nexus_3400 | - | |
cisco | nexus_3408-s | - | |
cisco | nexus_34180yc | - | |
cisco | nexus_34200yc-sm | - | |
cisco | nexus_3432d-s | - | |
cisco | nexus_3464c | - | |
cisco | nexus_3500 | - | |
cisco | nexus_3524 | - | |
cisco | nexus_3524-x | - | |
cisco | nexus_3524-x\/xl | - | |
cisco | nexus_3524-xl | - | |
cisco | nexus_3548 | - | |
cisco | nexus_3548-x | - | |
cisco | nexus_3548-x\/xl | - | |
cisco | nexus_3548-xl | - | |
cisco | nexus_3600 | - | |
cisco | nexus_36180yc-r | - | |
cisco | nexus_3636c-r | - | |
cisco | nexus_9000 | - | |
cisco | nexus_9000_in_aci_mode | - | |
cisco | nexus_9000_in_standalone | - | |
cisco | nexus_9000_in_standalone_nx-os_mode | - | |
cisco | nexus_9000v | - | |
cisco | nexus_9200 | - | |
cisco | nexus_9200yc | - | |
cisco | nexus_92160yc-x | - | |
cisco | nexus_9221c | - | |
cisco | nexus_92300yc | - | |
cisco | nexus_92304qc | - | |
cisco | nexus_9232e | - | |
cisco | nexus_92348gc-x | - | |
cisco | nexus_9236c | - | |
cisco | nexus_9272q | - | |
cisco | nexus_9300 | - | |
cisco | nexus_93108tc-ex | - | |
cisco | nexus_93108tc-ex-24 | - | |
cisco | nexus_93108tc-fx | - | |
cisco | nexus_93108tc-fx-24 | - | |
cisco | nexus_93108tc-fx3h | - | |
cisco | nexus_93108tc-fx3p | - | |
cisco | nexus_93120tx | - | |
cisco | nexus_93128 | - | |
cisco | nexus_93128tx | - | |
cisco | nexus_9316d-gx | - | |
cisco | nexus_93180lc-ex | - | |
cisco | nexus_93180tc-ex | - | |
cisco | nexus_93180yc-ex | - | |
cisco | nexus_93180yc-ex-24 | - | |
cisco | nexus_93180yc-fx | - | |
cisco | nexus_93180yc-fx-24 | - | |
cisco | nexus_93180yc-fx3 | - | |
cisco | nexus_93180yc-fx3h | - | |
cisco | nexus_93180yc-fx3s | - | |
cisco | nexus_93216tc-fx2 | - | |
cisco | nexus_93240tc-fx2 | - | |
cisco | nexus_93240yc-fx2 | - | |
cisco | nexus_9332c | - | |
cisco | nexus_9332d-gx2b | - | |
cisco | nexus_9332d-h2r | - | |
cisco | nexus_9332pq | - | |
cisco | nexus_93360yc-fx2 | - | |
cisco | nexus_9336c-fx2 | - | |
cisco | nexus_9336c-fx2-e | - | |
cisco | nexus_9336pq | - | |
cisco | nexus_9336pq_aci | - | |
cisco | nexus_9336pq_aci_spine | - | |
cisco | nexus_9348d-gx2a | - | |
cisco | nexus_9348gc-fx3 | - | |
cisco | nexus_9348gc-fxp | - | |
cisco | nexus_93600cd-gx | - | |
cisco | nexus_9364c | - | |
cisco | nexus_9364c-gx | - | |
cisco | nexus_9364d-gx2a | - | |
cisco | nexus_9372px | - | |
cisco | nexus_9372px-e | - | |
cisco | nexus_9372tx | - | |
cisco | nexus_9372tx-e | - | |
cisco | nexus_9396px | - | |
cisco | nexus_9396tx | - | |
cisco | nexus_9408 | - | |
cisco | nexus_9432pq | - | |
cisco | nexus_9500 | - | |
cisco | nexus_9500_16-slot | - | |
cisco | nexus_9500_4-slot | - | |
cisco | nexus_9500_8-slot | - | |
cisco | nexus_9500_supervisor_a | - | |
cisco | nexus_9500_supervisor_a\+ | - | |
cisco | nexus_9500_supervisor_b | - | |
cisco | nexus_9500_supervisor_b\+ | - | |
cisco | nexus_9500r | - | |
cisco | nexus_9504 | - | |
cisco | nexus_9508 | - | |
cisco | nexus_9516 | - | |
cisco | nexus_9536pq | - | |
cisco | nexus_9636pq | - | |
cisco | nexus_9716d-gx | - | |
cisco | nexus_9736pq | - | |
cisco | nexus_9800 | - | |
cisco | nexus_9804 | - | |
cisco | nexus_9808 | - | |
cisco | nx-os | 7.1\(0\)n1\(1\) | |
cisco | nx-os | 7.1\(0\)n1\(1a\) | |
cisco | nx-os | 7.1\(0\)n1\(1b\) | |
cisco | nx-os | 7.1\(1\)n1\(1\) | |
cisco | nx-os | 7.1\(2\)n1\(1\) | |
cisco | nx-os | 7.1\(3\)n1\(1\) | |
cisco | nx-os | 7.1\(3\)n1\(2\) | |
cisco | nx-os | 7.1\(4\)n1\(1\) | |
cisco | nx-os | 7.1\(5\)n1\(1\) | |
cisco | nx-os | 7.1\(5\)n1\(1b\) | |
cisco | nx-os | 7.3\(0\)n1\(1\) | |
cisco | nx-os | 7.3\(1\)n1\(1\) | |
cisco | nx-os | 7.3\(2\)n1\(1\) | |
cisco | nx-os | 7.3\(3\)n1\(1\) | |
cisco | nx-os | 7.3\(4\)n1\(1\) | |
cisco | nx-os | 7.3\(5\)n1\(1\) | |
cisco | nx-os | 7.3\(6\)n1\(1\) | |
cisco | nx-os | 7.3\(7\)n1\(1\) | |
cisco | nx-os | 7.3\(7\)n1\(1a\) | |
cisco | nx-os | 7.3\(7\)n1\(1b\) | |
cisco | nx-os | 7.3\(8\)n1\(1\) | |
cisco | nx-os | 7.3\(9\)n1\(1\) | |
cisco | nx-os | 7.3\(10\)n1\(1\) | |
cisco | nx-os | 7.3\(11\)n1\(1\) | |
cisco | nx-os | 7.3\(12\)n1\(1\) | |
cisco | nx-os | 7.3\(13\)n1\(1\) | |
cisco | nx-os | 7.3\(14\)n1\(1\) | |
cisco | nexus_5000 | - | |
cisco | nexus_5010 | - | |
cisco | nexus_5020 | - | |
cisco | nexus_5500 | - | |
cisco | nexus_5548p | - | |
cisco | nexus_5548up | - | |
cisco | nexus_5596t | - | |
cisco | nexus_5596up | - | |
cisco | nexus_5600 | - | |
cisco | nexus_56128p | - | |
cisco | nexus_5624q | - | |
cisco | nexus_5648q | - | |
cisco | nexus_5672up | - | |
cisco | nexus_5672up-16g | - | |
cisco | nexus_5696q | - |
{ "cisaActionDue": "2024-07-23", "cisaExploitAdd": "2024-07-02", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Cisco NX-OS Command Injection Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2FDE8EF9-47CF-451D-9570-3D369D74D44F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "55A760CE-5E63-4A6B-8DA3-A473BC3900E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "0E738E86-B75F-48BF-9E76-C7DD470F3688", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6a\\):*:*:*:*:*:*:*", "matchCriteriaId": "11E66F3E-9482-4F30-8480-F036F3C68B61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(6b\\):*:*:*:*:*:*:*", "matchCriteriaId": "68C6090F-0B05-46F0-8A67-928FE1C36D5F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "FBD345BD-83EF-4913-A0F3-74E52AD76BBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8a\\):*:*:*:*:*:*:*", "matchCriteriaId": "46B2B97B-DDB7-4208-BF1A-D10C8A075A14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(8b\\):*:*:*:*:*:*:*", "matchCriteriaId": "317C8BE8-84DA-43D5-AE93-7E7DCDE6883E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED7B1216-4C4F-4A23-9474-23876649ABF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "57892CBB-8C95-4E56-90F8-B77BBBDC03FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(14\\):*:*:*:*:*:*:*", "matchCriteriaId": "A555382D-9D35-4931-B3B0-DD4D956AB7AE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(16\\):*:*:*:*:*:*:*", "matchCriteriaId": "985752BE-AC65-47BC-97F5-36C2E44E55D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(18\\):*:*:*:*:*:*:*", "matchCriteriaId": "BEC60C3C-8689-47EC-B944-F0FB9D38E4F1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(20\\):*:*:*:*:*:*:*", "matchCriteriaId": "C6A61F7E-9929-48F5-85BA-72E744AF30B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(20a\\):*:*:*:*:*:*:*", "matchCriteriaId": "DA24A851-F051-41A8-A33E-7296AD199306", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(22\\):*:*:*:*:*:*:*", "matchCriteriaId": "52E6911E-3DD8-4FCC-A1B5-613098B25337", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(24\\):*:*:*:*:*:*:*", "matchCriteriaId": "FEA235F0-95C4-471A-BBD6-EDB723E6E7CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(24a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F558EAFA-C4A3-4EC3-85E6-225D3EBB0D90", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(0\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "6BF973CD-3315-4D86-8F89-05DC97C736AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C18A0045-87F3-4782-81C5-0BF615EA9346", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2768DEF1-3DFA-4683-9D8D-C5915D8E7365", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(2\\)d1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3CD05045-E867-4B7E-ACE4-7B6EA69971AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7FD733DD-EC40-48EC-A8A6-AE09657EEFC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)dx\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "18CE33FF-6C81-4B38-8C47-6DEBD4D4223C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A7B0A8C-ED8F-411C-843F-B801CBBBB6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FADC755B-3AB3-43D6-8495-1FABCBD548E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "03607526-7F9E-43F5-94ED-3ED0B4D29DF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "8890C4B8-2E5C-46D6-80DE-6B5256FA1CAD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)d1\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2F8A3FFE-D017-43F7-B481-AF25B8B2BE6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "98FC292D-27D3-40CF-98C5-AF47686FC134", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C23B353-3500-4FA4-90CE-624A29B1048F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "29002523-6405-4198-A5E5-630A4B661767", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF0DFA7E-9B40-4E82-9EB9-886C79B2D61C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "FA615483-9E8E-4E74-B2A1-FCA555523DC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(8\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "E991E535-5FB6-40FE-B599-9CFFDA6438DD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(9\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "90444CE8-2D46-432F-8713-6B4A05D03AF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.0\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9C83E090-7C99-465A-A477-C2949B137720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB556839-151C-492E-B4C3-C024276D5AB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "298709C4-69BF-48BA-A317-4251B5461A0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EF15089-A16E-47CC-AB52-78AB85F681BF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FB0B238-4F3A-4569-89B0-ED80533D87C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF90B861-F48B-45DF-ACB8-F91030106181", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "CAB301FC-988F-4FC3-A097-E926E541F098", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6CFA19E0-0121-4422-83AF-94039520A0F8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "03201B37-841C-432F-8643-352833381373", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F6AD86DF-7D7A-4097-8DBF-9EF07EF5509A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "9CF6FCE1-D9F7-4A1C-8570-1A1529BFFB0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "224696A4-D5A9-4E5F-B0D4-68F27A1CD6A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A54DB25-6479-4B1B-AEE6-9F4EB1A0E90C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0ED62FC-4C6D-4777-934F-0A9A32194E0E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "84FE4C8A-61BC-4F5A-B4E1-8525FAD55CB2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "A7FD4067-4EEF-4477-AA3A-EE8BB8489832", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6B8E31F-6B33-43E0-9585-5736D54FE876", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C828C0E-99E6-4DEF-9EB3-672DEB61F479", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2636B1F1-8C40-44A4-B96B-C84EC244685E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "411B58EB-2BCD-47CA-AB5A-538BCEAEF75F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "1D725607-74D5-4700-B4B7-0C35D119F9BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "189BE025-7434-4790-94E3-4F4F07C76937", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A2E2364-1C5B-494B-B7DA-752F9E9D5464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1C2124A-A7B3-4D2A-870C-76EFCE0D0B9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F45511E-5224-4919-B6D9-83EE7493D0E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(6a\\):*:*:*:*:*:*:*", "matchCriteriaId": "52F8EDCD-45C9-4408-BD20-71C70CDE367C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "A39C505E-ABEB-4481-8A8A-1B1F3C5E0A81", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "5B02BC42-7F87-46F7-AA46-48633AC5AFD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "395233A3-B56F-458A-86F9-5EE8D66A51C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEACA55F-4335-4478-B608-EB92EE1D6C6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "993AFE99-DFC3-4D92-90C8-D3A6495547BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7453E0FA-B05D-4888-AFB0-8FE8B8040DFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*", "matchCriteriaId": "108DB6B5-CB29-477F-84FC-52116F295878", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:*", "matchCriteriaId": "36145717-6348-466D-87B4-B1A19F17BA55", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:*", "matchCriteriaId": "4831C5F4-AF09-4951-B7AC-9DAF1C7045B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6BBDCF9-562C-44BA-B709-F91346F6F99F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:*", "matchCriteriaId": "276BD181-125C-48EC-984C-29BAE20C21F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7A4B4B-3BB1-4A4D-911E-C4EEF01BBC45", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5ABB175-81BE-4C46-BD2D-70016508BE22", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "71F93299-A715-4E97-87FE-B1E248EA98BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D71B228-FFE5-45F7-ADCF-6D359ADA6D31", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F3AD807-5A0F-4DF5-9A7A-748205F409E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBB9435-1CD4-469E-BF16-AD98ADC99AAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ABB93D-2C3A-4029-B545-B638B6C7788E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "7596B885-5312-489B-BBDB-A5374E525DE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7706:-:*:*:*:*:*:*:*", "matchCriteriaId": "42EC10DA-FE01-4BA3-B49F-B164F697D4BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7710:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1655CC-9BD5-4BD5-B113-776E4335D556", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_7718:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA6F9ED-50A1-4D61-BC83-438585646856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD54E122-6102-451E-92BF-AF71D98AEBE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "0C857C0F-B023-4CF7-9916-6735C40425F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4C558C0-ECA4-408D-A5DF-2A175E48EAE2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C4947F0C-B1F5-4BA0-A6F0-F08C25554E68", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "BC281019-3BB1-4539-BFA3-1D13E2ABE720", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "07863B2B-D780-4641-BADE-A5AFFAD95E57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "D4F7ADD7-C438-40A4-883E-BFAAA9BA0029", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(9a\\):*:*:*:*:*:*:*", "matchCriteriaId": "31C3DDB7-119B-4AF8-9896-8DF08303E04E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(9b\\):*:*:*:*:*:*:*", "matchCriteriaId": "05C1E8F0-3840-406F-A3F6-BB50735B0214", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(9c\\):*:*:*:*:*:*:*", "matchCriteriaId": "01D17E16-271E-4642-9577-32B58EEFB5F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "BA4A04DF-1668-42FC-9C81-11FFB93B43D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11b\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF349FDA-DFEC-45AA-A236-F0C8D0B3AD83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11c\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F5A0E74-C0C2-4593-9ACB-4A94E5BA4A29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11d\\):*:*:*:*:*:*:*", "matchCriteriaId": "C926C2EC-1838-4B94-945D-69315B645B39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(11e\\):*:*:*:*:*:*:*", "matchCriteriaId": "6D3C6E19-4A5A-45D4-9BE0-97BE969D8BFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "4F52D1CE-0F00-401B-86AE-1E93F7259B02", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(13a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CA749833-7D3B-4FFD-9A5F-9D9966D1DDBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(13b\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FEDA299-FD35-46A0-A7A3-50D526D445C2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(15\\):*:*:*:*:*:*:*", "matchCriteriaId": "411C176B-3A5D-4EFB-8DCB-753E7BAC6AF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(17\\):*:*:*:*:*:*:*", "matchCriteriaId": "CACD51E7-FCA3-4870-94E0-FAB505743C8B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(19\\):*:*:*:*:*:*:*", "matchCriteriaId": "9110930C-AA37-42F1-8B7E-E06033133D42", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(21\\):*:*:*:*:*:*:*", "matchCriteriaId": "8540E153-4041-4CBA-ABA2-6E78BD3A6E6F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(23\\):*:*:*:*:*:*:*", "matchCriteriaId": "B8F9A602-F5E5-432D-8304-19964DC373A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(25\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B86774A-900E-4A02-B671-C13C18965358", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(27\\):*:*:*:*:*:*:*", "matchCriteriaId": "D23ADF50-748F-4795-B564-6D934B95F8D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(29\\):*:*:*:*:*:*:*", "matchCriteriaId": "1D4A2531-F5F0-4AB8-A812-7ADE7D558B77", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(31\\):*:*:*:*:*:*:*", "matchCriteriaId": "95777BFD-0F3B-49F8-9131-34EB83F7ED67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(33\\):*:*:*:*:*:*:*", "matchCriteriaId": "FF43590F-5F94-49EC-BE3A-55635ECD3176", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7FD733DD-EC40-48EC-A8A6-AE09657EEFC1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)dy\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "ADC3F316-982A-4D7C-BE3B-C3D87F58B298", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)d1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4A7B0A8C-ED8F-411C-843F-B801CBBBB6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)dy\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D9B515AF-915A-4BAE-AA51-CF57F7316A63", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AB556839-151C-492E-B4C3-C024276D5AB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "3A8D89C0-8C65-487B-9F2D-FFE31AE5BBCC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "409A92B8-F9A5-401E-B77F-177C48B22F23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "3FB0B238-4F3A-4569-89B0-ED80533D87C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "CF90B861-F48B-45DF-ACB8-F91030106181", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6B8E31F-6B33-43E0-9585-5736D54FE876", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "3C828C0E-99E6-4DEF-9EB3-672DEB61F479", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "2636B1F1-8C40-44A4-B96B-C84EC244685E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0A868C7-1060-4A48-819E-013F435F08D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "411B58EB-2BCD-47CA-AB5A-538BCEAEF75F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B9E85905-A3F0-43C0-A578-6E9C14033D3D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2b\\):*:*:*:*:*:*:*", "matchCriteriaId": "64E228E3-B088-4E1B-9E46-ECC8835CD9A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2c\\):*:*:*:*:*:*:*", "matchCriteriaId": "17679F98-B8D5-4FDD-AA8F-9FCF703B466B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2d\\):*:*:*:*:*:*:*", "matchCriteriaId": "BCCF180B-0710-4368-B588-86C0971883A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2e\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0E1A760-CAB3-4313-9315-26AD75C43CC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.4\\(2f\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8DBDA3B-E8A6-4709-81F0-32908100D975", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:8.5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8BC7435D-C9E9-4895-A958-F8F78DAE93A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD96C7AE-EECC-43F4-9132-1E7F8047C701", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "728C0D94-CCCF-4313-98F0-1E25F7FA2464", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1D43B9D6-0991-4370-9369-C0A1EDBF6627", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A589031-946F-4016-AFC9-92FB033420D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "20FF2A5A-CB80-4F58-856D-724AACB0864C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "89FC0A74-2435-4977-BBB7-906B812382EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C06AF41C-ADDD-4B52-8187-DA50D1AF271B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.4\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "50A8023C-51B2-49D7-BEB3-618B2D213F25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8BD5346D-15B3-4342-901B-F562A8A71686", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FD00AB9-F2DD-4D07-8DFF-E7B34824D66A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "54C0D908-D7BA-48C3-9963-14A3A32A2662", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*", "matchCriteriaId": "56426D35-FCFD-406E-9144-2E66C8C86EFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9134:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB00911-C0B0-4A4E-A0B9-413EC9D9C25A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:*", "matchCriteriaId": "F762E87A-BF80-4D33-ADDA-84369E068005", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148:-:*:*:*:*:*:*:*", "matchCriteriaId": "22E6B85A-3988-4EC5-B788-9664772CE64E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*", "matchCriteriaId": "D25FA4A8-408B-4E94-B7D9-7DC54B61322F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*", "matchCriteriaId": "831B6D0F-A975-4CBA-B5BB-0AC4AD718FE8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "B25B92ED-37C0-4653-9C5E-B4C13C46464C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A72BDC4-6640-45CC-A128-0CDEE38D3ADC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*", "matchCriteriaId": "90094569-AA2C-4D35-807F-9551FACE255F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*", "matchCriteriaId": "306AFBC9-A236-4D03-A1EB-CE7E838D8415", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*", "matchCriteriaId": "12DB1A25-A7C9-412F-88BC-E89588896395", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CD5738-029B-43AA-9342-63719DC16138", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF9DC03-5370-46FD-9CA8-AC4DF5E922FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E81D2CC1-376A-4D87-88EA-6E1831741EC6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2374E02D-46FE-477F-A74D-49E72149E6EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*", "matchCriteriaId": "3925D2CF-9D7C-4498-8AF2-45E15D5D009F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*", "matchCriteriaId": "C677D356-86C9-4491-A6CA-5E6306B2BB70", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A3C579-7AAD-41A4-947F-CCB9B09402A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44335D8-8A78-486C-A325-9691FA4C3271", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*", "matchCriteriaId": "5182CB50-4D32-4835-B1A8-817D989F919F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*", "matchCriteriaId": "36B3B617-7554-4C36-9B41-19AA3BD2F6E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*", "matchCriteriaId": "B88879A9-A7F5-41E0-8A38-0E09E3FD27F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "73B9FE4E-0C82-4511-9A4A-DCBFEB93DE87", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BB8F0200-7BCA-49E9-98E0-D825630D77FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "61FCA143-FDAB-472D-B9E1-F7CB4041BBE1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "61F736DD-44FE-4A20-AF89-4B29725608A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "8844860D-427F-4B01-980A-59B082F26034", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "CCA96B43-0793-4784-A971-DD442EBFF6BE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "B13305C9-008F-488A-ADC7-0724AFB313DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "50DFAF49-0688-4A5A-9023-E2543164D89C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "46376F5C-2CF0-46F1-ADCF-870065A24D12", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "5EB6C0E3-9B92-4768-93BB-8B8626EB164A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "F4EA572E-5F4F-45F1-B7A1-346F723C2BDD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "A6EA3CBB-EAF7-4837-96AF-0258220C4A5A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "5E6FB730-84CD-496D-9140-BC9375548D14", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a6\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "BD712B88-298A-4488-A053-67CB45190F57", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "31308B18-062C-4DB8-9241-F15661C06398", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "ED17D340-9C18-4B1E-BA15-CAE2ADAAD38E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "310856A9-CA62-4C1A-A4C9-B6EECC36F496", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "3D295366-662E-4C8E-9758-3DB801E0ABA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "F09360A9-3FB1-465F-977E-643942D01FE8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A97A6BE-A27A-4D53-AB63-2A2631F20EAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "3F034BF4-31E6-46FB-B082-EA22FFE51AAB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "063BB311-EC8D-43E5-9B9D-56C96121EB9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "003AAC03-306E-4D12-B4C7-7ECA4ED88884", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(7b\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB0DAA33-3841-4C14-A137-93E1810CC866", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "ACD5B480-2780-48EB-B361-4EF4833D97E3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "B0500999-E48F-4FE1-9B92-C1E179651CE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "629488D4-D8A4-4152-A4D3-E951F199C6DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(10a\\):*:*:*:*:*:*:*", "matchCriteriaId": "2D8F0A63-8229-46E8-94A6-CDBB1E8F91E5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "FAD3C773-0B71-4FF2-9DCD-2875CFDE3308", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11a\\):*:*:*:*:*:*:*", "matchCriteriaId": "B07F6A0D-82C3-4C2C-9715-3D07083E6F56", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)a8\\(11b\\):*:*:*:*:*:*:*", "matchCriteriaId": "03901678-2CCB-4ED5-AF04-D8469BF12804", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8845147E-D3B1-41B9-BBD2-77B2823F3AD0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "8F7B2F23-F532-40D2-884E-D86785B33296", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1FC4F349-9E1C-4DD8-BC07-6CB67053BCDF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(2a\\):*:*:*:*:*:*:*", "matchCriteriaId": "D498C133-AA11-49C4-B065-F27CE776D318", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "08032AAC-F094-4717-A56F-89289FBD1F3B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "C5ADD4D3-206C-4609-AB2A-F6945D56627B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "07645F73-AC79-4BB8-A98E-1740F7D6EC5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "9DC56869-4665-49D1-89F2-8ED97727BD94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "147D1A4A-6404-47E3-B1A6-4C001C8DD9E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1162691A-6C92-448A-8F1B-2DEFB623F1ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5b\\):*:*:*:*:*:*:*", "matchCriteriaId": "57524BA3-CF08-4F0F-95C9-F1417B4B83E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(5c\\):*:*:*:*:*:*:*", "matchCriteriaId": "D0E214C2-24CF-43EC-BC27-2E6AA77254DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "EB0D74A0-C4B2-46EC-A9FF-562A997E3150", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "817A45B4-7C79-4D1A-B889-18A937CF8361", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "155F3CB7-A85B-4897-A4E2-F485FDF44AD4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "9D34CAB5-0832-45B1-B13F-49B763AFB74F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.0\\(2\\)u6\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "7C0DB182-F37A-4230-BD6F-461C3195FAF4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "21F43A5A-52A2-4094-8D36-39450B8F0E0D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "674D15C8-3946-4C2F-9B62-BC6E5BC67673", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "990FA11F-5158-4717-B716-C5D6D2D23D1B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5DD2941-AD1E-4C13-8DAA-C5524B96AAB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "45A37F82-44B3-426C-A344-9054599BB426", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "907A3DEC-27F8-4D0A-9EE4-4681B6D9BADB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3a\\):*:*:*:*:*:*:*", "matchCriteriaId": "53378B5F-4A5B-425D-B8BE-455FAF924551", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3c\\):*:*:*:*:*:*:*", "matchCriteriaId": "A8F6C744-6501-4FAD-AF4F-12D3EA8F5BE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "076216C6-C115-4C7C-A9E3-46A3986DA2AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "A819AE96-3933-4AD2-AF30-36E199393E01", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4142F873-0492-4ACC-88F9-3A243128D0EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A9CD31FC-C2D0-4B29-90D5-7C3CB218DF9A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "30A500F4-1899-4F96-98E3-9330146A7963", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "FE52C974-3930-4AC9-907B-8E6B325D6A1E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "FAD07DE9-5C98-4A63-A741-8E69E9F125D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "F0DA113F-3706-4FF3-88F9-5D3CD48F8CE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "B3BBE1B1-062A-4D00-B646-FAB4BA85BF6A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "6A35B6DA-BF07-4579-8D6A-65CD8E052482", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8a\\):*:*:*:*:*:*:*", "matchCriteriaId": "EF0B3DB8-8121-4FDC-8A11-42AB619101EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8b\\):*:*:*:*:*:*:*", "matchCriteriaId": "70830AB5-C86B-4726-A982-6F104910153E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(8z\\):*:*:*:*:*:*:*", "matchCriteriaId": "87EB3AE2-8A92-4B16-8A22-A0F5B55D12E4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i4\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "E0904B27-2FA3-4B8D-9706-98B0376B5FC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B1D86994-83EE-4D09-B79A-70CB22C077C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i5\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1BEB5BAE-0BB6-4201-9229-47DE631AAF3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "00953B63-7DBB-4A67-B41D-321C2ECDE79A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i6\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "83B2E7F6-9641-4B55-8B7D-6B0E020DD4A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "C9388C2C-75F4-487F-A7D8-4E17FD39A166", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "80B54786-DA2A-4E2D-9835-6A7939931928", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "7688EC58-4647-4A08-9E86-A71EA7C41B88", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "D5AD2254-158D-4BEE-B36C-242813F4BA37", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "4480D800-595F-44CB-85ED-7E17A34A5BEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(5a\\):*:*:*:*:*:*:*", "matchCriteriaId": "BF7AB4C3-54E0-4445-974C-4AE337B7B7DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "AD015889-3893-4781-B18D-6125A9B6CE39", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "89541F84-0C10-4757-8D25-80FC4464EC23", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "371AEAF3-39CA-4837-BA5A-D80826933C9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "4C1BC928-7DB9-499A-8CF4-90C98218E9D8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)i7\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "3779AD1A-7E6D-4213-A35E-7E9E461AE6FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DD96C7AE-EECC-43F4-9132-1E7F8047C701", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "1D43B9D6-0991-4370-9369-C0A1EDBF6627", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*", "matchCriteriaId": "6EB58108-78E4-4208-A549-C86B37422828", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*", "matchCriteriaId": "46427F06-FAB1-4AB8-A6BF-3EE10608B4D9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "5FB6ADC7-97AC-4DD8-8F1B-448A63D8BE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "6E2484E7-24ED-4238-8ED3-FFFB7C479F18", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A589031-946F-4016-AFC9-92FB033420D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "20FF2A5A-CB80-4F58-856D-724AACB0864C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "9FF50BFC-2DB3-4954-BC59-8B3D27D418E0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "F97A62E0-8A96-43A3-8FB1-FDC1B8A08049", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A2F42DB-B22B-4880-BA73-D0E0295190DF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "85A8B2D7-BCF2-4B2E-8208-7D2FDF717C65", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "C8A71DEB-93CD-4827-9F9E-3A0DFFAD145A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(7a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E1A56DB8-CDDD-4AB8-8694-B6CC967B7F62", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "2B448FDB-C2F5-454F-A275-E985C3FCDBCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(9\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AEE47A7-B23A-4C9A-A25C-0983D94FB569", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*", "matchCriteriaId": "350F10D8-221B-4A47-8BF6-CCC421878243", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*", "matchCriteriaId": "C0B4E497-95AE-45FC-8F89-A7959CA9AF4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(12\\):*:*:*:*:*:*:*", "matchCriteriaId": "7385A37A-FC89-44E6-8BD9-C35B2F22714F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(13\\):*:*:*:*:*:*:*", "matchCriteriaId": "1C26E0A3-7641-4DDF-9882-F04F297C8D07", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D7B192CE-F0B4-415F-9A33-B639A7B56ED4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "2A1D6DFF-D8CC-4912-BFE6-8454AB95AD7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F2DB904E-9FAF-4A23-82E9-367BDBFC57D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(1q\\):*:*:*:*:*:*:*", "matchCriteriaId": "A5736375-4050-40A5-A504-688B182C9A75", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "54AB751B-77DE-4513-B961-378458F74164", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "63AB92C1-D2F7-4025-88B6-EFA1D3C07F8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(4\\):*:*:*:*:*:*:*", "matchCriteriaId": "69C445A7-B836-493D-8056-86D4F31847EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "C3018A70-3236-4885-8EB1-708442F74981", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(6\\):*:*:*:*:*:*:*", "matchCriteriaId": "6FE29E31-332A-4B5B-ADAC-4C14FB589593", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(7\\):*:*:*:*:*:*:*", "matchCriteriaId": "0918CE83-AFAF-422B-B992-1B7ED61C3316", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.2\\(8\\):*:*:*:*:*:*:*", "matchCriteriaId": "A11EF17F-F0CC-4E27-BC67-8A7CBEB17760", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F69EF43C-0F06-40B8-94AE-870E182E26CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "8CE0E36D-08A6-48D5-A364-AC066F30F3CB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(3\\):*:*:*:*:*:*:*", "matchCriteriaId": "093B5CCD-AE92-47C4-81E9-E03825BD6CF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(4a\\):*:*:*:*:*:*:*", "matchCriteriaId": "1DBDBBC8-12BA-42F9-BF22-B29C3FDF8A31", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(5\\):*:*:*:*:*:*:*", "matchCriteriaId": "F8403157-A1E2-40BA-BCED-27C7981814C9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(99w\\):*:*:*:*:*:*:*", "matchCriteriaId": "0B3B9B0F-6D25-408B-9D20-87C66F786D61", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(99x\\):*:*:*:*:*:*:*", "matchCriteriaId": "59AB22C9-34C9-4919-BA80-DFF3E186620F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.4\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "BE3869F2-3991-4F60-8618-7F491EBFF807", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:10.4\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "A3D96339-4768-483E-9D2C-0EB0F8D29D5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "10FFC5E8-CC5A-4D31-A63A-19E72EC442AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "528ED62B-D739-4E06-AC64-B506FD73BBAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D402AB0-BCFB-4F42-8C50-5DC930AEEC8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*", "matchCriteriaId": "76C10D85-88AC-4A79-8866-BED88A0F8DF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "09AC2BAD-F536-48D0-A2F0-D4E290519EB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CB7F6D-A82B-4A31-BFAC-FF4A4B8DF9C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC4FFCC-E886-49BC-9737-5B5BA2AAB14B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4E8EE4-031D-47D3-A12E-EE5F792172EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*", "matchCriteriaId": "00CDD8C3-67D5-4E9F-9D48-A77B55DB0AB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C14CC9-C244-4B86-AEA6-C50BAD5DA9A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8FF2EC4-0C09-4C00-9956-A2A4A894F63D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14D4B4E-120E-4607-A4F1-447C7BF3052E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*", "matchCriteriaId": "15702ACB-29F3-412D-8805-E107E0729E35", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "29B34855-D8D2-4114-80D2-A4D159C62458", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3DBBFE9-835C-4411-8492-6006E74BAC65", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C97C29EE-9426-4BBE-8D84-AB5FF748703D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E142C18F-9FB5-4D96-866A-141D7D16CAF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*", "matchCriteriaId": "7817F4E6-B2DA-4F06-95A4-AF329F594C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EFC116A-627F-4E05-B631-651D161217C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*", "matchCriteriaId": "32A532C0-B0E3-484A-B356-88970E7D0248", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C84D24C-2256-42AF-898A-221EBE9FE1E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*", "matchCriteriaId": "D008CA1C-6F5A-40EA-BB12-A9D84D5AF700", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*", "matchCriteriaId": "43913A0E-50D5-47DD-94D8-DD3391633619", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA52D5C1-13D8-4D23-B022-954CCEF491F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8E1073F-D374-4311-8F12-AD8C72FAA293", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E505C0B1-2119-4C6A-BF96-C282C633D169", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "915EF8F6-6039-4DD0-B875-30D911752B74", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "97217080-455C-48E4-8CE1-6D5B9485864F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "57572E4A-78D5-4D1A-938B-F05F01759612", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EBEBA5B-5589-417B-BF3B-976083E9FE54", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000_in_aci_mode:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BC5903-1316-4FFF-BE52-2F6D63549590", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000_in_standalone:-:*:*:*:*:*:*:*", "matchCriteriaId": "4755F890-634B-4B25-AF08-C34F13429FA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA62800-F5DC-48DA-8C81-D684EA8EBB9F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*", "matchCriteriaId": "532CE4B0-A3C9-4613-AAAF-727817D06FB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "24CA1A59-2681-4507-AC74-53BD481099B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4283E433-7F8C-4410-B565-471415445811", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFB9FDE8-8533-4F65-BF32-4066D042B2F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80AB6FB-32FD-43D7-A9F1-80FA47696210", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DA8BFA-D7A2-476C-A6F5-CAE610033BC2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", "matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", "matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "92E2CB2B-DA11-4CF7-9D57-3D4D48990DC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "40E40F42-632A-47DF-BE33-DC25B826310B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*", "matchCriteriaId": "16C64136-89C2-443C-AF7B-BED81D3DE25A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBEF7F26-BB47-44BD-872E-130820557C23", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*", "matchCriteriaId": "F309E7B9-B828-4CD2-9D2B-8966EE5B9CC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "102F91CD-DFB6-43D4-AE5B-DA157A696230", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DB6FC5-762A-4F16-AE8C-69330EFCF640", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "5394DE31-3863-4CA9-B7B1-E5227183100D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6678B8A-D905-447E-BE7E-6BFB4CC5DAFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CE49B45-F2E9-491D-9C29-1B46E9CE14E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFAD21E-59EE-4CCE-8F1E-621D2EA50905", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C3CE6D-BD54-48B1-A188-8E53DA001424", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*", "matchCriteriaId": "498991F7-39D6-428C-8C7D-DD8DC72A0346", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F1127D2-12C0-454F-91EF-5EE334070D06", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D6EB963-E0F2-4A02-8765-AB2064BE19E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DC1E93-561E-490C-AE0E-B02BAB9A7C8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*", "matchCriteriaId": "12DA2DE5-8ADA-4D6A-BC1A-9C06FA163B1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CF467E2-4567-426E-8F48-39669E0F514C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", "matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D6DB7F-C025-4971-9615-73393ED61078", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*", "matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D5D5E2-B40B-475D-9EF3-8441016E37E9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA8E1F0-74A6-4725-B6AA-A1112EFC5D0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "63BE0266-1C00-4D6A-AD96-7F82532ABAA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "73F59A4B-AE92-4533-8EDC-D1DD850309FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "492A2C86-DD38-466B-9965-77629A73814F", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB7AA46-4018-4925-963E-719E1037F759", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*", "matchCriteriaId": "31B9D1E4-10B9-4B6F-B848-D93ABF6486D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB270C45-756E-400A-979F-D07D750C881A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8A085C-2DBA-4269-AB01-B16019FBB4DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79DD582-AF68-44F1-B640-766B46EF2BE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*", "matchCriteriaId": "B04484DA-AA59-4833-916E-6A8C96D34F0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "163743A1-09E7-4EC5-8ECA-79E4B9CE173B", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE340E4C-DC48-4FC8-921B-EE304DB5AE0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*", "matchCriteriaId": "C367BBE0-D71F-4CB5-B50E-72B033E73FE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E1D224-4751-4233-A127-A041068C804A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD31B075-01B1-429E-83F4-B999356A0EB9", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*", "matchCriteriaId": "A10C9C0A-C96A-4B45-90D0-6ED457EB5F4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*", "matchCriteriaId": "3284D16F-3275-4F8D-8AE4-D413DE19C4FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "DE199525-4C2D-48C2-A76C-BD14BF2851F9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "E3644F66-F964-4D50-A6E0-EE8784490BD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(0\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "72AD166D-7CBF-4A4D-A376-907DDA1BB504", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9A20D72B-E2C6-47B6-A54D-FA435F29D7F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "77D9EEFA-D652-45D2-8AF5-8A72825E7ED0", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "1AEB91EC-E548-4C53-920F-C4871BC464B8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2\\):*:*:*:*:*:*:*", "matchCriteriaId": "0282F963-2C1F-44F7-A0D0-4929685051AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9103A92E-C9F3-401B-AE30-66466210ADED", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B5ED7424-EB12-4C21-97C8-082156716C9C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(5\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "16359104-2DB6-41D6-97A8-8CA1C3AB5688", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "569B3CE7-CA06-4636-8043-7ED7635195A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "8D72F0B8-D229-4995-A053-62FA6591DCBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "D8025943-EA09-47E6-9109-7DAF078F8F26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0EE35B51-2D13-4A8B-BFF5-0596DBDCD261", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(4\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "69FE85C9-A0AC-4FD4-A6EE-F0868B69503B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(5\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "AF1257BF-D534-4899-937F-DCBD033A7D94", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(6\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "86E5CF27-5661-41DF-B339-740718760AC6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "9ACD2D0D-7A38-4FCD-9E24-5588BACF8DA6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1a\\):*:*:*:*:*:*:*", "matchCriteriaId": "586E9024-C983-4CFF-9A3F-A39256E09910", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(7\\)n1\\(1b\\):*:*:*:*:*:*:*", "matchCriteriaId": "B2B7951C-8376-49C3-BF50-E6B65909A739", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(8\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "0E8D1718-F6B6-4AF6-86EE-0DFF5C6F5AEF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(9\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "4D9EA4B1-4E06-404A-8989-0BA8BE611211", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(10\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "F304E6D1-6FA6-452C-AC49-27173F22966B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(11\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "58895A84-EA72-40EA-BD7A-AE2EA362BA8F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(12\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "5F7966B0-2CAC-4249-98B4-EDAA2F0BF3EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(13\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "7937350E-C774-46F0-88EF-E0464EF868B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(14\\)n1\\(1\\):*:*:*:*:*:*:*", "matchCriteriaId": "B79E4387-44CC-4D7B-A53D-D73EEB23F736", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:*", "matchCriteriaId": "E275D31F-4FA1-428E-AB4A-D2802FF0CF1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA7F5823-41A8-47C8-A154-02C6C31EF76A", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFC8699E-81C0-4374-B827-71B3916B910D", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5519EA9-1236-4F51-9974-E3FC1B26B5D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1766443C-1C5A-486E-A36F-D3045F364D78", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "870F4379-68F6-4B34-B99B-107DFE0DBD63", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB6E612-4246-4408-B3F6-B31E771F5ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*", "matchCriteriaId": "91B129B2-2B31-4DE0-9F83-CC6E0C8729A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBD3CD0-B542-4B23-9C9D-061643BE44E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*", "matchCriteriaId": "A22A2647-A4C0-4681-BBC5-D95ADBAA0457", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*", "matchCriteriaId": "367C2A49-4C4D-471B-9B34-AFAFA5AE9503", "vulnerable": false }, { "criteria": "cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root.\r\nNote: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:\r\n\r\nNexus 3000 Series Switches\r\nNexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later\r\nNexus 9000 Series Switches in standalone NX-OS mode" }, { "lang": "es", "value": "Una vulnerabilidad en la CLI del software Cisco NX-OS podr\u00eda permitir que un atacante local autenticado ejecute comandos arbitrarios como root en el sistema operativo subyacente de un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n insuficiente de los argumentos que se pasan a comandos CLI de configuraci\u00f3n espec\u00edficos. Un atacante podr\u00eda aprovechar esta vulnerabilidad incluyendo una entrada manipulada como argumento de un comando CLI de configuraci\u00f3n afectado. Un exploit exitoso podr\u00eda permitir al atacante ejecutar comandos arbitrarios en el sistema operativo subyacente con privilegios de root. Nota: Para explotar con \u00e9xito esta vulnerabilidad en un dispositivo Cisco NX-OS, un atacante debe tener credenciales de administrador." } ], "id": "CVE-2024-20399", "lastModified": "2025-01-27T20:57:04.940", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "psirt@cisco.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-01T17:15:04.383", "references": [ { "source": "psirt@cisco.com", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.sygnia.co/threat-reports-and-advisories/china-nexus-threat-group-velvet-ant-exploits-cisco-0-day/" } ], "sourceIdentifier": "psirt@cisco.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "psirt@cisco.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }